Publications
272 results found
Charalambides M, Flegkas P, Pavlou G, et al., 2006, Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management (2006), IFIP/IEEE Network Operations and Management Symposium (NOMS 2006), Publisher: IEEE Computer Society
Charalambides M, Flegkas P, Pavlou G, et al., 2006, Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management (2006), IFIP/IEEE Network Operations and Management Symposium (NOMS 2006), Publisher: IEEE Computer Society
Charalambides M, Flegkas P, Pavlou G, et al., 2006, Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management (2006), IFIP/IEEE Network Operations and Management Symposium (NOMS 2006), Publisher: IEEE Computer Society
Bandara AK, Kakas A, Lupu EC, et al., 2006, Using argumentation logic for firewall policy specification and analysis, 17th IFIP/IEEE International Workshop on Distributed Systems - Operations and Management (DSOM 2006), Publisher: SPRINGER-VERLAG BERLIN, Pages: 185-196, ISSN: 0302-9743
- Author Web Link
- Cite
- Citations: 29
Bandara A, Lupu EC, Russo A, et al., 2006, Policy refinement for DiffServ quality of service management, IEEE eTransactions on Network and Service Management, Vol: 3, Pages: 2-13
Dulay N, Lupu EC, Sloman M, et al., 2005, CareGrid: Autonomous Trust Domains for Healthcare Applications
Dulay N, Heeps S, Lupu EC, et al., 2005, Autonomic Management for Ubiquitous e-Health Systems, UK e-Science Programme All Hands Meeting 2005 (AHM2005)
Dulay N, Heeps S, Lupu EC, et al., 2005, Autonomic Management for Ubiquitous e-Health Systems, UK e-Science Programme All Hands Meeting 2005 (AHM2005)
Arenas A, Djordjevic I, Claessens J, et al., 2005, Trust and Security in Virtual Organisations, 6th IFIP Working Conference on Virtual Enterprises (PRO-VE 2005)
Svirskas A, Wilson H, Arenas A, et al., 2005, Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures, First IEEE International Workshop on Service oriented Solutions for Cooperative Organizations (SoS4CO '05), Munich, Germany
Yusuf S, Luk W, Sloman M, et al., 2005, A combined hardware-software architecture for network flow analysis, Athens, International conference on engineering of reconfigurable systems and algorithms, 27 - 30 June 2005, Las Vegas, NV, Publisher: C S R e A Press, Pages: 149-155
Sventek J, Badr N, Dulay N, et al., 2005, Self-Managed Cells and their Federation, Intl. Workshop on Adaptive and Self-Managing Enterprise Applications (ASEA 05)
Sventek J, Badr N, Dulay N, et al., 2005, Self-Managed Cells and their Federation, Intl. Workshop on Adaptive and Self-Managing Enterprise Applications (ASEA 05)
Charalambides M, Flegkas P, Pavlou G, et al., 2005, Policy Conflict Analysis for Quality of Service Management (2005), 6th IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2005)
Charalambides M, Flegkas P, Pavlou G, et al., 2005, Policy Conflict Analysis for Quality of Service Management (2005), 6th IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2005)
Bandara A, Lupu EC, Russo A, et al., 2005, Policy Refinement for DiffServ Quality of Service Management (2005), 9th IFIP/IEEE Intl. Symp. on Integrated Management (IM 2005)
Kakas A, Bandara AK, Russo A, et al., 2005, Reasoning techniques for analysis and refinement of policies for service management, Departmental Technical Report: 05/7, Publisher: Department of Computing, Imperial College London, 05/7
The work described in this technical report falls under the general problem of developingmethods that would allow us to engineer software systems that are reliable and would offer acertain acceptable level of quality in their operation. This report shows how the analysis andrefinement of policies for Quality of Service can be carried out within logic by exploiting formsof abductive and argumentative reasoning. In particular, it provides two main contributions. Thefirst is an extension of earlier work on the use of abductive reasoning for automatic policyrefinement by exploiting the use of integrity constraints within abduction and its integration withconstraint solving. This has allowed us to enhance this refinement process in various ways, e.g.supporting parameter values derivation to quantify abstract refinement to specific policies readyto be put in operation, and calculating utility values to determine optimal refined policies. Thesecond contribution is a new approach for modelling and formulating Quality of Service policies,and more general policies for software requirements, as preference policies within logicalframeworks of argumentation. This is shown to be a flexible and declarative approach to theanalysis of such policies through high-level semantic queries of argumentation, demonstratedhere for the particular case of network firewall policies where the logical framework ofargumentation allows us to detect anomalies in the firewalls and facilitates the process of theirresolution. To our knowledge this is the first time that the link between argumentation and thespecification and analysis of requirement policies has been studied.
