A logic for reasoning about security
ACM Transactions on Computer Systems (TOCS)
Conflict analysis for management policies
Proceedings of the fifth IFIP/IEEE international symposium on Integrated network management V : integrated management in a virtual world: integrated management in a virtual world
Towards A Role-Based Framework for DistributedSystems Management
Journal of Network and Systems Management
A Flexible Method for Information System Security Policy Specification
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Using Event Calculus to Formalise Policy Specification and Analysis
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
On the theory of system administration
Science of Computer Programming
Analytical Network and System Administration: Managing Human-Computer Networks
Analytical Network and System Administration: Managing Human-Computer Networks
A Goal-based Approach to Policy Refinement
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
Configurable immunity for evolving human-computer systems
Science of Computer Programming - Methods of software design: Techniques and applications
A graph-theoretical model of computer security: From file sharing to social engineering
International Journal of Information Security
The Maelstrom: Network Service Debugging via "Ineffective Procedures"
LISA '01 Proceedings of the 15th USENIX conference on System administration
Archipelago: A Network Security Analysis Tool
LISA '03 Proceedings of the 17th USENIX conference on System administration
Formal Models of Capability-Based Protection Systems
IEEE Transactions on Computers
Voluntary cooperation in pervasive computing services
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Network patterns in cfengine and scalable data aggregation
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Estimating Reliability of Conditional Promises
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
Modeling Change Without Breaking Promises
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
Statistical Behaviors of Distributed Transition Planning
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Service Load Balancing with Autonomic Servers: Reversing the Decision Making Process
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Knowledge Management and Promises
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
Management without (Detailed) Models
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Combining Learned and Highly-Reactive Management
MACE '09 Proceedings of the 4th IEEE International Workshop on Modelling Autonomic Communications Environments
Testable system administration
Communications of the ACM
Troubleshooting with human-readable automated reasoning
LISA'10 Proceedings of the 24th international conference on Large installation system administration
An introduction to network stack design using software design patterns
MACE'10 Proceedings of the 5th IEEE international conference on Modelling autonomic communication environments
Testable System Administration
Queue - System Administration
A promise theory approach to collaborative power reduction in a pervasive computing environment
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A2thOS: availability analysis and optimisation in SLAs
International Journal of Network Management
Simulating UAV Surveillance for Analyzing Impact of Commitments in Multi-Agent Systems
International Journal of Agent Technologies and Systems
Hi-index | 0.02 |
Presently, there is no satisfactory model for dealing with political autonomy of agents in policy based management. A theory of atomic policy units called ‘promises' is therefore discussed. Using promises, a global authority is not required to build conventional management abstractions, but work is needed to bind peers into a traditional authoritative structure. The construction of promises is precise, if tedious, but can be simplified graphically to reason about the distributed effect of autonomous policy. Immediate applications include resolving the problem of policy conflicts in autonomous networks.