Imperial College London

Professor Emil Lupu

Faculty of EngineeringDepartment of Computing

Professor of Computer Systems
 
 
 
//

Contact

 

e.c.lupu Website

 
 
//

Location

 

564Huxley BuildingSouth Kensington Campus

//

Summary

 

Publications

Publication Type
Year
to

233 results found

Sventek J, Badr N, Dulay N, Heeps S, Lupu EC, Sloman Met al., 2005, Self-Managed Cells and their Federation, Intl. Workshop on Adaptive and Self-Managing Enterprise Applications (ASEA 05)

Conference paper

Sventek J, Badr N, Dulay N, Heeps S, Lupu EC, Sloman Met al., 2005, Self-Managed Cells and their Federation, Intl. Workshop on Adaptive and Self-Managing Enterprise Applications (ASEA 05)

Conference paper

Bandara A, Lupu EC, Russo A, Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou Get al., 2005, Policy Refinement for DiffServ Quality of Service Management (2005), 9th IFIP/IEEE Intl. Symp. on Integrated Management (IM 2005)

Conference paper

Yusuf S, Luk W, Sloman M, Dulay N, Lupu EC, Brown Get al., 2005, A combined hardware-software architecture for network flow analysis, International conference on engineering of reconfigurable Systems and Algorithms, Publisher: C S R e A Press, Pages: 149-155

Conference paper

Arenas AE, Djordjevic I, Dimitrakos T, Titkov L, Claessens J, Geuer-Pollmann C, Lupu EC, Tuptuk N, Wesner S, Schubert Let al., 2005, Toward web services profiles for trust and security in Virtual Organisations, 6th Working Conference on Virtual Enterprises, Publisher: SPRINGER, Pages: 175-182, ISSN: 1571-5736

Conference paper

Dulay N, Lupu E, Sloman M, Sventek J, Badr N, Heeps Set al., 2005, Self-managed cells for ubiquitous systems, Berlin, 3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 25 - 27 September 2005, St.Petersburg, Russia, Publisher: Springer-Verlag, Pages: 1-6

Conference paper

Dulay N, Lupu E, Sloman M, Sventek J, Badr N, Heeps Set al., 2005, Self-managed cells for ubiquitous systems, Berlin, 3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 25 - 27 September 2005, St.Petersburg, Russia, Publisher: Springer-Verlag, Pages: 1-6

Conference paper

Keoh SL, Lupu E, 2005, An efficient access control model for mobile ad-hoc communities, Berlin, 2nd international conference on security in pervasive computing, Boppard, Germany, 6 - 8 April 2005, Publisher: Springer-Verlag Berlin, Pages: 210-224

Conference paper

Keoh SL, Lupu E, Sloman M, 2004, PEACE: a policy-based establishment of ad-hoc communities, 20th Annual Computer Security Applications conference (ACSAC), Publisher: IEEE Computer Society, Pages: 386-395, ISSN: 1063-9527

Conference paper

Montanari R, Lupu E, Stefanelli C, 2004, Policy-based dynamic reconfiguration of mobile-code applications (vol 37, pg 73, 2004), COMPUTER, Vol: 37, Pages: 7-7, ISSN: 0018-9162

Journal article

Montanari R, Lupu E, Stefanelli C, 2004, Policy-based dynamic reconfiguration of mobile-code applications, COMPUTER, Vol: 37, Pages: 73-+, ISSN: 0018-9162

Journal article

Bandara A, Lupu E, Russo A, Moffett Jet al., 2004, A goal-based approach to policy refinement (2004), 5th IEEE international workshop on policies for distributed systems and networks (POLICY 2004), IBM T J Watson Res Lab, Yorktown Heights, NY, Publisher: IEEE Computer Soc

Conference paper

Lymberopoulos L, Lupu E, Sloman M, 2004, PONDER policy implementation and validation in a CIM and differentiated services framework, New York, 9th IEEE/IFIP network operations and management symposium (NOMS 2004), Seoul, South Korea, Publisher: IEEE, Pages: 31-44

Conference paper

Lupu E, Kohli M, 2004, Proceedings of the 5th IEEE international workshop on policies for distributed systems and networks, New York, Publisher: IEEE CS Press, ISBN: 9780769521411

Book

Sloman M, Lupu E, 2004, System management and security policy specification, Practical handbook of internet computing, Editors: Singh, Baton Rouge, Publisher: Chapman Hall \& CRC Press, Pages: 46-1-46-20, ISBN: 9781584883814

Book chapter

Sloman M, Lupu E, 2004, Security and management policy specification, Practical handbook of internet computing, Editors: Singh, Publisher: CRC Press

Book chapter

Bandara AK, Lupu EC, Moffett J, Russo Aet al., 2004, A goal-based approach to policy refinement, Los Alamitos, 5th IEEE international workshop on policies for distributed systems and networks (POLICY 2004), IBM T J Watson Res Lab, Yorktown Heights, NY, Publisher: IEEE Computer Soc, Pages: 229-239

