Morris Sloman

According to our database1, Morris Sloman authored at least 129 papers between 1981 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2011, "For contributions to adaptive policy based management of distributed and pervasive systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2015
Federating Policy-Driven Autonomous Systems: Interaction Specification and Management Patterns.
J. Network Syst. Manage., 2015

2014
Rumpole: An Introspective Break-Glass Access Control Language.
ACM Trans. Inf. Syst. Secur., 2014

2012
Self-Management Framework for Mobile Autonomous Systems.
J. Network Syst. Manage., 2012

Home Network Management Policies: Putting the User in the Loop.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

A configuration service for home networks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2011
Autonomic Role and Mission Allocation Framework for Wireless Sensor Networks.
Proceedings of the 5th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2011

An information plane architecture supporting home network management.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Smartphone based e-Learning.
Proceedings of the CSEDU 2011, 2011

Policy refinement: Decomposition and operationalization for dynamic domains.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Self-adaptive routing in multi-hop sensor networks.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Refinement of History-Based Policies.
Proceedings of the Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning, 2011

2010
Engineering Policy-Based Ubiquitous Systems.
Comput. J., 2010

Collaborative Privacy Policy Authoring in a Social Networking Context.
Proceedings of the POLICY 2010, 2010

Privacy Butler: A personal privacy rights manager for online presence.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Starfish: policy driven self-management in wireless sensor networks.
Proceedings of the 2010 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, 2010

Teleo-Reactive policies for managing human-centric pervasive services.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Decomposition techniques for policy refinement.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
A lightweight policy system for body sensor networks.
IEEE Trans. Network and Service Management, 2009

Locating network domain entry and exit point/path for DDoS attack traffic.
IEEE Trans. Network and Service Management, 2009

Policy conflict analysis for diffserv quality of service management.
IEEE Trans. Network and Service Management, 2009

Security policy refinement using data integration: a position paper.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Verification of Policy-Based Self-Managed Cell Interactions Using Alloy.
Proceedings of the POLICY 2009, 2009

Vesta: A secure and autonomic system for pervasive healthcare.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

Realising management and composition of Self-Managed Cells in pervasive healthcare.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

Securing Body Sensor Networks: Sensor Association and Key Management.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

A Policy-Based Management Architecture for Mobile Collaborative Teams.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

A Mission Management Framework for Unmanned Autonomous Vehicles.
Proceedings of the Mobile Wireless Middleware, 2009

Adaptive response system for distributed denial-of-service attacks.
Proceedings of the Integrated Network Management, 2009

Self-healing for Pervasive Computing Systems.
Proceedings of the Architecting Dependable Systems VII, 2009

Ponder2: A Policy System for Autonomous Pervasive Environments.
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009

Towards Self-Healing in Wireless Sensor Networks.
Proceedings of the Sixth International Workshop on Wearable and Implantable Body Sensor Networks, 2009

2008
Reconfigurable Architecture for Network Flow Analysis.
IEEE Trans. VLSI Syst., 2008

AMUSE: autonomic management of ubiquitous e-Health systems.
Concurrency and Computation: Practice and Experience, 2008

Ponder2 - A Policy Environment for Autonomous Pervasive Systems.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Network domain entrypoint/path determination for DDoS attacks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Adaptive self-management of teams of autonomous vehicles.
Proceedings of the 6th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2008), 2008

Finger: An efficient policy system for body sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

An Efficient Policy System for Body Sensor Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

A Role-Based Infrastructure for the Management of Dynamic Communities.
Proceedings of the Resilient Networks and Services, 2008

2007
A Survey of Bots Used for Distributed Denial of Service Attacks.
Proceedings of the New Approaches for Security, 2007

Towards Supporting Interactions between Self-Managed Cells.
Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems, 2007

Autonomous Pervasive Systems and the Policy Challenges of a Small World!
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Self-Managed Cell: A Middleware for Managing Body-Sensor Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Dynamic Ontology Mapping for Interacting Autonomous Systems.
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007

