6 research outputs found

    Някои идеи за използване на интервална темпорална логика и политики в система за електронно обучение

    Get PDF
    Доклад, поместен в сборника на Националната конференция "Образованието в информационното общество", Пловдив, май, 2010 г.В статията се обсъждат някои идеи за персонализация на учебния процес и адаптивност на система за електронно обучение към потребителските знания, предпочитания и цели, чрез използване на интервална темпорална логика и политики.Асоциация "Развитие на информационното общество", Институт по математика и информатика при БАН, Пловдивски университе

    Administración de redes basadas en políticas

    Get PDF
    En nuestros días la complejidad y el dinamismo de las redes informáticas han vuelto su control y mantenimiento un verdadero dolor de cabeza para los administradores. Nuestro objetivo es simplificar estas labores a través de la implementación y extención de un esquema para administración, basado en políticas, donde de la definición de las políticas con un nivel alto de abstracción se ira transformado de reglas de negocio a reglas de configuración aplicables a los distintos tipos de dispositivos en forma automática. A partir de esto, se define el marco de trabajo del proyecto y se enuncian los distintos aspectos de diseño y dificultades a nivel de implementación que se encuentran al momento de desrrollar una solución de estas caracteristicas.Eje: Sistemas DistribuidosRed de Universidades con Carreras en Informática (RedUNCI

    Security Management System for 4G Heterogeneous Networks

    Get PDF
    There is constant demand for the development of mobile networks to meet the service requirements of users, and their development is a significant topic of research. The current fourth generation (4G) of mobile networks are expected to provide high speed connections anywhere at any time. Various existing 4G architectures such as LTE and WiMax support only wireless technologies, while an alternative architecture, Y-Comm, has been proposed to combine both existing wired and wireless networks. Y-Comm seeks to meet the main service requirements of 4G by converging the existing networks, so that the user can get better service anywhere and at any time. One of the major characteristics of Y-Comm is heterogeneity, which means that networks with different topologies work together to provide seamless communication to the end user. However, this heterogeneity leads to technical issues which may compromise quality of service, vertical handover and security. Due to the convergence characteristic of Y-Comm, security is considered more significant than in the existing LTE and WiMax networks. These security concerns have motivated this research study to propose a novel security management system. The research aims to meet the security requirements of 4G mobile networks, e.g. preventing end user devices from being used as attack tools. This requirement has not been met clearly in previous studies of Y-Comm, but this study proposes a security management system which does this. This research follows the ITU-T recommendation M.3400 dealing with security violations within Y-Comm networks. It proposes a policy-based security management system to deal with events that trigger actions in the system and uses Ponder2 to implement it. The proposed system, located in the top layer of the Y-Comm architecture, interacts with components of Y-Comm to enforce the appropriate policies. Its four main components are the Intelligent Agent, the Security Engine, the Security Policies Database and the Security Administrator. These are represented in this research as managed objects to meet design considerations such as extensibility and modifiability. This research demonstrates that the proposed system meets the security requirements of the Y-Comm environment. Its deployment is possible with managed objects built with Ponder2 for all of the components of Y-Comm, which means that the security management system is able to prevent end user devices from being used as attack tools. It can also achieve other security goals of Y-Comm networks

    The development of secure multi-agent systems

    Get PDF
    corecore