Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)最新文献

筛选
英文 中文
A Socio-cognitive Approach to Modeling Policies in Open Environments 开放环境中政策建模的社会认知方法
T. Ryutov
{"title":"A Socio-cognitive Approach to Modeling Policies in Open Environments","authors":"T. Ryutov","doi":"10.1109/POLICY.2007.3","DOIUrl":"https://doi.org/10.1109/POLICY.2007.3","url":null,"abstract":"The richness of today's electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current interactions have become a form of social exchange where participants must deal with complexity, uncertainty and risk. We propose a policy specification approach that combines social sciences and trust theory to facilitate ad-hoc interactions of self-interested parties in open environments. Our socio-cognitive approach allows us to reason about uncertainty and risk involved in a transaction, and automatically calculate the minimum trust threshold needed to mitigate the vulnerabilities. The trust threshold comprises the core of security policies that govern the interactions. The threshold calculation is based on balancing objective and subjective trust components, which together predict that a transaction will result in an acceptable outcome. We propose to apply the prospect theory (D. Kahneman and A. Tversky, 1979) to specify policies that determine a set of acceptable outcomes. We present the trust threshold negotiation primitives.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Policy-Driven Distributed Authorization: Status and Prospects 策略驱动的分布式授权:现状与展望
M. Winslett
{"title":"Policy-Driven Distributed Authorization: Status and Prospects","authors":"M. Winslett","doi":"10.1109/POLICY.2007.35","DOIUrl":"https://doi.org/10.1109/POLICY.2007.35","url":null,"abstract":"Policies show great potential as a way to control the behavior of complex computer systems. In the case of authorization decisions in large distributed systems, policies offer the potential to abstract away from the details of who is allowed to access which services, under which conditions. This layer of abstraction is both a challenge and an opportunity: policy-driven distributed authorization systems may be more manageable, scalable, available, and secure than previous approaches---or they may be just the opposite. In the talk that accompanies this paper paper, we survey the status of the field and its near- term prospects, from both a theoretical and a practical perspective, and point out the major barriers to the adoption of policy-driven authorization systems in industry.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124228882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards an Approach for Hybrid Trust Model 一种混合信任模型的实现方法
P. Jaillon, Marc Roelens, Xavier Serpaggi, Hoan Vu
{"title":"Towards an Approach for Hybrid Trust Model","authors":"P. Jaillon, Marc Roelens, Xavier Serpaggi, Hoan Vu","doi":"10.1109/POLICY.2007.43","DOIUrl":"https://doi.org/10.1109/POLICY.2007.43","url":null,"abstract":"We present here an approach for a hybrid model of trust. Our idea on the trust model is that all evidences on interactions could be used to measure the trust on required actions before taking the decision. We use the policy language proposed by Krukow et al.[2], with some slight modifications to specify our trust model.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"84 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131830944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange Asterisk电话专用分支交换机的呼叫管理策略规范
G. Konstantoulakis, M. Sloman
{"title":"Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange","authors":"G. Konstantoulakis, M. Sloman","doi":"10.1109/POLICY.2007.10","DOIUrl":"https://doi.org/10.1109/POLICY.2007.10","url":null,"abstract":"Both users and administrators need a flexible and easy to use means of specifying call management policies to take advantage of the call handling functionality for selective forwarding, cost based outward call routing, recording calls etc. which are supported by a VoIP PBX. This paper presents a case study of a system for specifying and implementing policies, as well as detecting and resolving policy conflicts for the Asterisk PBX.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124335911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Handling Dynamic Organizational Change with Community-Based Policy Management 以社区为基础的政策管理处理动态组织变化
K. Feeney, D. Lewis, V. Wade
{"title":"Handling Dynamic Organizational Change with Community-Based Policy Management","authors":"K. Feeney, D. Lewis, V. Wade","doi":"10.1109/POLICY.2007.24","DOIUrl":"https://doi.org/10.1109/POLICY.2007.24","url":null,"abstract":"Policy-based management (PBM) aims to provide flexibility in the management of resources so as to readily reflect changing business goals. However, as organizations increasingly use electronic means for more of their core business operations, the ability to ensure that policies accurately reflect the operation of an organization becomes more challenging. This paper presents a critique of organizational modeling abstractions used in existing policy and access rule schemes.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116966435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-level Policy Representation for Management Services in Maritime Networks 海事网络中管理服务的多级策略表示
Francis St-Onge, D. Kidston, I. Labbé
