Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,702 papers from all fields of science
Search
Sign In
Create Free Account
Separation of mechanism and policy
Known as:
Policies and mechanisms
, Separation of mechanism from policy
The separation of mechanism and policy is a design principle in computer science. It states that mechanisms (those parts of a system implementation…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Application programming interface
Authorization
Computer science
Distributed operating system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Mechanism Design for Crowdsourcing Markets with Heterogeneous Tasks
G. Goel
,
Afshin Nikzad
,
A. Singla
AAAI Conference on Human Computation…
2014
Corpus ID: 3183685
Designing optimal pricing policies and mechanisms for allocating tasks to workers is central to online crowdsourcing markets…
Expand
Highly Cited
2009
Highly Cited
2009
Application-aware prioritization mechanisms for on-chip networks
R. Das
,
O. Mutlu
,
T. Moscibroda
,
C. Das
Micro
2009
Corpus ID: 2367009
Network-on-Chips (NoCs) are likely to become a critical shared resource in future many-core processors. The challenge is to…
Expand
Highly Cited
2009
Highly Cited
2009
Detecting network neutrality violations with causal inference
M. Tariq
,
M. Motiwala
,
N. Feamster
,
M. Ammar
Conference on Emerging Network Experiment and…
2009
Corpus ID: 7978385
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users…
Expand
2009
2009
Credential Based Hybrid Access Control Methodology for Shared Electronic Health Records
N. Dagdee
,
Ruchi Vijaywargiya
International Conference on Information…
2009
Corpus ID: 16955202
Various credential based approaches have been proposed for realizing access control on shared data sources. These approaches use…
Expand
Highly Cited
2005
Highly Cited
2005
A service discovery framework for service centric systems
G. Spanoudakis
,
A. Zisman
,
A. Kozlenkov
IEEE International Conference on Services…
2005
Corpus ID: 14544458
An important aspect of service-centric systems (i.e. systems composed of services) is the ability to support service discovery at…
Expand
Highly Cited
2004
Highly Cited
2004
An artificial intelligence perspective on autonomic computing policies
J. Kephart
,
W. E. Walsh
Proceedings. Fifth IEEE International Workshop on…
2004
Corpus ID: 39058
We introduce a unified framework that interrelates three different types of policies that will be used in autonomic computing…
Expand
Highly Cited
2002
Highly Cited
2002
Towards Security and Privacy for Pervasive Computing
R. Campbell
,
J. Al-Muhtadi
,
P. Naldurg
,
Geetanjali Sampemane
,
M. D. Mickunas
International Symposium on Systems Synthesis
2002
Corpus ID: 3076693
Pervasive computing environments with their interconnected devices and services promise seamless integration of digital…
Expand
Highly Cited
2001
Highly Cited
2001
Flexible team-based access control using contexts
C. Georgiadis
,
I. Mavridis
,
G. Pangalos
,
Roshan K. Thomas
ACM Symposium on Access Control Models and…
2001
Corpus ID: 14583402
We discuss the integration of contextual information with team-based access control. The TMAC model was formulated by Thomas in…
Expand
Highly Cited
1998
Highly Cited
1998
2K: A Reflective, Component-Based Operating System for Rapidly Changing Environments
Fabio Kon
,
Ashish Singhai
,
R. Campbell
,
Dulcineia Carvalho
,
Robert Moore
,
Francisco J. Ballesteros
ECOOP Workshops
1998
Corpus ID: 17111393
Modern computing environments face both low-frequency infrastructural changes, such as software and hardware upgrades, and…
Expand
Highly Cited
1975
Highly Cited
1975
Policy/mechanism separation in Hydra
R. Levin
,
E. Cohen
,
W. Corwin
,
F. Pollack
,
W. Wulf
Symposium on Operating Systems Principles
1975
Corpus ID: 10524544
The extent to which resource allocation policies are entrusted to user-level software determines in large part the degree of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE