Decomposition techniques for policy refinement

The automation of policy refinement, whilst promising great benefits for policy-based management, has hitherto received relatively little treatment in the literature, with few concrete approaches emerging. In this paper we present initial steps towards a framework for automated distributed policy refinement for both obligation and authorization policies. We present examples drawn from military scenarios, describe details of our formalism and methods for action decomposition, and discuss directions for future research.

[1]  Martín Abadi,et al.  The Existence of Refinement Mappings , 1988, LICS.

[2]  Fen Liu,et al.  ChangeRefinery: Assisted Refinement of High-Level IT Change Requests , 2009, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks.

[3]  Clare-Marie Karat,et al.  An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench , 2006, SOUPS '06.

[4]  Jorge Lobo,et al.  Expressive policy analysis with enhanced system dynamicity , 2009, ASIACCS '09.

[5]  Brendan Jennings,et al.  Conflict Prevention Via Model-Driven Policy Refinement , 2006, DSOM.

[6]  Paris Flegkas,et al.  A Functional Solution for Goal-Ooriented Policy Refinement , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).

[7]  Marek J. Sergot,et al.  A logic-based calculus of events , 1989, New Generation Computing.

[8]  G.A. Campbell,et al.  Goals and Policies for Sensor Network Management , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).

[9]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[10]  Dinesh C. Verma,et al.  Policy transformation techniques in policy-based systems management , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[11]  Alessandra Russo,et al.  A goal-based approach to policy refinement , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[12]  Jorge Lobo,et al.  Security policy refinement using data integration: a position paper , 2009, SafeConfig '09.