By Topic

Policies for Distributed Systems and Networks, 2005. Sixth IEEE International Workshop on

Date 6-8 June 2005

Filter Results

Displaying Results 1 - 25 of 38
  • Sixth IEEE International Workshop on Policies for Distributed Systems and Networks - Cover

    Publication Year: 2005 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • Sixth IEEE International Workshop on Policies for Distributed Systems and Networks - Title Page

    Publication Year: 2005 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (40 KB)  
    Freely Available from IEEE
  • Sixth IEEE International Workshop on Policies for Distributed Systems and Networks - Copyright Page

    Publication Year: 2005 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • Sixth IEEE International Workshop on Policies for Distributed Systems and Networks - Table of contents

    Publication Year: 2005 , Page(s): v - vi
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2005 , Page(s): vii
    Save to Project icon | Request Permissions | PDF file iconPDF (19 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing and Steering Committees

    Publication Year: 2005 , Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (20 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2005 , Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (20 KB)  
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2005 , Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (18 KB)  
    Freely Available from IEEE
  • Automated decomposition of access control policies

    Publication Year: 2005 , Page(s): 3 - 13
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The resources may be considered as a single abstract hierarchical resource. An access control policy at a high level should be able to define who is allowed to use the resources. At tower levels, the policy will address controlling access to concrete... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Driving and monitoring provisional trust negotiation with metapolicies

    Publication Year: 2005 , Page(s): 14 - 23
    Cited by:  Papers (19)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    We introduce the provisional trust negotiation framework PROTUNE, for combining distributed trust management policies with provisional-style business rules and access-control related actions. The framework features a powerful declarative metalanguage for driving some critical negotiation decisions, and integrity constraints for monitoring negotiations and credential disclosure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy modeling and refinement for network security systems

    Publication Year: 2005 , Page(s): 24 - 33
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (272 KB) |  | HTML iconHTML  

    In today's network environments the integrated design and management of different security technologies and mechanisms are of great interest. Especially in large networks, the security management should be supported by approaches with an appropriate level of abstraction, such that a system can be considered independently of the complex configuration details of its various component mechanisms. Fur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An audit logic for accountability

    Publication Year: 2005 , Page(s): 34 - 43
    Cited by:  Papers (11)  |  Patents (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (216 KB) |  | HTML iconHTML  

    We describe a policy language and implement its associated proof checking system. In our system, agents can distribute data along with usage policies in a decentralized architecture. Our language supports the specification of conditions and obligations, and also the possibility to refine policies. In our framework, the compliance with usage policies is not actively enforced. However, agents are ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy protection of enterprise information through inference analysis

    Publication Year: 2005 , Page(s): 47 - 56
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (152 KB) |  | HTML iconHTML  

    Ensuring that disclosure of information to outside entities is in conformance with the enterprise privacy policies is of utmost concern for all enterprises dealing with consumer information. The existing protection measures proposed for meeting this goal are inadequate. In this paper we present an approach in which the privacy label taxonomy is developed to classify information types in an enterpr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Web privacy protection through declarative policies

    Publication Year: 2005 , Page(s): 57 - 66
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (440 KB) |  | HTML iconHTML  

    The platform for privacy preferences (P3P) is a W3C framework for Web privacy management. It provides a standard vocabulary that Websites can use to describe their privacy practices. The presence of Web site published P3P policies enable users to configure Web browsers to allow, block or warn users during access and data exchange with Websites. It's a good idea that unfortunately is rarely used. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving semantic models from privacy policies

    Publication Year: 2005 , Page(s): 67 - 76
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (368 KB) |  | HTML iconHTML  

    Natural language policies describe interactions between and across organizations, third-parties and individuals. However, current policy languages are limited in their ability to collectively describe interactions across these parties. Goals from requirements engineering are useful for distilling natural language policy statements into structured descriptions of these interactions; however, they a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing policy dependencies using historical information

    Publication Year: 2005 , Page(s): 79 - 88
    Cited by:  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (216 KB) |  | HTML iconHTML  

