Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)最新文献

筛选
英文 中文
Policy management of enterprise systems: a requirements study 企业系统的策略管理:需求研究
Pranam Kolari, Timothy W. Finin, Y. Yesha, Kelly A. Lyons, Jen Hawkins, Stephen G. Perelgut
{"title":"Policy management of enterprise systems: a requirements study","authors":"Pranam Kolari, Timothy W. Finin, Y. Yesha, Kelly A. Lyons, Jen Hawkins, Stephen G. Perelgut","doi":"10.1109/POLICY.2006.23","DOIUrl":"https://doi.org/10.1109/POLICY.2006.23","url":null,"abstract":"Policy enabled applications are being increasingly employed to support responsive information technology services. In competitive business environments, such services increase adaptability of both software and the processes they implement through externalized business and security logic. Over the last decade this has driven both industry and academia to contribute to policy research and engineering, by developing specification languages, frameworks and toolkits. Since this work has typically been applied to and evaluated using new enterprise solutions, policy management for existing applications has been less well studied. In this paper we share our experiences on policy enabling an existing Web based solution, together with identifying new policy enabling requirements from a specific class of enterprise systems","PeriodicalId":169233,"journal":{"name":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125001233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Self-describing delegation networks for the Web Web的自描述委托网络
Lalana Kagal, Tim Berners-Lee, D. Connolly, D. Weitzner
{"title":"Self-describing delegation networks for the Web","authors":"Lalana Kagal, Tim Berners-Lee, D. Connolly, D. Weitzner","doi":"10.1109/POLICY.2006.29","DOIUrl":"https://doi.org/10.1109/POLICY.2006.29","url":null,"abstract":"As the necessity of flexible Web security becomes more apparent and as the notion of using policies for access control gains popularity, the number of policy languages being proposed for controlling access to Web resources increases. Instead of defining a single standard policy language, we believe that there should be a way of embracing different policy languages and of allowing interoperability between systems that use different policy languages. We propose Rein - a policy and delegation framework that is grounded in semantic Web technologies - to help the Web preserve maximum expressiveness for local policy communities by enabling global interoperability of policy reasoning. Rein provides ontologies for describing policy and delegation networks, and provides mechanisms for reasoning over them, both of which can be used to develop domain and policy language specific access control frameworks for Web resources. The focus of this paper is the delegation mechanisms of the Rein policy framework that support both delegation of authorization and trust. In this paper we give a brief overview of the Rein framework, describe its delegation mechanisms, and illustrate their usefulness through some examples","PeriodicalId":169233,"journal":{"name":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128842389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Cauldron: a policy-based design tool 坩埚:基于策略的设计工具
L. Ramshaw, Akhil Sahai, J. Saxe, S. Singhal
{"title":"Cauldron: a policy-based design tool","authors":"L. Ramshaw, Akhil Sahai, J. Saxe, S. Singhal","doi":"10.1109/POLICY.2006.13","DOIUrl":"https://doi.org/10.1109/POLICY.2006.13","url":null,"abstract":"As applications and systems have grown complex, so has the complexity of maintaining valid configurations for them. Usually, policies are treated as {event, condition, action} rule sets and are used to maintain systems in valid configurations. In this paper, we use policies, defined as configuration constraints on object-oriented models of systems, to generate configurations that meet those policies. We describe Cauldron, a policy-based design tool for this purpose. The paper discusses the Cauldron language, and shows how various relationships present in object-oriented models are coded using the Common Information Model (CIM) as an example. We also discuss the implementation of Cauldron, specifically as it relates to the underlying theory that enables it to generate valid configurations. We have also used a partitionable system as a case study for validating Cauldron","PeriodicalId":169233,"journal":{"name":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133311831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A quantitative approach to IT investment allocation to improve business results IT投资分配的定量方法,以改善业务结果
A. Moura, J. Sauvé, João Jornada, Eduardo Radziuk