Non-intrusive IP traceback for DDoS attacks.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Policy-based Management for Body-Sensor Networks.
Proceedings of the 4th International Workshop on Wearable and Implantable Body Sensor Networks, 2007

Self-management Framework for Unmanned Autonomous Vehicles.
Proceedings of the Inter-Domain Management, 2007

2006
Policy refinement for IP differentiated services Quality of Service management.
IEEE Trans. Network and Service Management, 2006

Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health.
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006

2005
Policy Conflict Analysis Using Tableaux for On Demanc VPN Framework.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Policy Conflict Analysis for Quality of Service Management.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Self-managed Cells for Ubiquitous Systems.
Proceedings of the Computer Network Security, 2005

An Ontology-enabled Service Oriented Architecture for Pervasive Computing.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Policy refinement for DiffServ quality of service management.
Proceedings of the Integrated Network Management, 2005

Policy Issues for Pervasive Systems.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VIII, 2005

A Combined Hardware-Software Architecture for Network Flow.
Proceedings of The 2005 International Conference on Engineering of Reconfigurable Systems and Algorithms, 2005

Self-Managed Cells and their Federation.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005

2004
A framework for contextual mediation in mobile and ubiquitous computing applied to the context-aware adaptation of maps.
Personal and Ubiquitous Computing, 2004

The Pudding of Trust.
IEEE Intelligent Systems, 2004

PONDER policy implementation and validation in a CIM and differentiated services framework.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Meta Data to Support Context Aware Mobile Applications.
Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM 2004), 2004

PEACE: A Policy-Based Establishment of Ad-hoc Communities.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Report on the 4th International Conference on Mobile Data Management.
SIGMOD Record, 2003

An Adaptive Policy-based Framework for Network Services Management.
J. Network Syst. Manage., 2003

Policy-based Management of Networks and Services.
J. Network Syst. Manage., 2003

Guest Editors' Introduction - Mobile Data Management.
IEEE Distributed Systems Online, 2003

Trust Management Tools for Internet Applications.
Proceedings of the Trust Management, First International Conference, 2003

Irregular Reconfigurable CAM Structures for Firewall Applications.
Proceedings of the Field Programmable Logic and Application, 13th International Conference, 2003

Compiling Policy Descriptions into Reconfigurable Firewall Processors.
Proceedings of the 11th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2003), 2003

2002
An Adaptive Policy Based Management Framework for Differentiated Services Networks.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Tools for domain-based policy management of distributed systems.
Proceedings of the Management Solutions for the New Communications World, 2002

Specifying and Analysing Trust for Internet Applications.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002

Constraint Based Network Adaptation for Ubiquitous Applications.
Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 2002

2001
Active networks and services.
Computer Networks, 2001

Map adaptation for users of mobile systems.
Proceedings of the Tenth International World Wide Web Conference, 2001

The Ponder Policy Specification Language.
Proceedings of the Policies for Distributed Systems and Networks, 2001

A Policy Deployment Model for the Ponder Language.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

Constraint-Based Configuration of Proxylets for Programmable Networks.
Proceedings of the Interactive Distributed Multimedia Systems, 2001

A Policy Language for the Management of Distributed Agents.
Proceedings of the Agent-Oriented Software Engineering II, Second International Workshop, 2001

2000
A Survey of Trust in Internet Applications.
IEEE Communications Surveys and Tutorials, 2000

Ponder: Realising Enterprise Viewpoint Concepts.
Proceedings of the 4th International Enterprise Distributed Object Computing Conference (EDOC 2000), 2000

A Flexible Access Control Service for Java Mobile Code.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Conflicts in Policy-Based Distributed Systems Management.
IEEE Trans. Software Eng., 1999

A Survey of Quality of Service in Mobile Computing Environments.
IEEE Communications Surveys and Tutorials, 1999

Use of Roles and Policies for Specifying and Managing a Virtual Enterprise.
Proceedings of the Ninth International Workshop on Research Issues on Data Engineering: Information Technology for Virtual Enterprises, 1999

