Search the dblp DataBase
Emil Lupu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Antonio Corradi , Rebecca Montanari , Cesare Stefanelli , Emil Lupu , Morris Sloman A Flexible Access Control Service for Java Mobile Code. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:356-365 [Conf ] Sye Loong Keoh , Emil Lupu , Morris Sloman PEACE: A Policy-Based Establishment of Ad-hoc Communities. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:386-395 [Conf ] Naranker Dulay , Nicodemos Damianou , Emil Lupu , Morris Sloman A Policy Language for the Management of Distributed Agents. [Citation Graph (0, 0)][DBLP ] AOSE, 2001, pp:84-100 [Conf ] Joseph S. Sventek , Nagwa Badr , Naranker Dulay , Stephen Heeps , Emil Lupu , Morris Sloman Self-Managed Cells and their Federation. [Citation Graph (0, 0)][DBLP ] CAiSE Workshops (2), 2005, pp:97-107 [Conf ] Susan Eisenbach , Emil Lupu , Karen Meidl , Hani Rizkallah Can Corba save a fringe language from becoming obsolete? [Citation Graph (0, 0)][DBLP ] DAIS, 1999, pp:272-286 [Conf ] Dinesh Ganesarajah , Emil Lupu Workflow-Based Composition of Web-Services: A Business Model or a Programming Paradigm? [Citation Graph (0, 0)][DBLP ] EDOC, 2002, pp:273-284 [Conf ] Emil Lupu , Morris Sloman A Policy Based Role Object Model. [Citation Graph (0, 0)][DBLP ] EDOC, 1997, pp:36-47 [Conf ] Emil Lupu , Morris Sloman , Naranker Dulay , Nicodemos Damianou Ponder: Realising Enterprise Viewpoint Concepts. [Citation Graph (0, 0)][DBLP ] EDOC, 2000, pp:66-75 [Conf ] T. K. Lee , Sherif Yusuf , Wayne Luk , Morris Sloman , Emil Lupu , Naranker Dulay Compiling Policy Descriptions into Reconfigurable Firewall Processors. [Citation Graph (0, 0)][DBLP ] FCCM, 2003, pp:39-0 [Conf ] T. K. Lee , Sherif Yusuf , Wayne Luk , Morris Sloman , Emil Lupu , Naranker Dulay Irregular Reconfigurable CAM Structures for Firewall Applications. [Citation Graph (0, 0)][DBLP ] FPL, 2003, pp:890-899 [Conf ] Stephen Strowes , Nagwa Badr , Steven Heeps , Emil Lupu , Morris Sloman An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2006, pp:22- [Conf ] Emil Lupu , Morris Sloman Conflict Analysis for Management Policies. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 1997, pp:430-443 [Conf ] Morris Sloman , Emil Lupu Policy Specification for Programmable Networks. [Citation Graph (0, 0)][DBLP ] IWAN, 1999, pp:73-84 [Conf ] Arosha K. Bandara , Emil Lupu , Jonathan D. Moffett , Alessandra Russo A Goal-based Approach to Policy Refinement. [Citation Graph (0, 0)][DBLP ] POLICY, 2004, pp:229-239 [Conf ] Arosha K. Bandara , Emil Lupu , Alessandra Russo Using Event Calculus to Formalise Policy Specification and Analysis. [Citation Graph (0, 0)][DBLP ] POLICY, 2003, pp:26-0 [Conf ] Leonidas Lymberopoulos , Emil Lupu , Morris Sloman An Adaptive Policy Based Management Framework for Differentiated Services Networks. [Citation Graph (0, 0)][DBLP ] POLICY, 2002, pp:147-158 [Conf ] Nicodemos Damianou , Naranker Dulay , Emil Lupu , Morris Sloman The Ponder Policy Specification Language. [Citation Graph (0, 0)][DBLP ] POLICY, 2001, pp:18-38 [Conf ] Sye Loong Keoh , Emil Lupu Towards flexible credential verification in mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP ] POMC, 2002, pp:58-65 [Conf ] Emil Lupu , Damian A. Marriott , Morris Sloman , Nicholas Yialelis A policy based role framework for access control. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Emil Lupu , Morris Sloman Reconciling role based management and role based access control. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1997, pp:135-141 [Conf ] Jonathan D. Moffett , Emil Lupu The Uses of Role Hierarchies in Access Control. