메뉴 건너뛰기




Volumn , Issue , 2006, Pages 108-113

Generic support for policy-based self-adaptive systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTONOMIC COMPUTING SYSTEM; DEPLOYMENT SCENARIOS; ENVIRONMENTAL CONDITIONS; MULTIPLE CONFIGURATIONS; SELF ADAPTATION; SELF-ADAPTIVE SYSTEM; STATE OF PRACTICE; STOCK TRADING SYSTEM;

EID: 84862060700     PISSN: 15294188     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (14)
  • 1
    • 13944254796 scopus 로고    scopus 로고
    • Design and demonstration of policy-based management in a multi-hop ad hoc network
    • Elsevier B.V. 2005
    • K. Phanse, L. DaSilva, and S. Midkiff, "Design and demonstration of policy-based management in a multi-hop ad hoc network", Ad Hoc Networks, 3(2005), Elsevier B.V., 2005, pp. 389-401.
    • (2005) Ad Hoc Networks , vol.3 , pp. 389-401
    • Phanse, K.1    Dasilva, L.2    Midkiff, S.3
  • 2
    • 4444369795 scopus 로고    scopus 로고
    • A simulated annealing approach for multimedia data placement
    • Elsevier Inc
    • E. Terzi, A. Vakali, and L. Angelis, "A simulated annealing approach for multimedia data placement", The Journal of Systems and Software, 73, Elsevier Inc, 2004, pp. 467-480.
    • (2004) The Journal of Systems and Software , vol.73 , pp. 467-480
    • Terzi, E.1    Vakali, A.2    Angelis, L.3
  • 5
    • 34247616511 scopus 로고    scopus 로고
    • IBM Research, Policy technologies. http://www.research.ibm.com/ policytechnologies/.
    • Policy Technologies
  • 9
    • 9944222487 scopus 로고    scopus 로고
    • Dynamic security reconfiguration for the semantic web
    • Elsevier Ltd, 2004
    • J. Tan, and S. Poslad, "Dynamic security reconfiguration for the semantic web", Engineering Applications of Artificial Intelligence, 17(2004), Elsevier Ltd, 2004, pp. 783-797.
    • (2004) Engineering Applications of Artificial Intelligence , vol.17 , pp. 783-797
    • Tan, J.1    Poslad, S.2
  • 11
    • 0033724294 scopus 로고    scopus 로고
    • Access control meets public key infrastructure, or: Assigning roles to strangers
    • IEEE, California, USA, May
    • A. Herzberg, Y. Mass, J. Michaeli, and Y. Ravid, "Access control meets public key infrastructure, Or: assigning roles to strangers", Symposium on Security and Privacy, IEEE, California, USA, May 2000, pp. 2-14.
    • (2000) Symposium on Security and Privacy , pp. 2-14
    • Herzberg, A.1    Mass, Y.2    Michaeli, J.3    Ravid, Y.4
  • 12
    • 84944048132 scopus 로고    scopus 로고
    • The ponder policy specification language
    • M. Sloman, J. Lobo, E. Lupu (Eds), Springer, Berlin
    • N. Damianou, N. Dulay, E. Lupu, and M. Sloman, "The Ponder policy specification language", In: M. Sloman, J. Lobo, E. Lupu (Eds), Policies for Distributed Systems and Networks, Springer, Berlin, 2001, pp. 18-38.
    • (2001) Policies for Distributed Systems and Networks , pp. 18-38
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 13
    • 84890413203 scopus 로고    scopus 로고
    • Available at
    • XACML standard. Available at http://www.oasisopen.org/comittees/xacml.
    • XACML Standard
  • 14
    • 84944043577 scopus 로고    scopus 로고
    • Monitors for history-based policies
    • M. Sloman, J. Lobo, E. Lupu (Eds), Springer, Berlin
    • J. Chomicki, and J. Lobo, "Monitors for history-based policies", In: M. Sloman, J. Lobo, E. Lupu (Eds), Policies for Distributed Systems and Networks, Springer, Berlin, 2001, pp. 57-72.
    • (2001) Policies for Distributed Systems and Networks , pp. 57-72
    • Chomicki, J.1    Lobo, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.