Conference on Cloud Computing and Virtualization,
CCV 2010, pp.153-162.
Gorton, I., Liu, A., 2004. Architectures and Technologies
for Enterprise Application Integration. In IEEE
Proceedings of the 26th International Conference on
Software Engineering (ICSE’04). IEEE Press.
Lee, T.K., Yusuf, S., Luk, W., Sloman, M., Lupu, E.,
Dulay, N., 2003. Compiling Policy Descriptions into
Reconfigurable Firewall Processors. In Proceedings of
the 11th Annual IEEE Symposium on Field-
Programmable Custom Computing Machines
(FCCM’03). IEEE Press.
Lee, T.K., Yusuf, S., Luk, W., Sloman, M., Lupu, E.,
Dulay, N., 2002. Development Framework for
Firewall Processors. In Proceedings of the IEEE
International Conference on Field-Programmable
Technology. IEEE Press.
Microsoft Corporation, 1997. Guide to Microsoft Windows
NT 4.0: Profiles and Policies. Microsoft Windows NT
Server White Paper. Microsoft.
Microsoft Corporation, May 2001a. System Policies.
Technical Information, Chapter 8. Microsoft.
Microsoft Corporation, May 2001b. User Profiles and
System Policies. Technical Information, Chapter 15.
Microsoft.
Microsoft Corporation, May 2001c. Step-by-Step Guide to
Understanding the Group Policy Feature Set.
Operating System White Paper. Technical Information.
Microsoft.
Microsoft Corporation, May 2001d. Introduction to
Windows2000 Group Policy. Operating System White
Paper. Technical Information. Microsoft.
Microsoft Corporation, May 2001e. Windows DNA
Architecture Design: A Scalable, Highly Available
Business Object Architecture. White Paper. Technical
Information. Microsoft.
Murray, P., 2009. Enterprise Grade Cloud Computing. In
WDDDM’09. ACM Press.
Nezlek, G.S., Jain, H.K., Nazareth, D.L., 1999. An
Integrated Approach to Enterprise Computing
Architectures. Communications of the ACM, 42, 11,
pp.82-90.
Nielsen, M.S., 1999. Windows 2000 Server Architecture
and Planning, Coriolis Group Publishers. Scottsdale,
Arizona.
Pereira, C.M., Sousa, P., 2004. A Method to Define
Enterprise Architectures using the Zachman
Framework. In ACM Symposium on Applied
Computing (SAC’004). ACM Press.
Posey, B.M., May 2001. Protecting Users from
Themselves. Technical Information, Microsoft
Corporation. Microsoft.
Stegmann, C., 1997. A Framework for Authorization
Policies,
Professional Thesis. Institut Eurécom, IBM
Zurich Research Laboratory, Rüschlikon, Switzerland.
Sutherland, J., Jan van den Heuvel, W., 2002. Enterprise
Application Integration and Complex Adaptive
Systems. Communications of the ACM, 45, 10, pp.59-
64.
Tezuka, S., Sasaki, R., Kataoka, M.(Hitachi Ltd), 2000.
Seamless Object Authentication in Different Security
Policy Domains. In Proc. 33
rd
Hawaii IEEE
International Conference on Systems Science. IEEE
Press.
Traore, D.B., Ye, H., 2003. An Integrated Framework for
Forma1 Deve1opment of Open Distributed Systems.
In ACM Symposium on Applied Computing (SAC2003).
ACM Press.
Vlahovicek, M.J., 13
th
April 2001. Prediction of Protein
Functional Domains from Sequences using Artificial
Neural Networks. In Genome Research. Cold Spring
Harbor Laboratory Press. < http://www.genome.org/
cgi/doi/10.1101/gr.168701 >.
Wendt, T., Brigi, B., Winter, A., Nov 4
th
2005. Assessing
the Integration of Information System Components. In
ACM IHIS’05. ACM Press.
Yu Chen Zhou, Y., Xin Peng Liu, 2010. Context Model
SOA Policy Framework. In IEEE International
Conference on Web Services. IEEE Press.
FUNCTIONAL DOMAIN CONCEPTS IN THE MODELLING OF CLOUD STRUCTURES AND THE BEHAVIOUR
OF INTEGRATED POLICY-BASED SYSTEMS THROUGH THE USE OF ABSTRACTION CLASSES
97