Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks最新文献

筛选
英文 中文
Using event calculus to formalise policy specification and analysis 使用事件演算形式化策略规范和分析
A. Bandara, Emil C. Lupu, A. Russo
{"title":"Using event calculus to formalise policy specification and analysis","authors":"A. Bandara, Emil C. Lupu, A. Russo","doi":"10.1109/POLICY.2003.1206955","DOIUrl":"https://doi.org/10.1109/POLICY.2003.1206955","url":null,"abstract":"As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods for performing analysis and refinement of policy specifications. Although this is an area that researchers have devoted some attention to, none of the proposed solutions address the issues of analysing specifications that combine authorisation and management policies; analysing policy specifications that contain constraints on the applicability of the policies; and performing a priori analysis of the specification that will both detect the presence of inconsistencies and explain the situations in which the conflict will occur. We present a method for transforming both policy and system behaviour specifications into a formal notation that is based on event calculus. Additionally it describes how this formalism can be used in conjunction with abductive reasoning techniques to perform a priori analysis of policy specifications for the various conflict types identified in the literature. Finally, it presents some initial thoughts on how this notation and analysis technique could be used to perform policy refinement.","PeriodicalId":391947,"journal":{"name":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115021119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 205
A policy language for a pervasive computing environment 用于普适计算环境的策略语言
Lalana Kagal, Timothy W. Finin, A. Joshi
{"title":"A policy language for a pervasive computing environment","authors":"Lalana Kagal, Timothy W. Finin, A. Joshi","doi":"10.1109/POLICY.2003.1206958","DOIUrl":"https://doi.org/10.1109/POLICY.2003.1206958","url":null,"abstract":"We describe a policy language designed for pervasive computing applications that is based on deontic concepts and grounded in a semantic language. The pervasive computing environments under consideration are those in which people and devices are mobile and use various wireless networking technologies to discover and access services and devices in their vicinity. Such pervasive environments lend themselves to policy-based security due to their extremely dynamic nature. Using policies allows the security functionality to be modified without changing the implementation of the entities involved. However, along with being extremely dynamic, these environments also tend to span several domains and be made up of entities of varied capabilities. A policy language for environments of this sort needs to be very expressive but lightweight and easily extensible. We demonstrate the feasibility of our policy language in pervasive environments through a prototype used as part of a secure pervasive system.","PeriodicalId":391947,"journal":{"name":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122790419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 623
Analysis of integrity policies using soft constraints 使用软约束的完整性策略分析
Stefano Bistarelli, S. Foley
{"title":"Analysis of integrity policies using soft constraints","authors":"Stefano Bistarelli, S. Foley","doi":"10.1109/POLICY.2003.1206959","DOIUrl":"https://doi.org/10.1109/POLICY.2003.1206959","url":null,"abstract":"An integrity policy defines the situations when modification of information is authorized and is enforced by the security mechanisms of the system. However, in a complex application system it is possible that an integrity policy may have been incorrectly specified and, as a result, a user may be authorized to modify information that can lead to an unexpected system compromise. We outline a scalable and quantitative technique that uses constraint solving to model and analyze the effectiveness of application system integrity policies.","PeriodicalId":391947,"journal":{"name":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114468644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A PBNM system for integrated QoS and multicast management 一种综合QoS和组播管理的PBNM系统
L. Granville, L. Vaguetti, M. Almeida, L. Tarouco
{"title":"A PBNM system for integrated QoS and multicast management","authors":"L. Granville, L. Vaguetti, M. Almeida, L. Tarouco","doi":"10.1109/POLICY.2003.1206980","DOIUrl":"https://doi.org/10.1109/POLICY.2003.1206980","url":null,"abstract":"QoS and multicast are facilities that several modern applications require from networks. However, the management of such facilities is complex and not integrated. We present a policy-based management architecture and system for the integrated management of QoS and multicast-enabled networks. The definition of policies for this architecture is also presented. The proposed architecture is based on the IETF approach. However, we discuss how such approach had to be adapted in order to support not only QoS management but also multicast management. Finally, we also present the implementation of our proposal providing some management example scenarios.","PeriodicalId":391947,"journal":{"name":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131956654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Policy contexts: controlling information flow in parameterised RBAC 策略上下文:在参数化RBAC中控制信息流
András Belokosztolszki, D. Eyers, K. Moody
{"title":"Policy contexts: controlling information flow in parameterised RBAC","authors":"András Belokosztolszki, D. Eyers, K. Moody","doi":"10.1109/POLICY.2003.1206964","DOIUrl":"https://doi.org/10.1109/POLICY.2003.1206964","url":null,"abstract":"Many RBAC models have augmented the fundamental requirement of a role abstraction with features such as parameterised roles and environment-aware policy. We examine the potential for unintentional leakage of information during RBAC policy enforcement, either through the exchange of parameters with external services when checking environmental conditions, or through a policy design which does not appropriately separate policy subsections with different basic purposes. We propose a simple, robust mechanism for handling these problems, and illustrate our approach with a current application of our OASIS RBAC system.","PeriodicalId":391947,"journal":{"name":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115627507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Towards automated negotiation of access control policies 实现访问控制策略的自动协商
Vijay G. Bharadwaj, J. Baras
