The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Emil Lupu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman
    A Flexible Access Control Service for Java Mobile Code. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:356-365 [Conf]
  2. Sye Loong Keoh, Emil Lupu, Morris Sloman
    PEACE: A Policy-Based Establishment of Ad-hoc Communities. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:386-395 [Conf]
  3. Naranker Dulay, Nicodemos Damianou, Emil Lupu, Morris Sloman
    A Policy Language for the Management of Distributed Agents. [Citation Graph (0, 0)][DBLP]
    AOSE, 2001, pp:84-100 [Conf]
  4. Joseph S. Sventek, Nagwa Badr, Naranker Dulay, Stephen Heeps, Emil Lupu, Morris Sloman
    Self-Managed Cells and their Federation. [Citation Graph (0, 0)][DBLP]
    CAiSE Workshops (2), 2005, pp:97-107 [Conf]
  5. Susan Eisenbach, Emil Lupu, Karen Meidl, Hani Rizkallah
    Can Corba save a fringe language from becoming obsolete? [Citation Graph (0, 0)][DBLP]
    DAIS, 1999, pp:272-286 [Conf]
  6. Dinesh Ganesarajah, Emil Lupu
    Workflow-Based Composition of Web-Services: A Business Model or a Programming Paradigm? [Citation Graph (0, 0)][DBLP]
    EDOC, 2002, pp:273-284 [Conf]
  7. Emil Lupu, Morris Sloman
    A Policy Based Role Object Model. [Citation Graph (0, 0)][DBLP]
    EDOC, 1997, pp:36-47 [Conf]
  8. Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemos Damianou
    Ponder: Realising Enterprise Viewpoint Concepts. [Citation Graph (0, 0)][DBLP]
    EDOC, 2000, pp:66-75 [Conf]
  9. T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay
    Compiling Policy Descriptions into Reconfigurable Firewall Processors. [Citation Graph (0, 0)][DBLP]
    FCCM, 2003, pp:39-0 [Conf]
  10. T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay
    Irregular Reconfigurable CAM Structures for Firewall Applications. [Citation Graph (0, 0)][DBLP]
    FPL, 2003, pp:890-899 [Conf]
  11. Stephen Strowes, Nagwa Badr, Steven Heeps, Emil Lupu, Morris Sloman
    An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2006, pp:22- [Conf]
  12. Emil Lupu, Morris Sloman
    Conflict Analysis for Management Policies. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1997, pp:430-443 [Conf]
  13. Morris Sloman, Emil Lupu
    Policy Specification for Programmable Networks. [Citation Graph (0, 0)][DBLP]
    IWAN, 1999, pp:73-84 [Conf]
  14. Arosha K. Bandara, Emil Lupu, Jonathan D. Moffett, Alessandra Russo
    A Goal-based Approach to Policy Refinement. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:229-239 [Conf]
  15. Arosha K. Bandara, Emil Lupu, Alessandra Russo
    Using Event Calculus to Formalise Policy Specification and Analysis. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:26-0 [Conf]
  16. Leonidas Lymberopoulos, Emil Lupu, Morris Sloman
    An Adaptive Policy Based Management Framework for Differentiated Services Networks. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:147-158 [Conf]
  17. Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman
    The Ponder Policy Specification Language. [Citation Graph (0, 0)][DBLP]
    POLICY, 2001, pp:18-38 [Conf]
  18. Sye Loong Keoh, Emil Lupu
    Towards flexible credential verification in mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    POMC, 2002, pp:58-65 [Conf]
  19. Emil Lupu, Damian A. Marriott, Morris Sloman, Nicholas Yialelis
    A policy based role framework for access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  20. Emil Lupu, Morris Sloman
    Reconciling role based management and role based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:135-141 [Conf]
  21. Jonathan D. Moffett, Emil Lupu
    The Uses of Role Hierarchies in Access Control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:153-160 [Conf]
  22. Emil Lupu, Zoran Milosevic, Morris Sloman
    Use of Roles and Policies for Specifying and Managing a Virtual Enterprise. [Citation Graph (0, 0)][DBLP]
    RIDE, 1999, pp:72-79 [Conf]
  23. Sye Loong Keoh, Emil Lupu
    An Efficient Access Control Model for Mobile Ad-Hoc Communities. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:210-224 [Conf]
  24. Nicholas Yialelis, Emil Lupu, Morris Sloman
    Role-based security for distributed object systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 1996, pp:80-85 [Conf]
  25. Emil Lupu, Subrata Mazumdar, Rolf Stadler
    Selected Topics in Network and Systems Management. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:35, n:1, pp:1-4 [Journal]
  26. Rebecca Montanari, Emil Lupu, Cesare Stefanelli
    Policy-Based Dynamic Reconfiguration of Mobile-Code Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:73-80 [Journal]
  27. Emil Lupu, Morris Sloman
    Towards a Role-Based Framework for Distributed Systems Management. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 1997, v:5, n:1, pp:- [Journal]
  28. Leonidas Lymberopoulos, Emil Lupu, Morris Sloman
    An Adaptive Policy-based Framework for Network Services Management. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2003, v:11, n:3, pp:- [Journal]
  29. Emil Lupu, Morris Sloman
    Conflicts in Policy-Based Distributed Systems Management. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1999, v:25, n:6, pp:852-869 [Journal]
  30. Emil Lupu, Naranker Dulay, Joe Sventek, Morris Sloman
    Autonomous Pervasive Systems and the Policy Challenges of a Small World! [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:3-7 [Conf]
  31. Alberto E. Schaeffer Filho, Emil Lupu
    Abstractions to Support Interactions Between Self-Managed Cells. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:160-163 [Conf]
  32. Nilufer Tuptuk, Emil Lupu
    Risk Based Authorisation for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:188-191 [Conf]
  33. Kevin P. Twidle, Emil Lupu
    Ponder2 - Policy-Based Self Managed Cells. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:230- [Conf]

  34. Multi-agent planning with confidentiality. [Citation Graph (, )][DBLP]


  35. Distributed abductive reasoning with constraints. [Citation Graph (, )][DBLP]


  36. Panel Session: What Are the Key Challenges in Distributed Security?. [Citation Graph (, )][DBLP]


  37. Ponder2: A Policy System for Autonomous Pervasive Environments. [Citation Graph (, )][DBLP]


  38. Inductive Logic Programming as Abductive Search. [Citation Graph (, )][DBLP]


  39. An Efficient Policy System for Body Sensor Networks. [Citation Graph (, )][DBLP]


  40. Adaptive self-management of teams of autonomous vehicles. [Citation Graph (, )][DBLP]


  41. Self-Managed Cell: A Middleware for Managing Body-Sensor Networks. [Citation Graph (, )][DBLP]


  42. A Policy-Based Management Architecture for Mobile Collaborative Teams. [Citation Graph (, )][DBLP]


  43. Ponder2 - A Policy Environment for Autonomous Pervasive Systems. [Citation Graph (, )][DBLP]


  44. The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment. [Citation Graph (, )][DBLP]


  45. A Role-Based Infrastructure for the Management of Dynamic Communities. [Citation Graph (, )][DBLP]


  46. Tools for domain-based policy management of distributed systems. [Citation Graph (, )][DBLP]


  47. PONDER policy implementation and validation in a CIM and differentiated services framework. [Citation Graph (, )][DBLP]


  48. AMUSE: autonomic management of ubiquitous e-Health systems. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002