The policy continuum - Policy authoring and conflict analysis

被引:25
作者
Davy, Steven [1 ]
Jennings, Brendan [1 ]
Strassner, John [2 ]
机构
[1] Telecommun Software & Syst Grp, Waterford Inst Technol, Waterford, Ireland
[2] Motorola Labs, Schaumburg, IL 60010 USA
基金
爱尔兰科学基金会;
关键词
policy-based management; policy continuum; conflict analysis;
D O I
10.1016/j.comcom.2008.04.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The policy continuum is a fundamental component of any policy-based management implementation for autonomic networking, but as of yet has no formal operational semantics. We propose a policy continuum model and accompanying policy authoring process that demonstrates the key properties that set a continuum apart from a non-hierarchical policy model. As part of the policy authoring process we present a policy conflict analysis algorithm that leverages the information model, making it applicable to arbitrary applications and continuum levels. The approach for policy conflict analysis entails analysing a candidate policy (either newly created or modified) on a pair-wise basis with already deployed policies and potential conflicts between the policies are fed back to the policy author. Central to the approach is a two-phase algorithm which firstly determines the relationships between the pair of policies and secondly applies an application specific conflict pattern to determine if the policies should be flagged as potentially conflicting. In this paper we present the formal policy continuum and two-phase conflict analysis algorithm as part of the policy authoring process, we describe an implementation where we demonstrate the detection of potential conflicts within a policy continuum. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:2981 / 2995
页数:15
相关论文
共 25 条
[1]   Policy ratification [J].
Agrawal, D ;
Giles, J ;
Lee, KW ;
Lobo, J .
SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, :223-232
[2]   Conflict classification and analysis of distributed firewall policies [J].
Al-Shaer, E ;
Hamed, H ;
Boutaba, R ;
Hasan, M .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (10) :2069-2084
[3]  
Anderson Anne., 2003, OASIS
[4]  
[Anonymous], P 2 IEEE INT WORKSH
[5]   A goal-based approach to policy refinement [J].
Bandara, AK ;
Lupu, EC ;
Moffett, J ;
Russo, A .
FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, :229-239
[6]  
BANDARA AK, 2003, P 4 IEEE WORKSH POL
[7]   A model based approach for policy tool generation and policy analysis [J].
Barrett, Keara ;
Davy, Steven ;
Strassner, John ;
Jennings, Brendan ;
van der Meer, Sven ;
Donnelly, Willimn .
2007 FIRST INTERNATIONAL GLOBAL INFORMATION INFRASTRUCTURE SYMPOSIUM, 2007, :99-+
[8]   Policy conflict analysis for quality of service management [J].
Charalambides, M ;
Flegkas, P ;
Pavlou, G ;
Bandara, AK ;
Lupu, EC ;
Russo, A ;
Dulay, N ;
Sloman, M ;
Rubio-Loyola, J .
SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, :99-108
[9]  
Damianou N, 2001, LECT NOTES COMPUT SC, V1995, P18
[10]   Application domain independent policy conflict analysis using information models [J].
Davy, Steven ;
Jennings, Brendan ;
Strassner, John .
2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, :17-+