IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
Configuring policies in public health applications
Expert Systems with Applications: An International Journal
Implementation of a Formal Security Policy Refinement Process in WBEM Architecture
Journal of Network and Systems Management
Wireless Personal Communications: An International Journal
Policy decomposition for collaborative access control
Proceedings of the 13th ACM symposium on Access control models and technologies
The policy continuum-Policy authoring and conflict analysis
Computer Communications
Strategy-Trees: A Feedback Based Approach to Policy Management
MACE '08 Proceedings of the 3rd IEEE international workshop on Modelling Autonomic Communications Environments
Achieving Self-management in a Distributed System of Autonomic BUT Social Entities
MACE '08 Proceedings of the 3rd IEEE international workshop on Modelling Autonomic Communications Environments
Compositional Refinement of Policies in UML --- Exemplified for Access Control
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Towards policy-based management of sensor networks
Proceedings of the 3rd international workshop on Middleware for sensor networks
Idea: Action Refinement for Security Properties Enforcement
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
International Journal of Autonomic Computing
A policy-based framework for autonomic reconfiguration management in heterogeneous networks
Proceedings of the 7th International Conference on Mobile and Ubiquitous Multimedia
Multi-agent Reinforcement Learning in Network Management
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
A pattern-driven security advisor for service-oriented architectures
Proceedings of the 2009 ACM workshop on Secure web services
A formal logic approach to firewall packet filtering analysis and generation
Artificial Intelligence Review
One Is Not Enough: A Hybrid Approach for IT Change Planning
DSOM '09 Proceedings of the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Integrated Management of Systems, Services, Processes and People in IT
Goal-Based Service Creation Using Autonomic Entities
MACE '09 Proceedings of the 4th IEEE International Workshop on Modelling Autonomic Communications Environments
Achieving High-Level Directives Using Strategy-Trees
MACE '09 Proceedings of the 4th IEEE International Workshop on Modelling Autonomic Communications Environments
A policy-based sensor selection system with goal oriented singular value decomposition technique
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Model-based refinement of security policies in collaborative virtual organisations
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
Ontology-based policy refinement using SWRL rules for management information definitions in OWL
DSOM'06 Proceedings of the 17th IFIP/IEEE international conference on Distributed Systems: operations and management
Security requirements model for grid data management systems
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Initial approach toward self-configuration and self-optimization in IP networks
MMNS'05 Proceedings of the 8th international conference on Management of Multimedia Networks and Services
Survey Paper: A survey on policy languages in network and security management
Computer Networks: The International Journal of Computer and Telecommunications Networking
An automatic policy refinement mechanism for policy-driven grid service systems
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Deriving implementation-level policies for usage control enforcement
Proceedings of the second ACM conference on Data and Application Security and Privacy
Policy refinement: decomposition and operationalization for dynamic domains
Proceedings of the 7th International Conference on Network and Services Management
Managing a SaaS application in the cloud using PaaS policy sets and a strategy-tree
Proceedings of the 7th International Conference on Network and Services Management
Semantic-Based policy engineering for autonomic systems
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
An approach to understanding policy based on autonomy and voluntary cooperation
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Model-Based usage control policy derivation
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Hi-index | 0.00 |
Policy Based Management (PBM) is a research topicthat has been driven by the tremendous complexityinherent in the administration and management ofpresent-day networking and telecommunications systemsand services. The increasingly diverse organisationalforms ...