Publications
201 results found
Lupu E, Dulay N, Sventek J, et al., 2007, Autonomous pervasive systems and the policy challenges of a small world!, 8th IEEE International Workshop on Policies for Distributed Systems and Networks, Pages: 3-7
Pervasive systems are the subject of intensifying research efforts and their applications range from health monitoring and intelligent homes, to location aware services, unmanned vehicles and city-wide pervasive infrastructures. Although application-specific solutions have been proposed, their design has often raised additional challenges. This paper discusses the use of Autonomous Pervasive Systems as a fertile testbed for policy-based adaptation and for integrating techniques that span across conventional subject boundaries. Additionally, we present the Self- Managed Cell architectural pattern for realizing policy-driven Autonomous Pervasive Systems and discuss the design of the Ponder2 policy service.
Asmare EA, Dulay N, Kim H, et al., 2006, Management Architecture and Mission Specification for Unmanned Autonomous Vehicles, Systems Engineering for Autonomous Systems Defence Technology Centre Conference, Edinburgh, UK
Strowes S, Badr N, Dulay N, et al., 2006, An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health, Intl. Workshop on Distributed Event-Based Systems
Sloman M, Thomas M, Sparck-Jones K, et al., 2006, Discussion on Robin!Milner's first <i>Computer Journal</i> Lecture:: Ubiquitous computing:: Shall we understand it?, COMPUTER JOURNAL, Vol: 49, Pages: 390-399, ISSN: 0010-4620
- Author Web Link
- Cite
- Citations: 2
Bandara A, Lupu EC, Russo A, et al., 2006, Policy Refinement for DiffServ Quality of Service Management (2006), 9th IFIP/IEEE Intl. Symp. on Integrated Management (IM 2005), Publisher: IEEE
Kamoda H, Yamaoka M, Matsuda S, et al., 2006, Access Control Policy Analysis Using Free Variable Tableaux, Information Processing Society of Japan (IPSJ)Digital Courier, Vol: 2, Pages: 207-221
Charalambides M, Flegkas P, Pavlou G, et al., 2006, Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management (2006), IFIP/IEEE Network Operations and Management Symposium (NOMS 2006), Publisher: IEEE Computer Society
Bandara A, Lupu EC, Russo A, et al., 2006, Policy refinement for IP differentiated services Quality of Service management, IEEE Transactions on Network and Service Management, Vol: 3, Pages: 2-13, ISSN: 1932-4537
Policy-based management provides the ability to dynamically re-configure DiffServ networks such that desired Quality of Service (QoS) goals are achieved. This includes network provisioning decisions, performing admission control, and adapting bandwidth allocation dynamically. QoS management aims to satisfy the Service Level Agreements (SLAs) contracted by the provider and therefore QoS policies are derived from SLA specifications and the provider's business goals. This policy refinement is usually performed manually with no means of verifying that the policies written are supported by the network devices and actually achieve the desired QoS goals. Tool support is lacking and policy refinement has rarely been addressed in the literature. This paper extends our previous approach to policy refinement and shows how to apply it to the domain of DiffServ QoS management. We make use of goal elaboration and abductive reasoning to derive strategies that will achieve a given high-level goal. By combining these strategies with events and constraints, we show how policies can be refined, and what tool support can be provided for the refinement process using examples from the QoS management domain. The approach presented here can be used in other application domains such as storage area networks or security management.
