Imperial College London

ProfessorMorrisSloman

Faculty of EngineeringDepartment of Computing

Emeritus Professor of Distributed Systems Management
 
 
 
//

Contact

 

m.sloman Website

 
 
//

Location

 

Huxley BuildingSouth Kensington Campus

//

Summary

 

Publications

Publication Type
Year
to

201 results found

Lupu E, Dulay N, Sventek J, Sloman Met al., 2007, Autonomous pervasive systems and the policy challenges of a small world!, 8th IEEE International Workshop on Policies for Distributed Systems and Networks, Pages: 3-7

Pervasive systems are the subject of intensifying research efforts and their applications range from health monitoring and intelligent homes, to location aware services, unmanned vehicles and city-wide pervasive infrastructures. Although application-specific solutions have been proposed, their design has often raised additional challenges. This paper discusses the use of Autonomous Pervasive Systems as a fertile testbed for policy-based adaptation and for integrating techniques that span across conventional subject boundaries. Additionally, we present the Self- Managed Cell architectural pattern for realizing policy-driven Autonomous Pervasive Systems and discuss the design of the Ponder2 policy service.

Conference paper

Asmare EA, Dulay N, Kim H, Lupu EC, Sloman Met al., 2006, Management Architecture and Mission Specification for Unmanned Autonomous Vehicles, Systems Engineering for Autonomous Systems Defence Technology Centre Conference, Edinburgh, UK

Conference paper

Strowes S, Badr N, Dulay N, Heeps S, Lupu EC, Sloman M, Sventek Jet al., 2006, An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health, Intl. Workshop on Distributed Event-Based Systems

Conference paper

Sloman M, Thomas M, Sparck-Jones K, Crowcroft J, Kwiatkowska M, Garner P, Jennings NR, Sassone V, O'Neill E, Wooldridge M, Maple C, Coulouris G, Chalmers Det al., 2006, Discussion on Robin!Milner's first <i>Computer Journal</i> Lecture:: Ubiquitous computing:: Shall we understand it?, COMPUTER JOURNAL, Vol: 49, Pages: 390-399, ISSN: 0010-4620

Journal article

Bandara A, Lupu EC, Russo A, Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou Get al., 2006, Policy Refinement for DiffServ Quality of Service Management (2006), 9th IFIP/IEEE Intl. Symp. on Integrated Management (IM 2005), Publisher: IEEE

Conference paper

Kamoda H, Yamaoka M, Matsuda S, Broda K, Sloman Met al., 2006, Access Control Policy Analysis Using Free Variable Tableaux, Information Processing Society of Japan (IPSJ)Digital Courier, Vol: 2, Pages: 207-221

Journal article

Charalambides M, Flegkas P, Pavlou G, Bandara A, Dulay N, Lupu EC, Rubio-Loyola J, Russo A, Sloman Met al., 2006, Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management (2006), IFIP/IEEE Network Operations and Management Symposium (NOMS 2006), Publisher: IEEE Computer Society

Conference paper

Bandara A, Lupu EC, Russo A, Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou Get al., 2006, Policy refinement for IP differentiated services Quality of Service management, IEEE Transactions on Network and Service Management, Vol: 3, Pages: 2-13, ISSN: 1932-4537

Policy-based management provides the ability to dynamically re-configure DiffServ networks such that desired Quality of Service (QoS) goals are achieved. This includes network provisioning decisions, performing admission control, and adapting bandwidth allocation dynamically. QoS management aims to satisfy the Service Level Agreements (SLAs) contracted by the provider and therefore QoS policies are derived from SLA specifications and the provider's business goals. This policy refinement is usually performed manually with no means of verifying that the policies written are supported by the network devices and actually achieve the desired QoS goals. Tool support is lacking and policy refinement has rarely been addressed in the literature. This paper extends our previous approach to policy refinement and shows how to apply it to the domain of DiffServ QoS management. We make use of goal elaboration and abductive reasoning to derive strategies that will achieve a given high-level goal. By combining these strategies with events and constraints, we show how policies can be refined, and what tool support can be provided for the refinement process using examples from the QoS management domain. The approach presented here can be used in other application domains such as storage area networks or security management.

Journal article

Münz G, Fessi A, Carle G, Paul O, Gabrijelcic D, Carlinet Y, Yusuf S, Sloman M, Sagmeister P, Dittmann G, van Lunteren Jet al., 2005, DIADEM Firewall: Web Server Overload Attack Detection and Response, Broadband Europe (BBEurope), Bordeaux, France

Conference paper

Dulay N, Lupu EC, Sloman M, Bacon J, Ingram D, Moody Ket al., 2005, CareGrid: Autonomous Trust Domains for Healthcare Applications

Journal article

Dulay N, Heeps S, Lupu EC, Sharma O, Sloman M, Sventek Jet al., 2005, Autonomic Management for Ubiquitous e-Health Systems, UK e-Science Programme All Hands Meeting 2005 (AHM2005)

Conference paper

Charalambides M, Flegkas P, Pavlou G, Bandara A, Lupu EC, Russo A, Dulay N, Sloman M, Rubio-Loyola Jet al., 2005, Policy Conflict Analysis for Quality of Service Management (2005), 6th IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2005)

Conference paper

Sventek J, Badr N, Dulay N, Heeps S, Lupu EC, Sloman Met al., 2005, Self-Managed Cells and their Federation, Intl. Workshop on Adaptive and Self-Managing Enterprise Applications (ASEA 05)