Yusuf S, Luk W, Sloman M, et al., 2005, A combined hardware-software architecture for network flow analysis, International conference on engineering of reconfigurable Systems and Algorithms, Publisher: C S R e A Press, Pages: 149-155
Dulay N, Lupu E, Sloman M, et al., 2005, Self-managed cells for ubiquitous systems, Berlin, 3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 25 - 27 September 2005, St.Petersburg, Russia, Publisher: Springer-Verlag, Pages: 1-6
Keoh SL, Lupu E, 2005, An efficient access control model for mobile ad-hoc communities, Berlin, 2nd international conference on security in pervasive computing, Boppard, Germany, 6 - 8 April 2005, Publisher: Springer-Verlag Berlin, Pages: 210-224
Arenas AE, Djordjevic I, Dimitrakos T, et al., 2005, Toward web services profiles for trust and security in Virtual Organisations, 6th Working Conference on Virtual Enterprises, Publisher: SPRINGER, Pages: 175-182, ISSN: 1571-5736
- Author Web Link
- Cite
- Citations: 2
Dulay N, Lupu E, Sloman M, et al., 2005, Self-managed cells for ubiquitous systems, Berlin, 3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 25 - 27 September 2005, St.Petersburg, Russia, Publisher: Springer-Verlag, Pages: 1-6
Keoh SL, Lupu E, Sloman M, 2004, PEACE: a policy-based establishment of ad-hoc communities, 20th Annual Computer Security Applications conference (ACSAC), Publisher: IEEE Computer Society, Pages: 386-395, ISSN: 1063-9527
Montanari R, Lupu E, Stefanelli C, 2004, Policy-based dynamic reconfiguration of mobile-code applications (vol 37, pg 73, 2004), COMPUTER, Vol: 37, Pages: 7-7, ISSN: 0018-9162
- Author Web Link
- Cite
- Citations: 3
Montanari R, Lupu E, Stefanelli C, 2004, Policy-based dynamic reconfiguration of mobile-code applications, COMPUTER, Vol: 37, Pages: 73-+, ISSN: 0018-9162
- Author Web Link
- Cite
- Citations: 10
Bandara A, Lupu E, Russo A, et al., 2004, A goal-based approach to policy refinement (2004), 5th IEEE international workshop on policies for distributed systems and networks (POLICY 2004), IBM T J Watson Res Lab, Yorktown Heights, NY, Publisher: IEEE Computer Soc
Sloman M, Lupu E, 2004, System management and security policy specification, Practical handbook of internet computing, Editors: Singh, Baton Rouge, Publisher: Chapman Hall \& CRC Press, Pages: 46-1-46-20, ISBN: 9781584883814
Lupu E, Kohli M, 2004, Proceedings of the 5th IEEE international workshop on policies for distributed systems and networks, New York, Publisher: IEEE CS Press, ISBN: 9780769521411
Bandara AK, Lupu EC, Moffett J, et al., 2004, A goal-based approach to policy refinement, Los Alamitos, 5th IEEE international workshop on policies for distributed systems and networks (POLICY 2004), IBM T J Watson Res Lab, Yorktown Heights, NY, Publisher: IEEE Computer Soc, Pages: 229-239
Sloman M, Lupu E, 2004, Security and management policy specification, Practical handbook of internet computing, Editors: Singh, Publisher: CRC Press
This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.