Morris Sloman
YOU?
Author Swipe
View article: Secure Distributed Self Management Framework for UXVs
Secure Distributed Self Management Framework for UXVs Open
03.12.12 KB. Accepted version of conference paper ok to add copyright with authors.(confirmed by Prof. Sloman)
View article: Policy refinement: Decomposition and operationalization for dynamic domains
Policy refinement: Decomposition and operationalization for dynamic domains Open
We describe a method for policy refinement. The refinement process involves stages of decomposition, operationalization, deployment and re-refinement, and operates on policies expressed in a logical language flexible enough to be translate…
View article: Using CIM to realize policy validation within the ponder framework (Prize winning paper in the Academic Alliance Competition)
Using CIM to realize policy validation within the ponder framework (Prize winning paper in the Academic Alliance Competition) Open
The validation of policy is necessary to ensure that it will lead to a feasible implementation for the environment. This requires checking that the policy is consistent with the functional or resource constraints within the target environm…
View article: Adaptive response system for distributed denial-of-service attacks
Adaptive response system for distributed denial-of-service attacks Open
The continued prevalence and severe damaging effects of the Distributed Denial of Service (DDoS) attacks in today’s Internet raise growing security concerns and call for an immediate response to come up with better solutions to tackle DDoS…
View article: Diadem Firewall: Web Server Overload Attack Detection and Response
Diadem Firewall: Web Server Overload Attack Detection and Response Open
High-profile web servers often become the victim of web server overload Distributed Denial-of-Service (DDoS) attacks. Motivations of such attacks range from technical challenge (e.g. script kiddies) to financial profit (e.g. blackmailing t…
View article: Realising management and composition of Self-Managed Cells in pervasive healthcare
Realising management and composition of Self-Managed Cells in pervasive healthcare Open
Research in pervasive and autonomic computing focuses on supporting services for pervasive applications, but often ignores how such applications can be realised through the federation of autonomous entities. In this paper we propose a meth…
View article: Vesta: A secure and autonomic system for pervasive healthcare
Vesta: A secure and autonomic system for pervasive healthcare Open
The proliferation of low-power wireless communications and handheld devices has facilitated the development of pervasive systems for healthcare applications. This paper describes a body sensor network comprising a personal controller, vari…
View article: Ubiquitous Computing: Experience, Design and Science
Ubiquitous Computing: Experience, Design and Science Open
The emergence of powerful digital infrastructures, wireless networks and mobile devices has already started to move computing away from the desktop and embed it in the public spaces, architectures, furniture and personal fabric of everyday…
View article: Access Control Policy Analysis Using Free Variable Tableaux
Access Control Policy Analysis Using Free Variable Tableaux Open
The specification of access control policies for large, multi-organization applications is difficult and error-prone. Sophisticated policies are needed for fine-grained control of access to large numbers of entities, resulting in many poli…
View article: Self-Managed Cells and their Federation.
Self-Managed Cells and their Federation. Open
Future e-Health systems will consist of low-power, on-body wireless sensors attached to mobile users that interact with a ubiquitous computing environment. This kind of system needs to be able to configure itself with little or no user inp…
View article: Towards reasoning about context in the presence of uncertainty
Towards reasoning about context in the presence of uncertainty Open
In this paper we show how the relationships between real world actors and contextual information can be formulated in the presence of uncertainty. In particular, we show how relationship functions can be defined for uncertain numerical con…
View article: Management policy service for distributed systems
Management policy service for distributed systems Open
Interpreting policy in automated managers facilitates the dynamic change of behaviour of a distributed management system by simply changing policies. This paper describes a management policy notation which can be used to define both author…
View article: Context-Based Specifications for Data Mediation to Support Mobile Systems
Context-Based Specifications for Data Mediation to Support Mobile Systems Open
Application level adaptation is widely cited as a practical response to the variation in context which mobile and ubiquitous computing are subject to. One approach to adaptability is to mediate the data downloaded and presented to the user…
View article: GEM: a generalized event monitoring language for distributed systems
GEM: a generalized event monitoring language for distributed systems Open
Event-based monitoring is critical for managing and debugging networks and distributed systems. This paper presents GEM - an interpreted generalized event monitoring language. It allows high-level, abstract events to be specified in terms …
View article: Reconciling role based management and role based access control
Reconciling role based management and role based access control Open
Article Free Access Share on Reconciling role based management and role based access control Authors: Emil Lupu Imperial College, Department of Computing, 180 Queen's Gate, London SW7 2BZ, U.K. Imperial College, Department of Computing, 18…
View article: Pol icy B ased Roles for D istri buted Syst ems S ecuri ty
Pol icy B ased Roles for D istri buted Syst ems S ecuri ty Open
Distributed systems are increasingly being used in commercial environments necessitating the development of trustworthy and reliable security mechanisms. There is often no clear informal or formal specification of enterprise authorisation …
View article: A Security Framework Supporting Domain Based Access Control in Distributed Systems
A Security Framework Supporting Domain Based Access Control in Distributed Systems Open
This paper describes a security framework for object-based distributed systems which is being developed in the CORBA-compliant OrbixTM environment. This framework allows the development of secure distributed applications on existing operat…
View article: An approach to role based management for distributed systems
An approach to role based management for distributed systems Open
Interpreting policy in automated managers facilitates the dynamic change of behaviour of a distributed management system by simply changing policies. This paper describes a management policy notation which can be used to define both author…
View article: Configuration Management For Distributed Software Services
Configuration Management For Distributed Software Services Open
The paper describes the SysMan approach to interactive configuration management of distributed software components (objects). Domains are used to group objects to apply policy and for convenient naming of objects. Configuration Management …
View article: Configuring distributed systems
Configuring distributed systems Open
Distributed systems are constructed from a set of computational components which are bound together to interact and communicate to achieve some over all objective. In this paper, we examine the issues related to system configuration, parti…
View article: Configuration support for system description, construction and evolution
Configuration support for system description, construction and evolution Open
article Free Access Share on Configuration support for system description, construction and evolution Authors: J. Kramer Department of Computing, Imperial College of Science and Technology, 180 Queen's Gate, London SW7 2BZ, Great Britain D…
View article: Domain model of autonomy
Domain model of autonomy Open
This paper reports on the work being done by the U.K. Distributed Systems Management study group (SIGDSM) and the work on management domains being done at Imperial College. The paper defines a generalised domain and classifies the relation…