Proceedings Third International Workshop on Policies for Distributed Systems and Networks最新文献

筛选
英文 中文
A system to specify and manage multipolicy access control models 一个指定和管理多策略访问控制模型的系统
E. Bertino, B. Catania, E. Ferrari, P. Perlasca
{"title":"A system to specify and manage multipolicy access control models","authors":"E. Bertino, B. Catania, E. Ferrari, P. Perlasca","doi":"10.1109/POLICY.2002.1011299","DOIUrl":"https://doi.org/10.1109/POLICY.2002.1011299","url":null,"abstract":"This paper describes the architecture and the core specification language of an extensible access control system, called MACS-Multipolicy Access Control System. Several access control models are supported. by the proposed system, including the mandatory model, a flexible discretionary model, and RBAC. In addition, by using the core specification language, users can define their own access control models. The language is complemented by a number of tools supporting users in the tasks of model specification and analysis, and authorization management. The proposed system is a multipolicy system in that it allows one to apply different policies to different partitions of the set of objects to be protected. Therefore, different access control policies can co-exist, thus enhancing the flexibility of the system.","PeriodicalId":370124,"journal":{"name":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130827846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
An adaptive policy based management framework for differentiated services networks 基于自适应策略的差异化服务网络管理框架
L. Lymberopoulos, Emil C. Lupu, M. Sloman
{"title":"An adaptive policy based management framework for differentiated services networks","authors":"L. Lymberopoulos, Emil C. Lupu, M. Sloman","doi":"10.1109/POLICY.2002.1011302","DOIUrl":"https://doi.org/10.1109/POLICY.2002.1011302","url":null,"abstract":"This paper presents a framework for specifying policies for the management of differentiated services (DiffServ) networks. Although policy-based management has been the subject of intensifying research efforts, the proposed solutions are often restricted to condition-action rules where conditions are matched against incoming traffic flows. This results in static policy configurations where manual intervention is required to cater for configuration changes and to enable policy deployment. The framework presented supports automated policy deployment and flexible event triggers to permit dynamic policy configuration. Whilst current research focuses mostly on rules for low-level device configuration, significant challenges remain to be addressed in order to: 1) provide policy specification and adaptation across different abstraction layers; and 2) provide tools and services for the engineering of policy-driven systems. In particular, this paper focuses on solutions for dynamic adaptation of policy in DiffServ networks according to changes in requirements. Policy adaptation includes both dynamically changing policy parameters and reconfiguring the policy objects.","PeriodicalId":370124,"journal":{"name":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133397529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
Originator control in usage control 使用控制中的发起者控制
Jaehong Park, R. Sandhu
{"title":"Originator control in usage control","authors":"Jaehong Park, R. Sandhu","doi":"10.1109/POLICY.2002.1011294","DOIUrl":"https://doi.org/10.1109/POLICY.2002.1011294","url":null,"abstract":"Originator control is an access control policy that requires recipients to gain originator's approval for re-dissemination of disseminated digital object. Originator control policies are one of the generic and key concerns of usage control. Usage control is an emerging concept which encompasses traditional access control and digital rights management solutions. However, current commercial digital rights management (DRM) solutions lack enforcement of access control policies because their control of access to digital object is mainly based on payment. In this paper, we attempt to combine originator control policies and usage control. Then we show how this can extend traditional originator control solutions to enforce access control policies even outside of a local control environment where a central control authority is not available. License and ticket concepts are proposed and used for originator control in usage control. Also, we define seven different solution approaches to deal with various dissemination situations. In addition, we discuss some published DRM solutions and relate these to our solution approaches.","PeriodicalId":370124,"journal":{"name":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133057675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Policy-driven access control over a distributed firewall architecture 分布式防火墙架构上的策略驱动访问控制
T. Dimitrakos, I. Djordjevic, B. Matthews, J. Bicarregui, Chris I. Phillips
{"title":"Policy-driven access control over a distributed firewall architecture","authors":"T. Dimitrakos, I. Djordjevic, B. Matthews, J. Bicarregui, Chris I. Phillips","doi":"10.1109/POLICY.2002.1011314","DOIUrl":"https://doi.org/10.1109/POLICY.2002.1011314","url":null,"abstract":"Motivated by a scientific application, where virtual organisations are dynamically created to achieve specific goals by sharing resources and information, we propose the synthesis of two lines of research: policy-based access control and distributed firewalls. Through this fusion we expect to deliver a scalable method of setting up security infrastructures for Grid computing infrastructures.","PeriodicalId":370124,"journal":{"name":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133059940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Dynamically extensible policy server and agent 动态扩展策略服务器和代理
Y. Kanada
{"title":"Dynamically extensible policy server and agent","authors":"Y. Kanada","doi":"10.1109/POLICY.2002.1011316","DOIUrl":"https://doi.org/10.1109/POLICY.2002.1011316","url":null,"abstract":"This paper proposes a method, called the policy-extension-by-policy method, for quickly and dynamically adding policy classes with new functionality to policy servers and agents. In this method, users can add a new policy class to the policy server by using policy-definition (PD) policies, and they can define a method to translate a policy of the new class and to send to network nodes of different vendors through various types of device interfaces, such as CLI, MIBs, PIBs, APIs or hardware tables, by using policy-embedding (PE) policies. A PE policy also enables translating a policy of an existing class and sending the result to a new type of network node. PE policies contain command templates and methods for filling the templates. A program interpreter is embedded in policy agents to make flexible policy-to-configuration translation possible. A prototype system and example policies, i.e., access control, Diffserv, and VPN policies, were developed.","PeriodicalId":370124,"journal":{"name":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133127036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
