Morris Sloman

ORCID: 0000-0003-3920-0416
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Access Control and Trust
  • Service-Oriented Architecture and Web Services
  • Distributed systems and fault tolerance
  • Mobile Agent-Based Network Management
  • Security and Verification in Computing
  • Advanced Software Engineering Methodologies
  • Distributed and Parallel Computing Systems
  • Context-Aware Activity Recognition Systems
  • Network Security and Intrusion Detection
  • Business Process Modeling and Analysis
  • Internet Traffic Analysis and Secure E-voting
  • Real-Time Systems Scheduling
  • Embedded Systems Design Techniques
  • Energy Efficient Wireless Sensor Networks
  • Peer-to-Peer Network Technologies
  • Cryptography and Data Security
  • Network Packet Processing and Optimization
  • Software-Defined Networks and 5G
  • Parallel Computing and Optimization Techniques
  • Multi-Agent Systems and Negotiation
  • Wireless Body Area Networks
  • Opportunistic and Delay-Tolerant Networks
  • Logic, Reasoning, and Knowledge
  • Modular Robots and Swarm Intelligence
  • Software System Performance and Reliability

Imperial College London
2004-2014

Institute for Infocomm Research
2009

Imperial Valley College
1999-2005

University of London
1984-2003

University College London
2003

Institute of Electrical and Electronics Engineers
1999

Universidad de Londres
1994

Trust is an important aspect of decision making for Internet applications and particularly influences the specification security policy, i.e., who authorized to perform actions as well techniques needed manage implement applications. This survey examines various definitions trust in literature provides a working definition The properties relationships are explained classes different types identified discussed with examples. Some influential examples management systems described.

10.1109/comst.2000.5340804 article EN IEEE Communications Surveys & Tutorials 2000-01-01

10.1007/bf02283186 article EN Journal of Network and Systems Management 1994-12-01

Modern distributed systems contain a large number of objects and must be capable evolving, without shutting down the complete system, to cater for changing requirements. There is need distributed, automated management agents whose behavior also has dynamically change reflect evolution system being managed. Policies are means specifying influencing within coding into manager agents. Our approach aimed at implementable policies, although policies may initially specified organizational level...

10.1109/32.824414 article EN IEEE Transactions on Software Engineering 1999-01-01

The Conic environment provides a language-based approach to the building of distributed systems which combines simplicity and safety language with flexibility accessibility an operating approach. It comprehensive set tools for program compilation, configuration, debugging, execution in environment. A separate configuration is used specify software components into logical nodes. This concise description facilitates reuse different configurations. Applications are constructed as sets one or...

10.1109/32.24720 article EN IEEE Transactions on Software Engineering 1989-06-01

The specification and management of quality service (QoS) is important in networks distributed computing systems, particularly to support multimedia applications. advent portable laptop computers, palmtops, personal digital assistants with integrated communication capabilities facilitates mobile computing. This article a survey QoS concepts techniques for environments. requirements current future are examined the services required mobility discussed. Generic overviewed followed by an...

10.1109/comst.1999.5340514 article EN IEEE Communications Surveys & Tutorials 1999-01-01

Distributed system management, involves monitoring the activity of a system, making management decisions and performing control actions to modify behavior system. Most research on has concentrated mechanisms related network or operating systems. However, in order automate very large distributed systems, it is necessary be able represent manipulate policy within These objectives are typically set out form general policies which require detailed interpretation by managers. The paper explores...

10.1109/49.257932 article EN IEEE Journal on Selected Areas in Communications 1993-01-01

Event-based monitoring is critical for managing and debugging networks distributed systems. This paper presents GEM - an interpreted generalized event language. It allows high-level, abstract events to be specified in terms of combinations lower-level from different nodes a loosely coupled system. Event components can thus within the system perform filtering, correlation notification close where they occur reduce network traffic. declarative rule-based language which notion real time has...

10.1088/0967-1846/4/2/004 article EN Distributed Systems Engineering 1997-06-01

Distributed system management is concerned with the tasks needed to ensure that large distributed systems can function in accordance objectives of their users. These are typically set out form policies interpreted by managers. There benefits be gained providing automated support for human managers, or actually automating routine tasks. To do this, it desirable have a model as objects itself. The summarized. It clear there potential conflicts between policies. may resolved informally but if...

10.1080/10919399409540214 article EN Journal of Organizational Computing and Electronic Commerce 1994-01-01

Policies are rules governing the choices in behavior of a system. They increasingly being used as means implementing flexible and adaptive systems for management Internet services, networks, security systems. There is also need common specification policy large-scale multi-organizational where access control implemented variety heterogeneous components. In this article we survey both approaches, concentrating on practical which can be directly translated into an implementation.

10.1109/65.993218 article EN IEEE Network 2002-01-01

Policies are rules that govern the choices in behaviour of a system. Security policies define what actions permitted or not permitted, for whom, and under conditions. Management need to be carried out when specific events occur within system resources must allocated There is considerable interest use security management large-scale networks distributed services. Existing policy work has focussed on specification, information models application-specific enforcement. We address important goal...

10.1109/inm.2001.918064 article EN 2002-11-13

Distributed computer control systems (DCCS) have a number of potential advantages over centralised systems, especially where the application is itself physically distributed. A station can be placed close to plant being controlled, and communications network used enable stations communicate co-ordinate their actions. However, software must carefully designed exploit distribution. In paper, CONIC architecture for DCCS described, concentrating on structure but also briefly describing physical...

10.1049/ip-e:19830001 article EN IEE Proceedings E Computers and Digital Techniques 1983-01-01

Policies form an important part of management and can be effective means implementing self-adaptation in pervasive systems. Most policy-based systems focus on large-scale networks distributed Consequently, they are often fragmented, dependent infrastructure lacking flexibility extensibility. This paper presents Ponder2, a novel policy system that is suitable for wide range environments applications. The design implementation Ponder2 emphasises simplicity, extensibility provides users with...

10.1109/icas.2009.42 article EN 2009-04-01

10.1023/a:1025719407427 article EN Journal of Network and Systems Management 2003-01-01

Trust - "reliance on the integrity, ability, or character of a person thing" is pervasive in social systems. We constantly apply it interactions between people, organizations, animals, and even artifacts. use instinctively implicitly closed static systems, consciously explicitly open dynamic An epitome for former case small village, where everybody knows everybody, villagers their knowledge stereotypes to trust distrust neighbors. A big city exemplifies latter case, people explicit rules...

10.1109/mis.2004.52 article EN IEEE Intelligent Systems 2004-09-01

It is suggested that a functional model of monitoring in terms the generation, processing, dissemination, and presentation information can help determine facilities needed to design construct distributed systems. Implementation issues are also discussed, with attention given intrusiveness systems object-based implementation. concluded generic services important tools for managing debugging during system development. Monitoring may be as part application itself, such process control factory...

10.1109/65.244791 article EN IEEE Network 1993-11-01

Policies form an important part of management activities and are effective means implementing self-adaptation in pervasive systems. Many policy- based systems designed to date focus on large-scale networks distributed Consequently, they often fragmented, dependent infrastructure lacking flexibility extensibility. This demonstration presents Ponder2, a self-contained, stand-alone policy environment that is suitable for wide range applications environments ranging from single devices, personal...

10.1109/policy.2008.10 article EN 2008-06-01
Coming Soon ...