Conference paper

Yusuf S, Luk W, Sloman M, Dulay N, Lupu EC, Brown Get al., 2005, A combined hardware-software architecture for network flow analysis, Athens, International conference on engineering of reconfigurable systems and algorithms, 27 - 30 June 2005, Las Vegas, NV, Publisher: C S R e A Press, Pages: 149-155

Conference paper

Kamoda H, Yamaoka M, Matsuda S, Broda K, Sloman Met al., 2005, Policy Conflict Analysis Using free Variable Tableaux for Access Control in Web Services Environments, Policy Management for the Web, WWW2005 Workshop 14th International World Wide Web Conference, Pages: 5-12

Conference paper

Thing VLL, Lee HCJ, Sloman M, 2005, Traffic redirection attack protection system (TRAPS), 20th IFIP International Information Security Conference (SEC), Pages: 309-325

Conference paper

Yusuf S, Luk W, Sloman M, Dulay N, Lupu EC, Brown Get al., 2005, A combined hardware-software architecture for network flow analysis, International conference on engineering of reconfigurable Systems and Algorithms, Publisher: C S R e A Press, Pages: 149-155

Conference paper

Kamoda H, Yamaoka M, Hayakawa A, Matsuda S, Broda K, Sloman Met al., 2005, Policy Conflict Analysis Using Tableaux for On Demand VPN Framework, Sixth IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Pages: 565-569

Conference paper

Sloman M, 2005, Policy issues for pervasive systems, Amsterdam, 8th international workshop on feature interactions in telecommunications and software systems, 28 - 30 June 2005, Leicester, ENGLAND, Publisher: I O S Press, Pages: 31-34

Conference paper

Thing VLL, Lee HCJ, Sloman M, Zhou JYet al., 2005, Enhanced ICMP traceback with cumulative path, New York, 61st IEEE vehicular technology conference, Stockholm, Sweden, May 2005, Publisher: Ieee, Pages: 2415-2419

Conference paper

Dulay N, Lupu E, Sloman M, Sventek J, Badr N, Heeps Set al., 2005, Self-managed cells for ubiquitous systems, Berlin, 3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 25 - 27 September 2005, St.Petersburg, Russia, Publisher: Springer-Verlag, Pages: 1-6

Conference paper

Keoh SL, Lupu E, Sloman M, 2004, PEACE: a policy-based establishment of ad-hoc communities, 20th Annual Computer Security Applications conference (ACSAC), Publisher: IEEE Computer Society, Pages: 386-395, ISSN: 1063-9527

Conference paper

Chalmers D, Dulay N, Sloman M, 2004, Towards reasoning about context in the presence of uncertainty, 1st international workshop on advanced context modelling, reasoning and management, Pages: 1-6

Conference paper

Kashyap V, Bhargava B, Lilien L, Rosenthal A, Winslett M, Sloman M, Dillon TS, Chang E, Hussain FK, Nejdl W, Olmedilla Det al., 2004, The Pudding of Trust, IEEE INTELL SYST, Vol: 19, Pages: 85-88, ISSN: 1541-1672

Journal article

Sloman M, 2004, Trust-management in Internet and pervasive systems, IEEE INTELL SYST, Vol: 19, Pages: 77-79, ISSN: 1541-1672

Journal article

Chalmers D, Dulay N, Sloman M, 2004, A framework for contextual mediation in mobile and ubiquitous computing applied to the context-aware adaptation of maps, Personal and Ubiquitous Computing, Vol: 8, Pages: 1-18, ISSN: 1617-4909

Journal article

Lymberopoulos L, Lupu E, Sloman M, 2004, PONDER policy implementation and validation in a CIM and differentiated services framework, New York, 9th IEEE/IFIP network operations and management symposium (NOMS 2004), Seoul, South Korea, Publisher: IEEE, Pages: 31-44

Conference paper

Chalmers D, Dulay N, Sloman M, 2004, Meta data to support context aware mobile applications, Los Alamitos, IEEE international conference on mobile data management (MDM'04), Publisher: IEEE Computer Soc, Pages: 199-210

The greater sophistication and availability of mobile computing devices is enabling the application of computing to new tasks and applications to be experienced in a wide range of contexts. To facilitate such applications it is necessary to adapt the applications and the data they display to operate within the limitations of the context of use, take advantage of the strengths of the devices and best support the users in their tasks. A part of the solution to this issue is the description of the data available to the applications.Meta data may describe the structure and properties of information and data. We achieve this by separating the semantic elements of the information from the syntactic variants which realise them in order to form documents.In this paper we describe a new meta data model which can encode this description. We provide example meta data and illustrate how this may lead to better application usability than current simplistic or constrained approaches, through contextual mediation.

Conference paper

Sloman M, Lupu E, 2004, System management and security policy specification, Practical handbook of internet computing, Editors: Singh, Baton Rouge, Publisher: Chapman Hall \& CRC Press, Pages: 46-1-46-20, ISBN: 9781584883814

Book chapter

Lymberopoulos L, Lupu E, Sloman M, 2003, An adaptive policy-based framework for network services management, Journal of Network and Systems Management, Vol: 11, Pages: 277-303, ISSN: 1064-7570

Journal article

This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.

Request URL: http://wlsprd.imperial.ac.uk:80/respub/WEB-INF/jsp/search-html.jsp Request URI: /respub/WEB-INF/jsp/search-html.jsp Query String: limit=30&id=00005483&person=true&page=3&respub-action=search.html