Automated Management of IP Networks through Policy and Mobile Agents
MATA '02 Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
Active Robust Resource Management in Cluster Computing Using Policies
Journal of Network and Systems Management
Automatic enforcement of location aware user based network access control policies
TELE-INFO'08 Proceedings of the 7th WSEAS International Conference on Telecommunications and Informatics
A Role-Based Infrastructure for the Management of Dynamic Communities
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Location aware self-adapting firewall policies
WSEAS TRANSACTIONS on COMMUNICATIONS
Compositional Refinement of Policies in UML --- Exemplified for Access Control
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
An Adaptive Policy-Based Approach to SPIT Management
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
An engineering process for developing Secure Data Warehouses
Information and Software Technology
Dynamic and secure management of VPNs in IPv6 multi-domain scenarios
Computer Communications
Privacy challenges and solutions in the social web
Crossroads - The Social Web
A2A: An Architecture for Autonomic Management Coordination
DSOM '09 Proceedings of the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Integrated Management of Systems, Services, Processes and People in IT
Policy-based integration of multiprovider digital home services
IEEE Network: The Magazine of Global Internetworking
ANGLE: An autonomous, normative and guidable agent with changing knowledge
Information Sciences: an International Journal
Electronic Commerce Research
Enabling access to web resources through SecPODE-based annotations
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems
Policy-driven network simulation: a resilience case study
Proceedings of the 2011 ACM Symposium on Applied Computing
Policy based charging in multimedia networks
MMNS'05 Proceedings of the 8th international conference on Management of Multimedia Networks and Services
A generic policy-conflict handling model
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Unleashing the power of policies for service-oriented computing
Proceedings of the 7th International Conference on Network and Services Management
Policy interoperability and network autonomics
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
Semantic-Based policy engineering for autonomic systems
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
On scalability and modularisation in the modelling of network security systems
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
POBUCS framework: integrating mobility and qos management in next generation networks
IPOM'05 Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks
A formally verified mechanism for countering SPIT
CRITIS'10 Proceedings of the 5th international conference on Critical Information Infrastructures Security
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Autonomic management of mobile and wireless networks
Telecommunication Economics
Obligations to enforce prohibitions: on the adequacy of security policies
Proceedings of the 6th International Conference on Security of Information and Networks
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
Policies are rules governing the choices in behavior of a system. They are increasingly being used as a means of implementing flexible and adaptive systems for management of Internet services, networks, and security systems. There is also a need for a common specification of security policy for large-scale multi-organizational systems where access control is implemented in a variety of heterogeneous components. In this article we survey both security and management policy specification approaches, concentrating on practical systems in which the policy specification can be directly translated into an implementation