Understanding and improving computational science storage access through continuous characterization

P Carns, K Harms, W Allcock, C Bacon, S Lang… - ACM Transactions on …, 2011 - dl.acm.org
Computational science applications are driving a demand for increasingly powerful storage
systems. While many techniques are available for capturing the I/O behavior of individual …

Semantic Web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder

G Tonti, JM Bradshaw, R Jeffers, R Montanari… - The Semantic Web …, 2003 - Springer
Policies are being increasingly used for automated system management and controlling the
behavior of complex systems. The use of policies allows administrators to modify system …

A survey on policy languages in network and security management

W Han, C Lei - Computer Networks, 2012 - Elsevier
Policy-driven management is gaining popularity today, mainly due to the ever-growing scale
and complexity of large networked systems. In these systems, policies are usually used to …

Rainbow: cost-effective software architecture-based self-adaptation

SW Cheng - 2008 - search.proquest.com
Modern, complex software systems (e-commerce, IT, critical infrastructures, etc.) are
increasingly required to continue operation in the face of change, to self-adapt to …

A Case Study of Knowledge Management in Multiagency Consumer-InformedCommunities of Practice': Implications for Evidence-Based Policy Development in Health …

J Gabbay, A le May, H Jefferson, D Webb… - Health:, 2003 - journals.sagepub.com
We report a study that facilitated and evaluated two multiagency Communities of Practice
(CoPs) working on improving specific aspects of health and social services for older people …

Security and management policy specification

M Sloman, E Lupu - IEEE network, 2002 - ieeexplore.ieee.org
Policies are rules governing the choices in behavior of a system. They are increasingly
being used as a means of implementing flexible and adaptive systems for management of …

An adaptive policy-based framework for network services management

L Lymberopoulos, E Lupu, M Sloman - Journal of Network and systems …, 2003 - Springer
This paper presents a framework for specifying policies for the management of network
services. Although policy-based management has been the subject of considerable …

[BOOK][B] The practical handbook of internet computing

MP Singh - 2004 - taylorfrancis.com
The Practical Handbook of Internet Computing analyzes a broad array of technologies and
concerns related to the Internet, including corporate intranets. Fresh and insightful articles by …

Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization

JW Cutler, C Disselkoen, A Eline, S He… - Proceedings of the …, 2024 - dl.acm.org
Cedar is a new authorization policy language designed to be ergonomic, fast, safe, and
analyzable. Rather than embed authorization logic in an application's code, developers can …

访问控制模型研究进展及发展趋势

**凤华, 苏铓, 史国振, 马建峰 - 电子学报, 2012 - ejournal.org.cn
访问控制的任务是保证信息资源不被非法使用和访问, 冲突检测与消解主要解决不同信息系统
安全策略不统一的问题. 随着计算机和网络通信技术的发展, 先后出现了自主访问控制模型 …