{"title":"A quantitative approach to IT investment allocation to improve business results","authors":"A. Moura, J. Sauvé, João Jornada, Eduardo Radziuk","doi":"10.1109/POLICY.2006.7","DOIUrl":"https://doi.org/10.1109/POLICY.2006.7","url":null,"abstract":"This paper proposes using financial loss functions to estimate the impact that IT service level agreements (SLAs) have on business process performance. For that, an organizing framework based on balanced scorecard concepts is first presented to tie those functions to strategic business processes; and then, the impact of service levels on business performance is estimated using quantitative techniques from management science. The result is a quantitative approach for SLA objective setting and investment allocation to improve business results. The approach serves as decision support for investment policies within an ITIL financial management for IT services context. Application to the case of a drugstore chain showed that the approach is instrumental in analyzing complex IT service-business process interdependency scenarios. The approach helped the chain's executives identify and recommend which IT services should receive investments","PeriodicalId":169233,"journal":{"name":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130181007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Access control inference and feedback for policy managers: a fine-grained analysis 策略管理人员的访问控制推断和反馈:细粒度分析
Ranga Raju Vatsavai, Sharma Chakravarthy, M. Mohania
{"title":"Access control inference and feedback for policy managers: a fine-grained analysis","authors":"Ranga Raju Vatsavai, Sharma Chakravarthy, M. Mohania","doi":"10.1109/POLICY.2006.9","DOIUrl":"https://doi.org/10.1109/POLICY.2006.9","url":null,"abstract":"As the IT infrastructure complexity and pervasiveness grows, autonomic computing can greatly simplify its deployment and usage. Essentially, the goal of autonomic computing is to shift the burden of management of the component systems from the user to the system. In order to accomplish this, autonomic computing demands that the system be able to accept high level policies, analyze them, and provide meaningful feedback to simplify the usage of the infrastructure by domain experts and minimize human involvement in the loop. Policies, in general are defined at a higher level in terms of business objects, their attributes, and operations. On the other hand managed resources, on which the policies are finally going to execute, have their own access control lists to limit the operations that an application user can perform. As a result, many policies which are syntactically and semantically correct, may fail to execute at run time due to ACL violations. This paper describes an approach wherein the information on access control provided at the managed resources level is leveraged to check for policy executability and provide meaningful feedback in case there are problems. This is done at policy specification time as opposed to runtime, which is not desirable, as is typically done by current systems. Furthermore, this avoids redundant access control specifications which can lead to inconsistencies in addition to being a burden on the user. A pragmatic approach for checking policy executability from an access control viewpoint and providing several types of feedback are the focus of this paper","PeriodicalId":169233,"journal":{"name":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","volume":"166 5-6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121464108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An N-state driven policy-based network management to control end-end network behaviors 基于n状态驱动的策略网络管理,用于控制端到端网络行为
S. Kowtha, X. Jiang
{"title":"An N-state driven policy-based network management to control end-end network behaviors","authors":"S. Kowtha, X. Jiang","doi":"10.1109/POLICY.2006.10","DOIUrl":"https://doi.org/10.1109/POLICY.2006.10","url":null,"abstract":"A large scale network simultaneously experiences multiple and varied events that degrade its ability to serve its customers. Network management of large networks that span multiple networks, network technologies, network events (faults, performance, security, other disruptions) is a multidimensional problem. While, policy based network management frameworks have been proposed to help manage the complexity, additional frameworks are needed to help manage network of networks. In this paper, a finite state machine based aggregation of network, events, N-State, is proposed, as a framework to manage complex networks and as a PBNM framework extension to manage network of networks. N-state, targeted network behavior for each state, and collaboratively developed PBNM policies mapped to state and targeted behavior, provide a means for network operators to comprehend overall network situation, assess overall network degradation, collaborate in restoration of network services and intervene when necessary","PeriodicalId":169233,"journal":{"name":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124535112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Specifying data sharing agreements 指定数据共享协议
Vipin Swarup, Leonard J. Seligman, A. Rosenthal