Münz G, Fessi A, Carle G, et al., 2005, DIADEM Firewall: Web Server Overload Attack Detection and Response, Broadband Europe (BBEurope), Bordeaux, France
Dulay N, Lupu EC, Sloman M, et al., 2005, CareGrid: Autonomous Trust Domains for Healthcare Applications
Dulay N, Heeps S, Lupu EC, et al., 2005, Autonomic Management for Ubiquitous e-Health Systems, UK e-Science Programme All Hands Meeting 2005 (AHM2005)
Charalambides M, Flegkas P, Pavlou G, et al., 2005, Policy Conflict Analysis for Quality of Service Management (2005), 6th IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2005)
Sventek J, Badr N, Dulay N, et al., 2005, Self-Managed Cells and their Federation, Intl. Workshop on Adaptive and Self-Managing Enterprise Applications (ASEA 05)
Yusuf S, Luk W, Sloman M, et al., 2005, A combined hardware-software architecture for network flow analysis, Athens, International conference on engineering of reconfigurable systems and algorithms, 27 - 30 June 2005, Las Vegas, NV, Publisher: C S R e A Press, Pages: 149-155
Kamoda H, Yamaoka M, Matsuda S, et al., 2005, Policy Conflict Analysis Using free Variable Tableaux for Access Control in Web Services Environments, Policy Management for the Web, WWW2005 Workshop 14th International World Wide Web Conference, Pages: 5-12
Thing VLL, Lee HCJ, Sloman M, 2005, Traffic redirection attack protection system (TRAPS), 20th IFIP International Information Security Conference (SEC), Pages: 309-325
Yusuf S, Luk W, Sloman M, et al., 2005, A combined hardware-software architecture for network flow analysis, International conference on engineering of reconfigurable Systems and Algorithms, Publisher: C S R e A Press, Pages: 149-155
Kamoda H, Yamaoka M, Hayakawa A, et al., 2005, Policy Conflict Analysis Using Tableaux for On Demand VPN Framework, Sixth IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Pages: 565-569
Sloman M, 2005, Policy issues for pervasive systems, Amsterdam, 8th international workshop on feature interactions in telecommunications and software systems, 28 - 30 June 2005, Leicester, ENGLAND, Publisher: I O S Press, Pages: 31-34
Thing VLL, Lee HCJ, Sloman M, et al., 2005, Enhanced ICMP traceback with cumulative path, New York, 61st IEEE vehicular technology conference, Stockholm, Sweden, May 2005, Publisher: Ieee, Pages: 2415-2419
Dulay N, Lupu E, Sloman M, et al., 2005, Self-managed cells for ubiquitous systems, Berlin, 3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 25 - 27 September 2005, St.Petersburg, Russia, Publisher: Springer-Verlag, Pages: 1-6
Keoh SL, Lupu E, Sloman M, 2004, PEACE: a policy-based establishment of ad-hoc communities, 20th Annual Computer Security Applications conference (ACSAC), Publisher: IEEE Computer Society, Pages: 386-395, ISSN: 1063-9527
Chalmers D, Dulay N, Sloman M, 2004, Towards reasoning about context in the presence of uncertainty, 1st international workshop on advanced context modelling, reasoning and management, Pages: 1-6
Kashyap V, Bhargava B, Lilien L, et al., 2004, The Pudding of Trust, IEEE INTELL SYST, Vol: 19, Pages: 85-88, ISSN: 1541-1672
Sloman M, 2004, Trust-management in Internet and pervasive systems, IEEE INTELL SYST, Vol: 19, Pages: 77-79, ISSN: 1541-1672
Chalmers D, Dulay N, Sloman M, 2004, A framework for contextual mediation in mobile and ubiquitous computing applied to the context-aware adaptation of maps, Personal and Ubiquitous Computing, Vol: 8, Pages: 1-18, ISSN: 1617-4909
Lymberopoulos L, Lupu E, Sloman M, 2004, PONDER policy implementation and validation in a CIM and differentiated services framework, New York, 9th IEEE/IFIP network operations and management symposium (NOMS 2004), Seoul, South Korea, Publisher: IEEE, Pages: 31-44
Chalmers D, Dulay N, Sloman M, 2004, Meta data to support context aware mobile applications, Los Alamitos, IEEE international conference on mobile data management (MDM'04), Publisher: IEEE Computer Soc, Pages: 199-210
The greater sophistication and availability of mobile computing devices is enabling the application of computing to new tasks and applications to be experienced in a wide range of contexts. To facilitate such applications it is necessary to adapt the applications and the data they display to operate within the limitations of the context of use, take advantage of the strengths of the devices and best support the users in their tasks. A part of the solution to this issue is the description of the data available to the applications.Meta data may describe the structure and properties of information and data. We achieve this by separating the semantic elements of the information from the syntactic variants which realise them in order to form documents.In this paper we describe a new meta data model which can encode this description. We provide example meta data and illustrate how this may lead to better application usability than current simplistic or constrained approaches, through contextual mediation.
Sloman M, Lupu E, 2004, System management and security policy specification, Practical handbook of internet computing, Editors: Singh, Baton Rouge, Publisher: Chapman Hall \& CRC Press, Pages: 46-1-46-20, ISBN: 9781584883814
Lymberopoulos L, Lupu E, Sloman M, 2003, An adaptive policy-based framework for network services management, Journal of Network and Systems Management, Vol: 11, Pages: 277-303, ISSN: 1064-7570
This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.