2015
Federating Policy-Driven Autonomous Systems: Interaction Specification and Management Patterns.
J. Netw. Syst. Manag., 2015
2014
Rumpole: An Introspective Break-Glass Access Control Language.
ACM Trans. Inf. Syst. Secur., 2014
2012
Self-Management Framework for Mobile Autonomous Systems.
J. Netw. Syst. Manag., 2012
Home Network Management Policies: Putting the User in the Loop.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012
A configuration service for home networks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
2011
Autonomic Role and Mission Allocation Framework for Wireless Sensor Networks.
Proceedings of the 5th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2011
An information plane architecture supporting home network management.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Smartphone based e-Learning.
Proceedings of the CSEDU 2011, 2011
Policy refinement: Decomposition and operationalization for dynamic domains.
Proceedings of the 7th International Conference on Network and Service Management, 2011
Self-adaptive routing in multi-hop sensor networks.
Proceedings of the 7th International Conference on Network and Service Management, 2011
Refinement of History-Based Policies.
Proceedings of the Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning, 2011
2010
Engineering Policy-Based Ubiquitous Systems.
Comput. J., 2010
Collaborative Privacy Policy Authoring in a Social Networking Context.
Proceedings of the POLICY 2010, 2010
Privacy Butler: A personal privacy rights manager for online presence.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
Starfish: policy driven self-management in wireless sensor networks.
Proceedings of the 2010 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, 2010
Teleo-Reactive policies for managing human-centric pervasive services.
Proceedings of the 6th International Conference on Network and Service Management, 2010
Decomposition techniques for policy refinement.
Proceedings of the 6th International Conference on Network and Service Management, 2010
2009
A lightweight policy system for body sensor networks.
IEEE Trans. Netw. Serv. Manag., 2009
Locating network domain entry and exit point/path for DDoS attack traffic.
IEEE Trans. Netw. Serv. Manag., 2009
Policy conflict analysis for diffserv quality of service management.
IEEE Trans. Netw. Serv. Manag., 2009
Security policy refinement using data integration: a position paper.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009
Verification of Policy-Based Self-Managed Cell Interactions Using Alloy.
Proceedings of the POLICY 2009, 2009
Vesta: A secure and autonomic system for pervasive healthcare.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009
Realising management and composition of Self-Managed Cells in pervasive healthcare.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009
Securing Body Sensor Networks: Sensor Association and Key Management.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
A Policy-Based Management Architecture for Mobile Collaborative Teams.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
A Mission Management Framework for Unmanned Autonomous Vehicles.
Proceedings of the Mobile Wireless Middleware, 2009
Adaptive response system for distributed denial-of-service attacks.
Proceedings of the Integrated Network Management, 2009
Self-healing for Pervasive Computing Systems.
Proceedings of the Architecting Dependable Systems VII, 2009
Ponder2: A Policy System for Autonomous Pervasive Environments.
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009
Towards Self-Healing in Wireless Sensor Networks.
Proceedings of the Sixth International Workshop on Wearable and Implantable Body Sensor Networks, 2009
2008
Reconfigurable Architecture for Network Flow Analysis.
IEEE Trans. Very Large Scale Integr. Syst., 2008
AMUSE: autonomic management of ubiquitous e-Health systems.
Concurr. Comput. Pract. Exp., 2008
Ponder2 - A Policy Environment for Autonomous Pervasive Systems.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Network domain entrypoint/path determination for DDoS attacks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Adaptive self-management of teams of autonomous vehicles.
Proceedings of the 6th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2008), 2008
Finger: An efficient policy system for body sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
An Efficient Policy System for Body Sensor Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
A Role-Based Infrastructure for the Management of Dynamic Communities.
Proceedings of the Resilient Networks and Services, 2008
2007
A Survey of Bots Used for Distributed Denial of Service Attacks.
Proceedings of the New Approaches for Security, 2007
Towards Supporting Interactions between Self-Managed Cells.
Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems, 2007
Autonomous Pervasive Systems and the Policy Challenges of a Small World!
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Self-Managed Cell: A Middleware for Managing Body-Sensor Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Dynamic Ontology Mapping for Interacting Autonomous Systems.
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007
Non-intrusive IP traceback for DDoS attacks.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Policy-based Management for Body-Sensor Networks.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 4th International Workshop on Wearable and Implantable Body Sensor Networks, 2007
Self-management Framework for Unmanned Autonomous Vehicles.
