A State Transition Model for Policy Specification

The model of policies used in a variety of computer systems management and security domains has typically followed the paradigm of if-then-else statements. While the use of such statements has resulted in significant progress in the field of policy based systems, their use has also entailed significant effort in defining the policy rules and system models needed for employing policy based technologies. Better models of policy specification can ease some of the difficulties associated with building policy based systems. In this paper, we introduce a new model for specifying policies, based on a user defined state transition diagram describing system behavior, and demonstrate how this model can be employed advantageously in managing policies.

[1]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[2]  Tien Pham,et al.  Intelligence, Surveillance, and Reconnaissance fusion for coalition operations , 2008, 2008 11th International Conference on Information Fusion.

[3]  Jorge Lobo,et al.  Policy-based management of networked computing systems , 2005, IEEE Communications Magazine.

[4]  Günter Karjoth,et al.  A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[5]  Dakshi Agrawal,et al.  Policy-based validation of SAN configuration , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[6]  Benny Rochwerger,et al.  Oceano-SLA based management of a computing utility , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).

[7]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[8]  Jorge Lobo,et al.  A Policy Description Language , 1999, AAAI/IAAI.