{"title":"A Multi-level Policy Representation for Management Services in Maritime Networks","authors":"Francis St-Onge, D. Kidston, I. Labbé","doi":"10.1109/POLICY.2007.1","DOIUrl":"https://doi.org/10.1109/POLICY.2007.1","url":null,"abstract":"A policy-based traffic management (PBTM) prototype was developed to investigate the effective management of communication resources in a tactical maritime environment. The system design includes a combination of Web services (WS) and policy-based network management (PBNM) techniques. The paper describes a multi-level XML-based policy representation developed for use in the PBTM prototype. Three levels of policies are defined: the high level, the specification level and the low level. The policy representation for each level is given. Aspects that are particular to the system are also discussed. These aspects include hierarchical policy scopes, a rule engine and conflict resolution mechanisms developed specifically for use in the maritime environment.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115521086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Policy-Driven Trading Framework for Market-Based Spectrum Assignment 基于市场的频谱分配政策驱动的交易框架
P. Argyroudis, T. Forde, L. Doyle, D. O'Mahony
{"title":"A Policy-Driven Trading Framework for Market-Based Spectrum Assignment","authors":"P. Argyroudis, T. Forde, L. Doyle, D. O'Mahony","doi":"10.1109/POLICY.2007.2","DOIUrl":"https://doi.org/10.1109/POLICY.2007.2","url":null,"abstract":"We present a policy-driven trading framework for market-based spectrum assignment. Our work allows spectrum consumers to get exclusive access rights through payment of a fee, for a given period of time, and for a given frequency band and location. The key motivation behind our proposal stems from the increased complexity of new spectrum management strategies and the need for extracting the maximum benefit from the available spectrum. In this paper we demonstrate that a policy-driven solution is applicable for the management of spectrum markets, and we present a decentralised and lightweight framework for implementing such markets in networked environments.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122676170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Policy-Based Parametric Firewall Configuration: A Real-Case Application 基于策略的防火墙参数配置:一个实际应用
M. Marchi, Romeo Penzo, A. Provetti
{"title":"Policy-Based Parametric Firewall Configuration: A Real-Case Application","authors":"M. Marchi, Romeo Penzo, A. Provetti","doi":"10.1109/POLICY.2007.34","DOIUrl":"https://doi.org/10.1109/POLICY.2007.34","url":null,"abstract":"We describe a simple policy language for setting up and running firewalls (FW). The language allows to describe sophisticated policies for controlling network connections. Composition is done at set-up time, when a parser, starting from a given policy, generates the relative configuration file for one or more firewalls operating the industry-standard Linux Iptables kernel extension. The policy captures the essence of the desired requirements and constrains upon connections between zones. The language has been designed and it is currently on testing in the context of a large intra/extranet with more than 10,000 assigned IP addresses.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125543815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Specifying and Enforcing High-Level Semantic Obligation Policies 指定和执行高级语义义务策略
Zhen Liu, A. Ranganathan, A. Riabov
{"title":"Specifying and Enforcing High-Level Semantic Obligation Policies","authors":"Zhen Liu, A. Ranganathan, A. Riabov","doi":"10.1109/POLICY.2007.41","DOIUrl":"https://doi.org/10.1109/POLICY.2007.41","url":null,"abstract":"Obligation policies specify management actions that must be performed when a particular kind of event occurs and certain conditions are satisfied. Large scale distributed systems often produce event streams containing large volumes of low-level events. In many cases, these streams also contain multimedia data (consisting of text, audio or video). Hence, a key challenge is to allow policy writers to specify obligation policies based on high-level events, that may be derived after performing appropriate processing on raw, low-level events. In this paper, we propose a semantic obligation policy specification language called Eagle, which is based on patterns of high-level events, represented as RDF graph patterns. Our policy enforcement architecture uses a compiler that builds a workflow for producing a stream of events, which match the high-level event pattern specified in a policy. This workflow consists of a number of event sources and event processing components, which are described semantically. We present the policy language and enforcement architecture in this paper.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On Automated Policy Generation for Mobile Ad Hoc Networks 移动Ad Hoc网络策略自动生成研究
C. Chiang, G. Levin, Y. Gottlieb, R. Chadha, Shihwei Li, A. Poylisher, S. Newman, R. Lo
{"title":"On Automated Policy Generation for Mobile Ad Hoc Networks","authors":"C. Chiang, G. Levin, Y. Gottlieb, R. Chadha, Shihwei Li, A. Poylisher, S. Newman, R. Lo","doi":"10.1109/POLICY.2007.28","DOIUrl":"https://doi.org/10.1109/POLICY.2007.28","url":null,"abstract":"In this paper we describe an approach to the problem of automated policy generation for mobile ad hoc networks. The automated policy generation problem is difficult in its own right. It becomes even more challenging when the context environment to consider is a mobile ad hoc network. We have designed an optimization-based, utility-driven approach aimed at generating optimal policies with respect to the given network objectives. The main novelty of this approach is in the combination of optimization heuristics and network simulation to solve the problem. We describe this approach, present the software architecture of our implementation, and illustrate the approach with a case study on automated generation of DiffServ-based QoS policies for a 50-node mobile ad hoc network.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130153181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信