Proceedings of the Inter-Domain Management, 2007
2006
Policy refinement for IP differentiated services Quality of Service management.
IEEE Trans. Netw. Serv. Manag., 2006
Access Control Policy Analysis Using Free Variable Tableaux.
Inf. Media Technol., 2006
Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health.
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006
2005
Policy Conflict Analysis Using Tableaux for On Demanc VPN Framework.
Proceedings of the 2005 International Conference on a World of Wireless, 2005
Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Policy Conflict Analysis for Quality of Service Management.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005
Self-managed Cells for Ubiquitous Systems.
Proceedings of the Computer Network Security, 2005
An Ontology-enabled Service Oriented Architecture for Pervasive Computing.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Policy refinement for DiffServ quality of service management.
Proceedings of the Integrated Network Management, 2005
Policy Issues for Pervasive Systems.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VIII, 2005
A Combined Hardware-Software Architecture for Network Flow.
Proceedings of The 2005 International Conference on Engineering of Reconfigurable Systems and Algorithms, 2005
Self-Managed Cells and their Federation.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005
2004
A framework for contextual mediation in mobile and ubiquitous computing applied to the context-aware adaptation of maps.
Pers. Ubiquitous Comput., 2004
,
,
,
,
,
,
,
,
,
,
,
IEEE Intell. Syst., 2004
PONDER policy implementation and validation in a CIM and differentiated services framework.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Meta Data to Support Context Aware Mobile Applications.
Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM 2004), 2004
PEACE: A Policy-Based Establishment of Ad-hoc Communities.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Report on the 4th International Conference on Mobile Data Management.
SIGMOD Rec., 2003
An Adaptive Policy-based Framework for Network Services Management.
J. Netw. Syst. Manag., 2003
Policy-based Management of Networks and Services.
J. Netw. Syst. Manag., 2003
Guest Editors' Introduction - Mobile Data Management.
IEEE Distributed Syst. Online, 2003
Trust Management Tools for Internet Applications.
Proceedings of the Trust Management, First International Conference, 2003
Irregular Reconfigurable CAM Structures for Firewall Applications.
Proceedings of the Field Programmable Logic and Application, 13th International Conference, 2003
Compiling Policy Descriptions into Reconfigurable Firewall Processors.
Proceedings of the 11th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2003), 2003
2002
Security and management policy specification.
IEEE Netw., 2002
An Adaptive Policy Based Management Framework for Differentiated Services Networks.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
Tools for domain-based policy management of distributed systems.
Proceedings of the Management Solutions for the New Communications World, 2002
Specifying and Analysing Trust for Internet Applications.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002
Development framework for firewall processors.
Proceedings of the 2002 IEEE International Conference on Field-Programmable Technology, 2002
Constraint Based Network Adaptation for Ubiquitous Applications.
Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 2002
2001
Active networks and services.
Comput. Networks, 2001
Map adaptation for users of mobile systems.
Proceedings of the Tenth International World Wide Web Conference, 2001
The Ponder Policy Specification Language.
Proceedings of the Policies for Distributed Systems and Networks, 2001
A Policy Deployment Model for the Ponder Language.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001
Constraint-Based Configuration of Proxylets for Programmable Networks.
Proceedings of the Interactive Distributed Multimedia Systems, 2001
A Policy Language for the Management of Distributed Agents.
Proceedings of the Agent-Oriented Software Engineering II, Second International Workshop, 2001
2000
A Survey of Trust in Internet Applications.
IEEE Commun. Surv. Tutorials, 2000
Ponder: Realising Enterprise Viewpoint Concepts.
Proceedings of the 4th International Enterprise Distributed Object Computing Conference (EDOC 2000), 2000
A Flexible Access Control Service for Java Mobile Code.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
Conflicts in Policy-Based Distributed Systems Management.
IEEE Trans. Software Eng., 1999
A Survey of Quality of Service in Mobile Computing Environments.
IEEE Commun. Surv. Tutorials, 1999
Use of Roles and Policies for Specifying and Managing a Virtual Enterprise.
Proceedings of the Ninth International Workshop on Research Issues on Data Engineering: Information Technology for Virtual Enterprises, 1999
Policy Specification for Programmable Networks.
