Ricardo Nabhen

Learn More
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follow the RBAC (role based access control) model proposed by the NIST. The framework is based on the provisioning strategy defined by IETF, i.e., the RBAC information is represented in terms of a PIB (policy(More)
Laboratory practice is a fundamental aspect of computer network learning. Experiments tend to be very specific, frequently demanding changes in the local network topology and privileged access to the operating system configuration. These features impose a specific and exclusive laboratory for network teaching experiments. However, it is not always possible(More)
Most DiffServ admission control (AC) algorithms rely on tuning parameters to help in the decision making. Tuning these parameters is a difficult task, especially when one considers the problem of assuring QoS guarantees to individual flows. This paper proposes a method for helping the design of DiffServ AC algorithms based on non-linear programming(More)
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based Access Control) model proposed by the NIST. The framework is based on the provisioning strategy defined by IETF, i.e., the RBAC information is represented in terms of a PIB(More)
This paper presents a PCIM-based framework for storing and enforcing RBAC (Role Based Access Control) policies in distributed heterogeneous systems. PCIM (Policy Core Information Model) is an information model proposed by IETF. PCIM permits to represent network policies in a standard form, allowing software from different vendors to read the same set of(More)
SLA management approaches typically adopt provisioning strategies based on aggregate traffic in order to support end­to­end delay requirements of applications. They do not take into account individual flows needs in terms of delay. However, this delay can be very higher than the one observed by aggregate traffic, causing an important impact in network(More)