Policy Based Management Research Papers (original) (raw)

Customer eXperience is a blue print of customer requirements. In this era of heightened competition and volatile global economy, delivering services originating from diverse sources, without satisfying thorough customer experience... more

Customer eXperience is a blue print of customer requirements. In this era of heightened competition and volatile global economy, delivering services originating from diverse sources, without satisfying thorough customer experience practices may increase ...

"Network management is becoming increasingly challenging with the relentless growth in network size, traffic volume, and the diversity in QoS requirements. Traditionally, the concept of predefined Service Level Agreements (SLAs) has been... more

"Network management is becoming increasingly challenging with the relentless growth in network size, traffic volume, and the diversity in QoS requirements. Traditionally, the concept of predefined Service Level Agreements (SLAs) has been utilized to establish QoS parameters. However, state-of-the-art technologies in this area are both proprietary and inflexible. To this end, Software Defined Networking (SDN) has the potential to make network management tasks flexible and scalable, and to provide an open platform to encourage innovation. In this paper, we present PolicyCop – an open, flexible, and vendor agnostic QoS policy management framework targeted towards OpenFlow based SDN. PolicyCop provides an interface for specifying QoS-based SLAs and enforces them using the OpenFlow API. It monitors the
network and autonomically readjusts network parameters to satisfy customer SLAs. We present experimental results to demonstrate PolicyCop’s effectiveness in ensuring throughput, latency, and reliability guarantees."

Quality of Service (QoS) management and provisioning in mobile ad hoc networks (manets) is a challenging task due to the lack of resources residing in the network as well as frequent changes in the network topology. Although a great deal... more

Quality of Service (QoS) management and provisioning in mobile ad hoc networks (manets) is a challenging task due to the lack of resources residing in the network as well as frequent changes in the network topology. Although a great deal of researches has been done in this area, QoS support for such networks remains an open issue. In this paper, we first propose a specific SLA (Service Level Agreement) for ad hoc networks. This Ad-Hoc-SLA defines user’s network requirements. It is also used to control network resource utilization. Then, we propose an extension of the Policy-Based Network Management (PBNM) system to support Ad-Hoc-SLA specification, negotiation, distribution and enforcement.

In order to arrange heterogeneous simulation executions, it would be useful to have simulation tools that enable easy and fast creation of simulation sessions employing real-time software components beside simulation codes. Although there... more

In order to arrange heterogeneous simulation executions, it would be useful to have simulation tools that enable easy and fast creation of simulation sessions employing real-time software components beside simulation codes. Although there have been considerable amount of research activities in simulation community, the current simulation tools are not sufficiently capable to support such a cooperation between components working in

Policy-based management provides the ability to dynamically re-configure DiffServ networks such that desired quality of service (QoS) goals are achieved. This includes network provisioning decisions, performing admission control, and... more

Policy-based management provides the ability to dynamically re-configure DiffServ networks such that desired quality of service (QoS) goals are achieved. This includes network provisioning decisions, performing admission control, and adapting bandwidth allocation dynamically. QoS management aims to satisfy the service level agreements (SLAs) contracted by the provider and therefore QoS policies are derived from SLA specifications and the provider's business goals. This policy refinement is usually ...

Virtual team issue has emerged as an important new teamwork model, distinguished from the conventional way in which people work by its ability to transcend distance, time and organizational boundaries. A virtual team consists of a dynamic... more

Virtual team issue has emerged as an important new teamwork model, distinguished from the conventional way in which people work by its ability to transcend distance, time and organizational boundaries. A virtual team consists of a dynamic collection of individuals, a set of collaborative services and network facilities that ensure a flexible and secure coordinated resource sharing. In the Multimedia and Mobile Agent Research Laboratory we have developed the V-Team system, an agent-based multimedia collaborative environment to support virtual teams. V-Team aims to provide a set of team services for better collaboration between a virtual team participants, facilities for managing virtual teams with fully customized team services, and a simpler interface to network services. In this paper, we describe the main components of V-Team, the principles of context customization and the system monitoring approach via policies.

Policy-based management is considered an effective approach to address the challenges of resource management in large complex networks. Within the IU-ATC QoS Frameworks project, a policy-based network management framework, CNQF (Converged... more

Policy-based management is considered an effective approach to address the challenges of resource management in large complex networks. Within the IU-ATC QoS Frameworks project, a policy-based network management framework, CNQF (Converged Networks QoS Framework) is being developed aimed at providing context-aware, end-to-end QoS control and resource management in converged next generation networks. CNQF is designed to provide homogeneous, transparent QoS control over heterogeneous access technologies by means of distributed functional entities that co-ordinate the resources of the transport network through policy-driven decisions. In this paper, we present a measurement-based evaluation of policy-driven QoS management based on CNQF architecture, with real traffic flows on an experimental testbed. A Java based implementation of the CNQF Resource Management Subsystem is deployed on the testbed and results of the experiments validate the framework operation for policy-based QoS management of real traffic flows.