PEM/sup 3/ - the policy enhanced memory management model PEM/sup 3/—策略增强的内存管理模型
J. Andersson, S. Weber, C. Jensen, V. Cahill
{"title":"PEM/sup 3/ - the policy enhanced memory management model","authors":"J. Andersson, S. Weber, C. Jensen, V. Cahill","doi":"10.1109/POLICY.2002.1011306","DOIUrl":"https://doi.org/10.1109/POLICY.2002.1011306","url":null,"abstract":"Over the past decade, clusters of workstations have become widely accepted as a cost efficient way of obtaining computational power. Moreover, clusters have increasingly been used to support multi-application environment, such as web servers and application servers, and to concurrently support a number of different services. In such an environment, resources become difficult to manage, e.g., it is difficult to adequately support the varying memory usage requirements of each application with a single strategy. In this paper we propose a policy-based model that provides applications with an interface to the underlying system in order to adapt the behavior of system services at runtime. The use of policies is illustrated by presenting the design of a memory management model for distributed shared memory systems, which allows different memory placement policies, while providing the ability to change consistency and coherency protocols at runtime.","PeriodicalId":370124,"journal":{"name":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117227143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying trust policies for protecting mobile agents against DoS 应用信任策略保护移动代理免受DoS攻击
Biljana Cubaleska, Markus Schneider
{"title":"Applying trust policies for protecting mobile agents against DoS","authors":"Biljana Cubaleska, Markus Schneider","doi":"10.1109/POLICY.2002.1011307","DOIUrl":"https://doi.org/10.1109/POLICY.2002.1011307","url":null,"abstract":"In the world of mobile agents, security aspects are extensively being discussed. Denial of service (DoS) attacks are of considerable interest, i.e., when malicious hosts either delete received agents or prevent them from continuing their route. This paper presents a method for a posteriori identification of such malicious hosts to build a trust policy. Depending on how much the agent owner trusts the hosts, he can either define an appropriate order in which selected hosts should be visited, or he can decide which hosts he does not want to contact again. We also show how the sequence of hosts should be determined in order to minimize some costs.","PeriodicalId":370124,"journal":{"name":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A policy-based infrastructure for the dynamic control of agent mobility 用于动态控制代理移动性的基于策略的基础设施
R. Montanari, G. Tonti
{"title":"A policy-based infrastructure for the dynamic control of agent mobility","authors":"R. Montanari, G. Tonti","doi":"10.1109/POLICY.2002.1011309","DOIUrl":"https://doi.org/10.1109/POLICY.2002.1011309","url":null,"abstract":"There is an increasing research interest toward the mobility of software components. However, mobility adds complexity to the design of applications because programmers have to decide when, where and which components to migrate. The typical approach to mobility is to embed migration directives into component code at design time. This makes difficult to dynamically change migration strategies in order to adapt to evolving conditions of the execution environment. This paper advocates a policy-based approach for the specification and dynamic control of component mobility and presents a framework obtained by integrating a policy-based management system in a mobile agent environment.","PeriodicalId":370124,"journal":{"name":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121580537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A policy-based approach to personalization of communication over converged networks 融合网络上通信个性化的基于策略的方法
P. Lago
{"title":"A policy-based approach to personalization of communication over converged networks","authors":"P. Lago","doi":"10.1109/POLICY.2002.1011304","DOIUrl":"https://doi.org/10.1109/POLICY.2002.1011304","url":null,"abstract":"In this study, \"personalization\" represents the possibility for a user to filter incoming communication requests, and to process them according to personal preferences and lifestyle. This paper describes a policy-based approach to personalization. The basic idea is to use a generalized user-oriented policy concept, at a higher level of abstraction than policies in networking. User-oriented policies define how communication should be handled by software architecture, according to a user-oriented perception of services, and abstracting from heterogeneity like difference in networks, communication protocols, applications, and devices/terminals. Due to the high-level policy-based approach we used, we may apply personalization also to advanced scenarios like services over converged networks: in our approach, policies represent personalization in an abstract way, and network and service technologies are transparently integrated in a component-based software architecture to which personalized communication is delegated. Our policy-based approach also shows how policies can be profitably applied in a context different from networking.","PeriodicalId":370124,"journal":{"name":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124893335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A policy-based storage management framework 基于策略的存储管理框架
M. Devarakonda, Jack P. Gelb, Avi Saha, J. P. Strickland
{"title":"A policy-based storage management framework","authors":"M. Devarakonda, Jack P. Gelb, Avi Saha, J. P. Strickland","doi":"10.1109/POLICY.2002.1011315","DOIUrl":"https://doi.org/10.1109/POLICY.2002.1011315","url":null,"abstract":"Administrators of the modem IT infrastructure are faced with the problem of escalating complexities and increasing costs associated with distributed resource management. This position paper presents an architectural framework for policy-based management to help mitigate this cost and complexity for the storage environment. In this framework the storage environment is managed by policy at application, data, and storage levels. We use collections of logical attributes to describe classes at each level and use connectors to provide mapping between the collections at different levels.","PeriodicalId":370124,"journal":{"name":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129623194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信