A survey of autonomic computing—degrees, models, and applications

MC Huebscher, JA McCann - ACM Computing Surveys (CSUR), 2008 - dl.acm.org
Autonomic Computing is a concept that brings together many fields of computing with the
purpose of creating computing systems that self-manage. In its early days it was criticised as …

A survey on context-aware mobile and wireless networking: On networking and computing environments' integration

P Makris, DN Skoutas, C Skianis - … communications surveys & …, 2012 - ieeexplore.ieee.org
During the last years, a continuous convergence and fusion of computing and networking
systems is stressed in the ICT research community. Context awareness appears to be a …

The ponder policy specification language

N Damianou, N Dulay, E Lupu, M Sloman - Policies for Distributed …, 2001 - Springer
The Ponder language provides a common means of specifying security policies that map
onto various access control implementation mechanisms for firewalls, operating systems …

访问控制模型研究进展及发展趋势

李凤华, 苏铓, 史国振, 马建峰 - 电子学报, 2012 - ejournal.org.cn
访问控制的任务是保证信息资源不被非法使用和访问, 冲突检测与消解主要解决不同信息系统
安全策略不统一的问题. 随着计算机和网络通信技术的发展, 先后出现了自主访问控制模型 …

A policy language for a pervasive computing environment

L Kagal, T Finin, A Joshi - Proceedings POLICY 2003. IEEE 4th …, 2003 - ieeexplore.ieee.org
We describe a policy language designed for pervasive computing applications that is based
on deontic concepts and grounded in a semantic language. The pervasive computing …

Delegation logic: A logic-based approach to distributed authorization

N Li, BN Grosof, J Feigenbaum - ACM Transactions on Information and …, 2003 - dl.acm.org
We address the problem of authorization in large-scale, open, distributed systems.
Authorization decisions are needed in electronic commerce, mobile-code execution, remote …

Detecting and resolving firewall policy anomalies

H Hu, GJ Ahn, K Kulkarni - IEEE Transactions on dependable …, 2012 - ieeexplore.ieee.org
The advent of emerging computing technologies such as service-oriented architecture and
cloud computing has enabled us to perform business services more efficiently and …

A policy based approach to security for the semantic web

L Kagal, T Finin, A Joshi - International semantic web conference, 2003 - Springer
Along with developing specifications for the description of meta-data and the extraction of
information for the Semantic Web, it is important to maximize security in this environment …

An artificial intelligence perspective on autonomic computing policies

JO Kephart, WE Walsh - Proceedings. Fifth IEEE International …, 2004 - ieeexplore.ieee.org
We introduce a unified framework that interrelates three different types of policies that will be
used in autonomic computing system: action, goal, and utility function policies. Our policy …

KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement

A Uszok, J Bradshaw, R Jeffers, N Suri… - … POLICY 2003. IEEE …, 2003 - ieeexplore.ieee.org
We describe our initial implementation of the KAoS policy and domain services. While
primarily oriented to the dynamic and complex requirements of software agent applications …