Delegating Network Security with More Information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be able to cope, the administrator needs to delegate some control back to en...
Main Authors: | Naous, Jad, Stutsman, Ryan, Mazieres, David, McKeown, Nick, Zeldovich, Nickolai |
---|---|
Other Authors: | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory |
Format: | Article |
Language: | en_US |
Published: |
Association for Computing Machinery
2011
|
Online Access: | http://hdl.handle.net/1721.1/67004 https://orcid.org/0000-0003-0238-2703 |
Similar Items
-
Apprehending Joule Thieves with Cinder
by: Rumble, Stephen M., et al.
Published: (2012) -
Apprehending joule thieves with cinder
by: Rumble, Stephen M, et al.
Published: (2021) -
Energy management in mobile devices with the cinder operating system
by: Roy, Arjun, et al.
Published: (2011) -
Energy Management in Mobile Devices with the Cinder Operating System
by: Roy, Arjun, et al.
Published: (2012) -
Making information flow explicit in HiStar
by: Zeldovich, Nickolai, et al.
Published: (2012)