{"title":"Specifying data sharing agreements","authors":"Vipin Swarup, Leonard J. Seligman, A. Rosenthal","doi":"10.1109/POLICY.2006.34","DOIUrl":"https://doi.org/10.1109/POLICY.2006.34","url":null,"abstract":"When consumers build value-added services on top of data resources they do not control, they need to manage their information supply chains to ensure that their data suppliers produce and supply required data as needed. Producers also need to manage their information supply chains to ensure that their data is disseminated and protected appropriately. In this paper, we present a novel model for data sharing agreements that supports a wide variety of data sharing policies. The model is based on distributed temporal logic (DTL) predicates that are expressed over events in dataflow graphs. A dataflow graph's nodes are principals with local stores, and its edges are (typed) channels along which dataflows. We illustrate the model via examples and discuss the kinds of analyses enabled by the model","PeriodicalId":169233,"journal":{"name":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115302557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Policy languages for digital identity management in federation systems 联邦系统中数字身份管理的策略语言
E. Bertino, Abhilasha Bhargav-Spantzel, A. Squicciarini
{"title":"Policy languages for digital identity management in federation systems","authors":"E. Bertino, Abhilasha Bhargav-Spantzel, A. Squicciarini","doi":"10.1109/POLICY.2006.22","DOIUrl":"https://doi.org/10.1109/POLICY.2006.22","url":null,"abstract":"The goal of service provider federations is to support a controlled method by which distributed organizations can provide services to qualified individuals and manage their identity attributes at an inter-organizational level. In order to make access control decisions the history of activities should be accounted for, therefore it is necessary to record information on interactions among the federation entities. To achieve these goals we propose a comprehensive assertion language able to support description of static and dynamic properties of the federation system. The assertions are a powerful means to describe the behavior of the entities interacting in the federation, and to define policies controlling access to services and privacy policies. We also propose a log-based approach for capturing the history of activities within the federation implemented as a set of tables stored at databases at the various organizations in the federation. We illustrate how, by using different types of queries on such tables, security properties of the federation can be verified","PeriodicalId":169233,"journal":{"name":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125145732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A context-aware, policy-based framework for the management of MANETs 用于管理manet的上下文感知的、基于策略的框架
A. Hadjiantonis, A. Malatras, G. Pavlou
{"title":"A context-aware, policy-based framework for the management of MANETs","authors":"A. Hadjiantonis, A. Malatras, G. Pavlou","doi":"10.1109/POLICY.2006.3","DOIUrl":"https://doi.org/10.1109/POLICY.2006.3","url":null,"abstract":"Mobile ad hoc networks (MANETs) are an emerging paradigm in wireless communications that has recently attracted a lot of attention. Their inherent benefits such as unrestrained computing, lack of centralization and ease of deployment at low costs are tightly bound with relevant deficiencies such as limited resources and management difficulty. There is a need for new management approaches to handle the requirements and specific characteristics of these networks. We propose a hybrid approach, employing a hierarchical and distributed organizational model for MANET management. We adopt a policy-based network management (PBNM) approach together with context awareness and we present our system architecture that is capable of effectively managing a MANET. We present and evaluate our approach under various application scenarios","PeriodicalId":169233,"journal":{"name":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","volume":"1086 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127428902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Bio-inspired Policy Based Management (bioPBM) for Autonomic Bio-inspired Policy Based Management (bioPBM) for Autonomic 自主生物激励的基于政策的管理(bioPBM
S. Balasubramaniam, Keara Barrett, W. Donnelly, S. Meer, J. Strassner
{"title":"Bio-inspired Policy Based Management (bioPBM) for Autonomic Bio-inspired Policy Based Management (bioPBM) for Autonomic","authors":"S. Balasubramaniam, Keara Barrett, W. Donnelly, S. Meer, J. Strassner","doi":"10.1109/POLICY.2006.12","DOIUrl":"https://doi.org/10.1109/POLICY.2006.12","url":null,"abstract":"The tremendous development of Internet infrastructures as well as communication technologies has led to an increase in network management complexity. Autonomic control is one way to manage complexity. Policy based management systems (PBMS) provide a consistent model for decision making using a set of abstractions (i.e., to manage the system in a manner that is independent from the complexities of low level network technologies). In this paper, we develop a hierarchical bio-inspired PBMS based on mechanisms for organism regulation that supports self-organisation and self-management at different levels of the hierarchy. We employ this mechanism towards network management of autonomic communications systems","PeriodicalId":169233,"journal":{"name":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126760397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信