    Autonomic computing is central to the success of IT infrastructure deployment as its complexity and pervasiveness grows. This paper addresses one aspect of policy-based autonomic computing - the issue of identifying dependencies between policies, knowledge of which is useful to the policymaker while defining or updating policies. These dependencies are determined via assesment of the impact of a p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relationship-driven policy engineering for autonomic organisations

    Publication Year: 2005 , Page(s): 89 - 98
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based governance is the means by which humans will impose their will upon how autonomic systems manage themselves. Ultimately, these systems mediate information and services between people, in a rich tapestry of human association... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy conflict analysis for quality of service management

    Publication Year: 2005 , Page(s): 99 - 108
    Cited by:  Papers (16)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (424 KB) |  | HTML iconHTML  

    Policy-based management provides the ability to (re-) configure differentiated services networks so that desired quality of service (QoS) goals are achieved. Relevant configuration involves implementing network provisioning decisions, performing admission control, and adapting bandwidth allocation dynamically according to emerging traffic demands. A policy-based approach facilitates flexibility an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Summary of stability of adaptive service level agreements

    Publication Year: 2005 , Page(s): 111 - 114
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (112 KB) |  | HTML iconHTML  

    We consider the implications of feedback on policy-based management of networked services, paying special attention to the case where monitoring of service level agreements is used to alter policy dynamically. Using a simple model, we show that there are policies that are unstable under service provision, i.e. provide no reliable service levels (QoS), and that there are policies that can yield sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based framework for assessing missile defense doctrine and policy

    Publication Year: 2005 , Page(s): 115 - 118
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (128 KB) |  | HTML iconHTML  

    BMD-agents (BMDA) is a framework for specifying entities and their interaction patterns used in the command and control (C2) of ballistic missile defense (BMD) systems. In BMDA, doctrine is encoded as rules of individual agents and C2 policies are encoded as combinations of agents. BMDA can be used to analyze measures of effectiveness and performance of BMD policies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policity: an experimental evaluation of policy-based administration in a city simulation

    Publication Year: 2005 , Page(s): 119 - 122
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (336 KB) |  | HTML iconHTML  

    The administration cost of today's complex IT systems is a major inhibitor of growth for many companies in the burgeoning services economy. One proposed solution is policy-based system administration - a type of autonomic computing system that can manage itself with minimum human intervention. To explore the cost-benefit tradeoffs of policy-based system administration, we conducted an experiment i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How can we trust a policy system to make the best decision?

    Publication Year: 2005 , Page(s): 123 - 126
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (94 KB) |  | HTML iconHTML  

    Policy-based systems are becoming increasingly common; the emerging areas of autonomic (Horn; Kephart and Chess, 2003) and on demand (Kephart and Walsh, 2004) computing are accelerating the adoption of such systems. As the requirements on policy-based systems become more complex, traditional approaches to the implementation of such systems, such as relying entirely on simple "if [condition] then [... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AutoLoop: automated action selection in the "observe-analyze-act" loop for storage systems

    Publication Year: 2005 , Page(s): 129 - 138
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (232 KB) |  | HTML iconHTML  

    Enterprise applications typically depend on guaranteed performance from the storage subsystem, lest they fail. However, changes in the workload characteristics, component failures, load surges, are unlikely to result in guaranteed performance for the applications. Given that widespread access protocols and scheduling policies are largely best-effort, the problem of meeting performance goals on a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy-based information lifecycle management in a large-scale file system

    Publication Year: 2005 , Page(s): 139 - 148
    Cited by:  Papers (3)  |  Patents (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    Policy-based file lifecycle management is important for balancing storage utilization and for regulatory conformance. It poses two important challenges, the need for simple yet effective policy design and an implementation that scales to billions of files. This paper describes the design and an innovative implementation technique of policy-based lifecycle management in a prototype built as a part ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On using policies for managing service provisioning in agent-based heterogenous environments for mobile users

    Publication Year: 2005 , Page(s): 149 - 158
    Cited by:  Papers (1)  |  Patents (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    Today's Internet domains are controlled more and more by policies. Each domain is composed of several access networks with their capabilities, devices, users and a specific behavior defined by policies. These policies control service provisioning, and automate network resource configuration. However, the growth in the mobility nature of users, the difference between the service requested by the us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.