Healthcare environments do not accept Static Authorizations especially when it could puts patients’ life in danger. A very common problem "Break The Glass" is known as the act of breaking the static authorization in order to reach the... more

Healthcare environments do not accept Static Authorizations especially when it could puts patients’ life in danger. A very common problem "Break The Glass" is known as the act of breaking the static authorization in order to reach the required permission. Health- care environment is full of different contexts and situations that require the authorizations to be dynamic. Dynamic Authorization is a concept of giving the choice to E-Health au- thorization system to choose the most suitable permission with considering one’s situation. This paper aims at preventing the matter of modifying the policy to make authorizations dynamic. It introduces a simple solution to provide Dynamic Authorization by orienting the authorization system decision using situations. Situations, which are calculated using Complex Event Processing, are integrated to XACML architecture. A Healthcare example proves the efficiency of our approach.

In the policy-based network management, the local policy decision point (LPDP), is used to reach a local decision. This partial decision and the original policy request are next sent to the PDP which renders a final decision. In this... more

In the policy-based network management, the local policy decision point (LPDP), is used to reach a local decision. This partial decision and the original policy request are next sent to the PDP which renders a final decision. In this paper, we propose to give a real autonomy to the LPDP in term of internal decision and configuration. The LPDP is considered as a learning BDI agent that autonomously adapts the router’s behavior to environment changes

Abstract—Policy-based management for federated healthcare systems has recently gained increasing attention due to strict privacy and disclosure rules. Although the work on privacy languages and enforcement mechanisms, such as Hippocratic... more

Abstract—Policy-based management for federated healthcare systems has recently gained increasing attention due to strict privacy and disclosure rules. Although the work on privacy languages and enforcement mechanisms, such as Hippocratic databases, has advanced our ...

This paper introduces a version of KAoS Semantic Policy and Domain Services that has been developed to support Web Services-based (i.e., OGSA-compliant) Grid Computing Architectures. While initially oriented to the dynamic and complex... more

This paper introduces a version of KAoS Semantic Policy and Domain Services that has been developed to support Web Services-based (i.e., OGSA-compliant) Grid Computing Architectures. While initially oriented to the dynamic and complex requirements of software agent applications, KAoS services are now being extended to work equally well with both agent and non-agent clients on a variety of more general

As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of mechanisms necessary to fulfil the protection requirements of the... more

As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of mechanisms necessary to fulfil the protection requirements of the upcoming scenarios. The integrated design and management of different security technologies and mechanisms are thus of great interest. Especially in large-scale environments, the employment of security services and the design of their configurations shall be supported by a structured technique which separates the consideration of the system as a whole from the detailed design of subsystems. To accomplish this goal, this paper presents a scalable approach for the modelling of large security systems, relying on the concepts of policy-based management and model-based management.

At present there are no digital social platforms that are open, distributed and self-managed. The openness enables end-users to customize their interactions through their selection of relationships and applications; and application... more

At present there are no digital social platforms that are open, distributed and self-managed. The openness enables end-users to customize their interactions through their selection of relationships and applications; and application developers to customize an interface for end-users with existing or new services. The distributed architecture ensures the scalability of content and entities, and the resilience to abuse. The self-managed platform provides the entity with control over its relationships; applications with control over the services it provides; and end-users with control over their interactions. These requirements led to the design of the social platform framework described in this paper. The key features of the framework are its modular design, use of open standards, distributed architecture, and policy-based management.

... 8. Authors' Addresses Andrea Westerinen Cisco Systems, Bldg 20 725 Alder Drive Milpitas, CA 95035 EMail: andreaw@cisco.com John Schnizlein Cisco Systems 9123 Loughran Road Fort Washington, MD 20744 EMail:... more

... 8. Authors' Addresses Andrea Westerinen Cisco Systems, Bldg 20 725 Alder Drive Milpitas, CA 95035 EMail: andreaw@cisco.com John Schnizlein Cisco Systems 9123 Loughran Road Fort Washington, MD 20744 EMail: john.schnizlein@cisco.com John Strassner Intelliden ...

To secure computing in pervasive environment, an adaptive algorithmic approach for access control (based on human notion of trust) is proposed. The proposed model provides support to calculate direct trust in situations when the... more

To secure computing in pervasive environment, an adaptive algorithmic approach for access control (based on human notion of trust) is proposed. The proposed model provides support to calculate direct trust in situations when the requesting entity has a past experience with the service. It encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. An adaptive policy based management is proposed to handle strategic malicious behavior. The defense mechanism incorporated by proposed model against strategic attack is also demonstrated. Finally we have compared our model with existing evolutionary models in this field.