Conference paper

Lymberopoulos L, Lupu E, Sloman M, 2004, PONDER policy implementation and validation in a CIM and differentiated services framework, New York, 9th IEEE/IFIP network operations and management symposium (NOMS 2004), Seoul, South Korea, Publisher: IEEE, Pages: 31-44

Conference paper

Lymberopoulos L, Lupu E, Sloman M, 2003, An adaptive policy-based framework for network services management, Journal of Network and Systems Management, Vol: 11, Pages: 277-303, ISSN: 1064-7570

Journal article

Lymberopoulos LA, Sloman M, Lupu EC, 2003, Using CIM to realize policy validation within the ponder framework (Prize winning paper in the Academic Alliance Competition), DMTF global management conference

The validation of policy is necessary to ensure that it will lead to a feasible implementation for the environment. This requires checking that the policy is consistent with the functional or resource constraints within the target environment. For example, do the policies assume functionality or specific operations, which do not exist in the target routers, or bandwidth in excess of the capacity of the data links? The objective is to support static checking, where possible, prior to deployment in order to detect invalid policies at design time. However there are some policies related to resource allocation that depend on the current state of the system, and require policy constraints that must be checked at execution time. In this paper, we will discuss how CIM can be used within the Ponder Policy Framework to validate network policies that apply to a Differentiated Services (DiffServ) domain against the capabilities of the individual network elements that comprise the DiffServ domain.

Conference paper

Bandara AK, Lupu EC, Russo A, 2003, Using event calculus to formalise policy speciflcation and analysis, Los Alamitos, 4th IEEE international workshop on policies for distributed systems and networks, Lake Como, Italy, 2003, Publisher: IEEE Computer Soc, Pages: 26-39

Conference paper

Lymberopoulos L, Sloman M, Lupu EC, 2003, Using CIM to realize policy validation within the ponder framework, DMTF global management conference, San-Jose, California

Conference paper

Lee TK, Yusuf S, Luk W, Sloman M, Lupu E, Dulay Net al., 2003, Irregular reconfigurable CAM structures for firewall applications, Berlin, 13th international conference on field-programmable logic and applications (FPL 2003), Lisbon, Portugal, Publisher: Springer-Verlag, Pages: 890-899

Conference paper

Lymberopoulos L, Lupu E, Sloman M, 2003, An adaptive policy-based framework for network services management, Journal of Network and Systems Management, Vol: 11, Pages: 277-303, ISSN: 1064-7570

Journal article

Lupu E, Dulay N, Damianou N, Sloman Met al., 2003, Structuring devolved responsibility in network and systems management, Multimedia management, Editors: Neuman de Souza, Agoulmine, Neuman de Souza, Agoulmine, Publisher: Kogan Page Science, Pages: 34-49, ISBN: 9781903996232

Book chapter

Lee TK, Yusuf S, Luk W, Sloman M, Lupu E, Dulay Net al., 2003, Compiling policy descriptions into reconfigurable firewall processors, Los Alamitos, 11th annual IEEE symposium on field-programmable custom computing machines (FCCM 2003), Napa, California, Publisher: IEEE Computer Soc, Pages: 39-48

Conference paper

Lee TK, Yusuf S, Luk W, Sloman M, Lupu E, Dulay Net al., 2003, Irregular reconfigurable CAM structures for firewall applications, Berlin, 13th international conference on field-programmable logic and applications (FPL 2003), Lisbon, Portugal, Publisher: Springer-Verlag, Pages: 890-899

Conference paper

Pandya D, Jain R, Lupu E, 2003, Indoor location estimation using multiple wireless technologies, Beijing, 14th IEEE international symposium on personal, indoor and mobile radio communications, Publisher: Publishing House Electronics Industry, Pages: 2208-2212

Conference paper

Lee TK, Yusuf S, Luk W, Sloman M, Lupu E, Dulay Net al., 2003, Irregular reconfigurable CAM structures for firewall applications, Berlin, 13th international conference on field-programmable logic and applications (FPL 2003), Lisbon, Portugal, Publisher: Springer-Verlag, Pages: 890-899

Conference paper

Lee TK, Yusuf S, Luk W, Sloman M, Lupu E, Dulay Net al., 2003, Compiling policy descriptions into reconfigurable firewall processors, Los Alamitos, 11th annual IEEE symposium on field-programmable custom computing machines (FCCM 2003), Napa, California, Publisher: IEEE Computer Soc, Pages: 39-48

Conference paper

This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.

Request URL: http://wlsprd.imperial.ac.uk:80/respub/WEB-INF/jsp/search-html.jsp Request URI: /respub/WEB-INF/jsp/search-html.jsp Query String: limit=30&id=00155030&person=true&page=6&amp%3bid=00155030&amp%3brespub-action=search.html&amp%3bperson=true&respub-action=search.html&amp%3bpage=8