Policy Specification for Programmable Networks.
Proceedings of the Active Networks, First International Working Conference, 1999

QoS and Context Awareness for Mobile Computing.
Proceedings of the Handheld and Ubiquitous Computing, First International Symposium, 1999

Are Programmable Networks Unmanageable?
Proceedings of the Active Technologies for Network and Service Management, 1999

1997
Towards a Role-Based Framework for Distributed Systems Management.
J. Network Syst. Manage., 1997

GEM: a generalized event monitoring language for distributed systems.
Distributed Systems Engineering, 1997

Reconciling role based management and role based access control.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

Conflict Analysis for Management Policies.
Proceedings of the Integrated Network Management V, 1997

Workload Characteristics for Process Migration and Load Balancing.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997

A Policy Based Role Object Model.
Proceedings of the 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 1997

Interactive Configuration Management for Distributed Object Systems.
Proceedings of the 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 1997

1996
Role-based security for distributed object systems.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

Working Group Report on Application Security.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

An authentication service supporting domain-based access control policies.
Proceedings of the Information Systems Security, 1996

A Security Framework Supporting Domain Based Access Control in Distributed Systems.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

A configurable event service for distributed systems.
Proceedings of the Third International Conference on Configurable Distributed Systems, 1996

Implementing interactive configuration management for distributed systems.
Proceedings of the Third International Conference on Configurable Distributed Systems, 1996

1995
A policy based role framework for access control.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995

Configuration management for distributed software services.
Proceedings of the Integrated Network Management IV, 1995

1994
Policy Driven Management for Distributed Systems.
J. Network Syst. Manage., 1994

Security architecture for distributed systems.
Computer Communications, 1994

1993
Policies Hierarchies for Distributed Systems Management.
IEEE Journal on Selected Areas in Communications, 1993

User and mechanism views of distributed systems management.
Distributed Systems Engineering, 1993

Domain Management and Accounting in an International Cellular Network.
Proceedings of the Integrated Network Management III, 1993

1992
Configuring object-based distributed programs in REX.
Software Engineering Journal, 1992

Configuring distributed systems.
Proceedings of the 5th ACM SIGOPS European Workshop: Models and Paradigms for Distributed Systems Structuring, 1992

1991
Content-Dependent Access Control.
Operating Systems Review, 1991

The representation of policies as system objects.
Proceedings of the Conference on Organizational Computing Systems, 1991

Using Domains for Specifying Management Policy.
Proceedings of the Operating Systems of the 90s and Beyond, International Workshop, 1991

1990
Specifying discretionary access control policy for distributed systems.
Computer Communications, 1990

A Case Study in Representing a Model: to Z or not to Z?
Proceedings of the Z User Workshop, 1990

1989
Constructing Distributed Systems in Conic.
IEEE Trans. Software Eng., 1989

Verteilte Systeme und Rechnernetze.
Hanser Studienbücher, Hanser, ISBN: 978-3-446-15346-2, 1989

1988
The Source of Authority for Commercial Access Control.
IEEE Computer, 1988

Domain model of autonomy.
Proceedings of the 3rd ACM SIGOPS European Workshop: Autonomy or Interdependence in Distributed Systems? Cambridge, 1988

1987
Distributed System Construction: Experience with the Conic Toolkit.
Proceedings of the Experiences with Distributed Systems, 1987

Distributed systems and computer networks.
Prentice Hall International series in computer science, Prentice Hall, ISBN: 978-0-13-215849-7, 1987

1985
A Routing Algorithm for Interconnected Local Area Networks.
Computer Networks, 1985

1984
A software architecture for distributed computer control systems.
Automatica, 1984

1983
The CONIC Communication System for Distributed Process Control.
Proceedings of the Kommunikation in Verteilten Systemen, 1983

1981
Intertask Communication Primitives for Distributed Computer Control Systems.
Proceedings of the 2nd International Conference on Distributed Computing Systems, 1981


  Loading...