Directory Enabled Networks
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
eXist: An Open Source Native XML Database
Revised Papers from the NODe 2002 Web and Database-Related Workshops on Web, Web-Services, and Database Systems
Policy Conflict Analysis for Quality of Service Management
POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
A Policy-based Management Framework for Pervasive Systems using Axiomatized Rule-Actions
NCA '05 Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Ontology-based knowledge representation for self-governing systems
DSOM'06 Proceedings of the 17th IFIP/IEEE international conference on Distributed Systems: operations and management
Harnessing Models for Policy Conflict Analysis
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
Towards an Information Model That Supports Service-Aware, Self-managing Virtual Resources
MACE '08 Proceedings of the 3rd IEEE international workshop on Modelling Autonomic Communications Environments
On harnessing information models and ontologies for policy conflict analysis
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Policy refinement: decomposition and operationalization for dynamic domains
Proceedings of the 7th International Conference on Network and Services Management
Model-Based usage control policy derivation
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Hi-index | 0.00 |
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algorithm for the retrieval of application-specific data from an information model relating to the subject and targets of a given policy. This algorithm facilitates the linkage of policies loosely defined at a high level of abstraction to detailed behavioural constraints specified in the information model. Based on these constraints policies are then modified so that conflicts with other deployed policies can be readily identified using standard policy conflict detection techniques. This approach enables policy enforcement to be cognisant of application specific constraints, thereby resulting in a more trustworthy and dependable policy based management system.