{"title":"A Socio-cognitive Approach to Modeling Policies in Open Environments","authors":"T. Ryutov","doi":"10.1109/POLICY.2007.3","DOIUrl":"https://doi.org/10.1109/POLICY.2007.3","url":null,"abstract":"The richness of today's electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current interactions have become a form of social exchange where participants must deal with complexity, uncertainty and risk. We propose a policy specification approach that combines social sciences and trust theory to facilitate ad-hoc interactions of self-interested parties in open environments. Our socio-cognitive approach allows us to reason about uncertainty and risk involved in a transaction, and automatically calculate the minimum trust threshold needed to mitigate the vulnerabilities. The trust threshold comprises the core of security policies that govern the interactions. The threshold calculation is based on balancing objective and subjective trust components, which together predict that a transaction will result in an acceptable outcome. We propose to apply the prospect theory (D. Kahneman and A. Tversky, 1979) to specify policies that determine a set of acceptable outcomes. We present the trust threshold negotiation primitives.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Policy-Driven Distributed Authorization: Status and Prospects","authors":"M. Winslett","doi":"10.1109/POLICY.2007.35","DOIUrl":"https://doi.org/10.1109/POLICY.2007.35","url":null,"abstract":"Policies show great potential as a way to control the behavior of complex computer systems. In the case of authorization decisions in large distributed systems, policies offer the potential to abstract away from the details of who is allowed to access which services, under which conditions. This layer of abstraction is both a challenge and an opportunity: policy-driven distributed authorization systems may be more manageable, scalable, available, and secure than previous approaches---or they may be just the opposite. In the talk that accompanies this paper paper, we survey the status of the field and its near- term prospects, from both a theoretical and a practical perspective, and point out the major barriers to the adoption of policy-driven authorization systems in industry.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124228882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Jaillon, Marc Roelens, Xavier Serpaggi, Hoan Vu
{"title":"Towards an Approach for Hybrid Trust Model","authors":"P. Jaillon, Marc Roelens, Xavier Serpaggi, Hoan Vu","doi":"10.1109/POLICY.2007.43","DOIUrl":"https://doi.org/10.1109/POLICY.2007.43","url":null,"abstract":"We present here an approach for a hybrid model of trust. Our idea on the trust model is that all evidences on interactions could be used to measure the trust on required actions before taking the decision. We use the policy language proposed by Krukow et al.[2], with some slight modifications to specify our trust model.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"84 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131830944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange","authors":"G. Konstantoulakis, M. Sloman","doi":"10.1109/POLICY.2007.10","DOIUrl":"https://doi.org/10.1109/POLICY.2007.10","url":null,"abstract":"Both users and administrators need a flexible and easy to use means of specifying call management policies to take advantage of the call handling functionality for selective forwarding, cost based outward call routing, recording calls etc. which are supported by a VoIP PBX. This paper presents a case study of a system for specifying and implementing policies, as well as detecting and resolving policy conflicts for the Asterisk PBX.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124335911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handling Dynamic Organizational Change with Community-Based Policy Management","authors":"K. Feeney, D. Lewis, V. Wade","doi":"10.1109/POLICY.2007.24","DOIUrl":"https://doi.org/10.1109/POLICY.2007.24","url":null,"abstract":"Policy-based management (PBM) aims to provide flexibility in the management of resources so as to readily reflect changing business goals. However, as organizations increasingly use electronic means for more of their core business operations, the ability to ensure that policies accurately reflect the operation of an organization becomes more challenging. This paper presents a critique of organizational modeling abstractions used in existing policy and access rule schemes.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116966435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-level Policy Representation for Management Services in Maritime Networks","authors":"Francis St-Onge, D. Kidston, I. Labbé","doi":"10.1109/POLICY.2007.1","DOIUrl":"https://doi.org/10.1109/POLICY.2007.1","url":null,"abstract":"A policy-based traffic management (PBTM) prototype was developed to investigate the effective management of communication resources in a tactical maritime environment. The system design includes a combination of Web services (WS) and policy-based network management (PBNM) techniques. The paper describes a multi-level XML-based policy representation developed for use in the PBTM prototype. Three levels of policies are defined: the high level, the specification level and the low level. The policy representation for each level is given. Aspects that are particular to the system are also discussed. These aspects include hierarchical policy scopes, a rule engine and conflict resolution mechanisms developed specifically for use in the maritime environment.