{"title":"Towards automated negotiation of access control policies","authors":"Vijay G. Bharadwaj, J. Baras","doi":"10.1109/POLICY.2003.1206965","DOIUrl":"https://doi.org/10.1109/POLICY.2003.1206965","url":null,"abstract":"We examine the problem of negotiating access control policies between autonomous domains. Our objective is to develop software agents that can automatically negotiate access control policies between autonomous domains with minimal human guidance. We show a mathematical framework that is capable of expressing many such negotiation problems, and illustrate its application to some practical scenarios.","PeriodicalId":391947,"journal":{"name":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126127191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Using policies in the checking of business to business contracts 在企业对企业合同的检查中使用策略
P. Linington, Stephen W. Neal
{"title":"Using policies in the checking of business to business contracts","authors":"P. Linington, Stephen W. Neal","doi":"10.1109/POLICY.2003.1206975","DOIUrl":"https://doi.org/10.1109/POLICY.2003.1206975","url":null,"abstract":"The mechanization of business-to-business contract enforcement requires a clear architecture and a clear and unambiguous underpinning model of the way permissions and obligations are managed within organizations. Policies need to be expressed in terms of the basic model, and the expressive power available depends, in part, on the ability to compose sets of policies derived from different sources. The models used must reflect the structure of the organizations concerned and how the behaviour of organizations is constrained by broader shared rules. We consider a contract monitoring system intended to provide automated checking of business to business contracts, sets out a suitable model and explain how it can be used to guide the representation and control of contracts in a prototype monitoring system.","PeriodicalId":391947,"journal":{"name":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126822914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Policy based electronic transmission of prescriptions 基于政策的处方电子传输
D. Chadwick, D. Mundy
{"title":"Policy based electronic transmission of prescriptions","authors":"D. Chadwick, D. Mundy","doi":"10.1109/POLICY.2003.1206974","DOIUrl":"https://doi.org/10.1109/POLICY.2003.1206974","url":null,"abstract":"We describe the PERMIS PMI role based authorisation policy, and show how it has been applied to the electronic transfer of prescriptions (ETP). The assignment of roles is distributed to the appropriate authorities in the health care and government sectors. This includes the assignment of both professional roles such as doctor and dentist, as well as patient roles that entitle patients to free prescriptions. All roles are stored as X.509 attribute certificates (ACs) in LDAP directories, which are managed by the assigning authorities. The PERMIS policy based decision engine subsequently retrieves these role ACs in order to make granted or denied access control decisions required by the ETP applications. The source of authority for setting the ETP policy is assumed to be the Secretary of State for Health. The ETP policy says what roles are recognised, who is authorised to assign the roles, what privileges are granted to each role and what conditions are attached to these privileges. The ETP policy is then formatted in XML, embedded in an X.509 attribute certificate, digitally signed by the Secretary of State for Health, and then stored in an LDAP directory. From here it can be accessed by all the ETP applications in the UK National Health Service that contain embedded policy based PERMIS decision engines.","PeriodicalId":391947,"journal":{"name":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125677920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A policy based approach for automated topology management of peer to peer networks and a prototype implementation 一种基于策略的对等网络自动拓扑管理方法及原型实现
Antonio Di Ferdinando, P. McKee, A. Amoroso
{"title":"A policy based approach for automated topology management of peer to peer networks and a prototype implementation","authors":"Antonio Di Ferdinando, P. McKee, A. Amoroso","doi":"10.1109/POLICY.2003.1206978","DOIUrl":"https://doi.org/10.1109/POLICY.2003.1206978","url":null,"abstract":"Peer-to-peer (P2P) is a flexible architecture that let a network grow up in an arbitrary way by adding more and more peers providing resources to the whole system. If uncontrolled, however, this growth might lead to stability and reliability problems, due to the fact that any host might join the network, no matter whether it may provide guarantees or not. Another problem that might occur is the difficulty to administrate the network due to its possibly uncontrolled growth and its frequent topological changes. We focus on the description of an approach to administration's automation based on the systematic use of policies. The goal is achieved by means of evaluation of the resources owned by each host, which addresses the problem of provision od reliable resources too. We believe this is a good solution to both problems. We explain how our approach works and the benefits rising from its use. In order to better test our approach we developed and tested a working prototype of the system.","PeriodicalId":391947,"journal":{"name":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134447907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Towards policy-based information management for the Joint Battlespace Infosphere 面向联合战场信息空间的基于策略的信息管理
R. Cherinka, C. Wild, D. Allen, C. Smith, Y. Zhang, R. Panek, S. Semy
{"title":"Towards policy-based information management for the Joint Battlespace Infosphere","authors":"R. Cherinka, C. Wild, D. Allen, C. Smith, Y. Zhang, R. Panek, S. Semy","doi":"10.1109/POLICY.2003.1206961","DOIUrl":"https://doi.org/10.1109/POLICY.2003.1206961","url":null,"abstract":"The vision of a Joint Battlespace Infosphere has evolved within the US department of defense as an Internet-like foundation to provide tailored information services and flow among producers and consumers of information needed to conduct military operations. The architecture envisioned for realizing this vision is based on a loosely coupled information environment using commercial standard Web protocols. One of the main obstacles to widespread acceptance of loosely coupled systems is the difficulty of establishing and maintaining control consistent with overall mission constraints and objectives. Policy-based information dissemination management is a mechanism for influencing the flow of information between publishers and subscribers in order to support diverse mission objectives. We describe research being done on the selection and integration of policy-based management services, effectively bridging the gap between those services and the information brokering capabilities of a JBI platform.","PeriodicalId":391947,"journal":{"name":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信