Proceedings of the Active Networks, First International Working Conference, 1999
QoS and Context Awareness for Mobile Computing.
Proceedings of the Handheld and Ubiquitous Computing, First International Symposium, 1999
Are Programmable Networks Unmanageable?
Proceedings of the Active Technologies for Network and Service Management, 1999
1997
Towards a Role-Based Framework for Distributed Systems Management.
J. Netw. Syst. Manag., 1997
GEM: a generalized event monitoring language for distributed systems.
Distributed Syst. Eng., 1997
Reconciling role based management and role based access control.
Proceedings of the Second Workshop on Role-Based Access Control, 1997
Conflict Analysis for Management Policies.
Proceedings of the Integrated Network Management V, 1997
Workload Characteristics for Process Migration and Load Balancing.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997
A Policy Based Role Object Model.
Proceedings of the 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 1997
Interactive Configuration Management for Distributed Object Systems.
Proceedings of the 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 1997
1996
Role-based security for distributed object systems.
Proceedings of the 5th Workshop on Enabling Technologies, 1996
Working Group Report on Application Security.
Proceedings of the 5th Workshop on Enabling Technologies, 1996
An authentication service supporting domain-based access control policies.
Proceedings of the Information Systems Security, 1996
A Security Framework Supporting Domain Based Access Control in Distributed Systems.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996
A configurable event service for distributed systems.
Proceedings of the Third International Conference on Configurable Distributed Systems, 1996
Implementing interactive configuration management for distributed systems.
Proceedings of the Third International Conference on Configurable Distributed Systems, 1996
1995
A policy based role framework for access control.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
Configuration management for distributed software services.
Proceedings of the Integrated Network Management IV, 1995
1994
Policy Driven Management for Distributed Systems.
J. Netw. Syst. Manag., 1994
Security architecture for distributed systems.
Comput. Commun., 1994
1993
Monitoring distributed systems.
IEEE Netw., 1993
Policies Hierarchies for Distributed Systems Management.
IEEE J. Sel. Areas Commun., 1993
User and mechanism views of distributed systems management.
Distributed Syst. Eng., 1993
Domain Management and Accounting in an International Cellular Network.
Proceedings of the Integrated Network Management III, 1993
1992
Configuring object-based distributed programs in REX.
Softw. Eng. J., 1992
Configuring distributed systems.
Proceedings of the 5th ACM SIGOPS European Workshop: Models and Paradigms for Distributed Systems Structuring, 1992
1991
Content-Dependent Access Control.
ACM SIGOPS Oper. Syst. Rev., 1991
The representation of policies as system objects.
Proceedings of the Conference on Organizational Computing Systems, 1991
Using Domains for Specifying Management Policy.
Proceedings of the Operating Systems of the 90s and Beyond, International Workshop, 1991
1990
Specifying discretionary access control policy for distributed systems.
Comput. Commun., 1990
A Case Study in Representing a Model: to Z or not to Z?
Proceedings of the Z User Workshop, 1990
1989
Constructing Distributed Systems in Conic.
IEEE Trans. Software Eng., 1989
Configuration support for system description, construction and evolution.
Proceedings of the 5th International Workshop on Software Specification and Design, 1989
Verteilte Systeme und Rechnernetze.
Hanser Studienbücher, Hanser, ISBN: 978-3-446-15346-2, 1989
1988
The Source of Authority for Commercial Access Control.
Computer, 1988
Domain model of autonomy.
Proceedings of the 3rd ACM SIGOPS European Workshop: Autonomy or Interdependence in Distributed Systems? Cambridge, 1988
1987
Distributed System Construction: Experience with the Conic Toolkit.
Proceedings of the Experiences with Distributed Systems, 1987
Distributed systems and computer networks.
Prentice Hall International series in computer science, Prentice Hall, ISBN: 978-0-13-215849-7, 1987
1985
A Routing Algorithm for Interconnected Local Area Networks.
Comput. Networks, 1985
1984
A software architecture for distributed computer control systems.
Autom., 1984
1983
The CONIC Communication System for Distributed Process Control.
Proceedings of the Kommunikation in Verteilten Systemen, 1983
1981
Intertask Communication Primitives for Distributed Computer Control Systems.
Proceedings of the 2nd International Conference on Distributed Computing Systems, 1981