A basis for comparing characteristics of policy systems

Policy-based computing is being studied and applied in a number of different domains by industrial organizations and academia. Standards are also being pursued in many standards bodies (e.g., IETF, DMTF, OASIS, GGFand W3C). This has led to the creation of different policy languages and policy implementations. In this paper, we attempt to provide a framework for the classification and comparison of the different approaches that such languages and systems have taken. This is important because it helps in the understanding of the capabilities of policy systems, and in clarifying what they can and cannot do. It also identifies basic issues in translating policies from one language to another, and in transforming policies specified for a particular system implementation into policies that can be enforced by a different system implementation

[1]  Jeffrey D. Ullman,et al.  Introduction to Automata Theory, Languages and Computation , 1979 .

[2]  Michael Kifer,et al.  A logic for object-oriented logic programming , 1989, PODS '89.

[3]  Nazim Agoulmine,et al.  Analysis of Policy Management Models and Specification Languages , 2003, Net-Con.

[4]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[5]  Balachander Krishnamurthy,et al.  High-level constructs in the READY event notification system , 1998, EW 8.

[6]  Keith Cheverst,et al.  Utilising the event calculus for policy driven adaptation on mobile systems , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[7]  E. Allen Emerson,et al.  Temporal and Modal Logic , 1991, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.

[8]  David S. Rosenblum,et al.  Design and evaluation of a wide-area event notification service , 2001, TOCS.

[9]  Adam Woei-Jyh Lee,et al.  Integrating Goal Specification in Policy-Based Management , 2001, POLICY.

[10]  Wolfgang Thomas,et al.  Handbook of Theoretical Computer Science, Volume B: Formal Models and Semantics , 1990 .

[11]  Jorge Lobo,et al.  Policy-based management of networked computing systems , 2005, IEEE Communications Magazine.

[12]  Jan Chomicki,et al.  Efficient checking of temporal integrity constraints using bounded history encoding , 1995, TODS.

[13]  Emil C. Lupu,et al.  A Survey of Policy Specification Approaches , 2002 .

[14]  Constance Holden What, Not How , 2004, Science.

[15]  M. J. Maullo,et al.  Policy management: an architecture and approach , 1993, Proceedings of 1993 IEEE 1st International Workshop on Systems Management.