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1999, pp:153-160 [Conf ] Emil Lupu , Zoran Milosevic , Morris Sloman Use of Roles and Policies for Specifying and Managing a Virtual Enterprise. [Citation Graph (0, 0)][DBLP ] RIDE, 1999, pp:72-79 [Conf ] Sye Loong Keoh , Emil Lupu An Efficient Access Control Model for Mobile Ad-Hoc Communities. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:210-224 [Conf ] Nicholas Yialelis , Emil Lupu , Morris Sloman Role-based security for distributed object systems. [Citation Graph (0, 0)][DBLP ] WETICE, 1996, pp:80-85 [Conf ] Emil Lupu , Subrata Mazumdar , Rolf Stadler Selected Topics in Network and Systems Management. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:35, n:1, pp:1-4 [Journal ] Rebecca Montanari , Emil Lupu , Cesare Stefanelli Policy-Based Dynamic Reconfiguration of Mobile-Code Applications. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2004, v:37, n:7, pp:73-80 [Journal ] Emil Lupu , Morris Sloman Towards a Role-Based Framework for Distributed Systems Management. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 1997, v:5, n:1, pp:- [Journal ] Leonidas Lymberopoulos , Emil Lupu , Morris Sloman An Adaptive Policy-based Framework for Network Services Management. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2003, v:11, n:3, pp:- [Journal ] Emil Lupu , Morris Sloman Conflicts in Policy-Based Distributed Systems Management. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1999, v:25, n:6, pp:852-869 [Journal ] Emil Lupu , Naranker Dulay , Joe Sventek , Morris Sloman Autonomous Pervasive Systems and the Policy Challenges of a Small World! [Citation Graph (0, 0)][DBLP ] POLICY, 2007, pp:3-7 [Conf ] Alberto E. Schaeffer Filho , Emil Lupu Abstractions to Support Interactions Between Self-Managed Cells. [Citation Graph (0, 0)][DBLP ] AIMS, 2007, pp:160-163 [Conf ] Nilufer Tuptuk , Emil Lupu Risk Based Authorisation for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] AIMS, 2007, pp:188-191 [Conf ] Kevin P. Twidle , Emil Lupu Ponder2 - Policy-Based Self Managed Cells. [Citation Graph (0, 0)][DBLP ] AIMS, 2007, pp:230- [Conf ] Multi-agent planning with confidentiality. [Citation Graph (, )][DBLP ] Distributed abductive reasoning with constraints. [Citation Graph (, )][DBLP ] Panel Session: What Are the Key Challenges in Distributed Security?. [Citation Graph (, )][DBLP ] Ponder2: A Policy System for Autonomous Pervasive Environments. [Citation Graph (, )][DBLP ] Inductive Logic Programming as Abductive Search. [Citation Graph (, )][DBLP ] An Efficient Policy System for Body Sensor Networks. [Citation Graph (, )][DBLP ] Adaptive self-management of teams of autonomous vehicles. [Citation Graph (, )][DBLP ] Self-Managed Cell: A Middleware for Managing Body-Sensor Networks. [Citation Graph (, )][DBLP ] A Policy-Based Management Architecture for Mobile Collaborative Teams. [Citation Graph (, )][DBLP ] Ponder2 - A Policy Environment for Autonomous Pervasive Systems. [Citation Graph (, )][DBLP ] The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment. [Citation Graph (, )][DBLP ] A Role-Based Infrastructure for the Management of Dynamic Communities. [Citation Graph (, )][DBLP ] Tools for domain-based policy management of distributed systems. [Citation Graph (, )][DBLP ] PONDER policy implementation and validation in a CIM and differentiated services framework. [Citation Graph (, )][DBLP ] AMUSE: autonomic management of ubiquitous e-Health systems. [Citation Graph (, )][DBLP ] Search in 0.392secs, Finished in 0.395secs