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115521086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Policy-Driven Trading Framework for Market-Based Spectrum Assignment","authors":"P. Argyroudis, T. Forde, L. Doyle, D. O'Mahony","doi":"10.1109/POLICY.2007.2","DOIUrl":"https://doi.org/10.1109/POLICY.2007.2","url":null,"abstract":"We present a policy-driven trading framework for market-based spectrum assignment. Our work allows spectrum consumers to get exclusive access rights through payment of a fee, for a given period of time, and for a given frequency band and location. The key motivation behind our proposal stems from the increased complexity of new spectrum management strategies and the need for extracting the maximum benefit from the available spectrum. In this paper we demonstrate that a policy-driven solution is applicable for the management of spectrum markets, and we present a decentralised and lightweight framework for implementing such markets in networked environments.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122676170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Policy-Based Parametric Firewall Configuration: A Real-Case Application","authors":"M. Marchi, Romeo Penzo, A. Provetti","doi":"10.1109/POLICY.2007.34","DOIUrl":"https://doi.org/10.1109/POLICY.2007.34","url":null,"abstract":"We describe a simple policy language for setting up and running firewalls (FW). The language allows to describe sophisticated policies for controlling network connections. Composition is done at set-up time, when a parser, starting from a given policy, generates the relative configuration file for one or more firewalls operating the industry-standard Linux Iptables kernel extension. The policy captures the essence of the desired requirements and constrains upon connections between zones. The language has been designed and it is currently on testing in the context of a large intra/extranet with more than 10,000 assigned IP addresses.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125543815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specifying and Enforcing High-Level Semantic Obligation Policies","authors":"Zhen Liu, A. Ranganathan, A. Riabov","doi":"10.1109/POLICY.2007.41","DOIUrl":"https://doi.org/10.1109/POLICY.2007.41","url":null,"abstract":"Obligation policies specify management actions that must be performed when a particular kind of event occurs and certain conditions are satisfied. Large scale distributed systems often produce event streams containing large volumes of low-level events. In many cases, these streams also contain multimedia data (consisting of text, audio or video). Hence, a key challenge is to allow policy writers to specify obligation policies based on high-level events, that may be derived after performing appropriate processing on raw, low-level events. In this paper, we propose a semantic obligation policy specification language called Eagle, which is based on patterns of high-level events, represented as RDF graph patterns. Our policy enforcement architecture uses a compiler that builds a workflow for producing a stream of events, which match the high-level event pattern specified in a policy. This workflow consists of a number of event sources and event processing components, which are described semantically. We present the policy language and enforcement architecture in this paper.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Chiang, G. Levin, Y. Gottlieb, R. Chadha, Shihwei Li, A. Poylisher, S. Newman, R. Lo
{"title":"On Automated Policy Generation for Mobile Ad Hoc Networks","authors":"C. Chiang, G. Levin, Y. Gottlieb, R. Chadha, Shihwei Li, A. Poylisher, S. Newman, R. Lo","doi":"10.1109/POLICY.2007.28","DOIUrl":"https://doi.org/10.1109/POLICY.2007.28","url":null,"abstract":"In this paper we describe an approach to the problem of automated policy generation for mobile ad hoc networks. The automated policy generation problem is difficult in its own right. It becomes even more challenging when the context environment to consider is a mobile ad hoc network. We have designed an optimization-based, utility-driven approach aimed at generating optimal policies with respect to the given network objectives. The main novelty of this approach is in the combination of optimization heuristics and network simulation to solve the problem. We describe this approach, present the software architecture of our implementation, and illustrate the approach with a case study on automated generation of DiffServ-based QoS policies for a 50-node mobile ad hoc network.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130153181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}