Policy-based management is an approach to the management of systems with respect to issues such as security, access control and trust by the enforcement of policy rules. This paper addresses the problem of integrating the requirements imposed by a policy with the system development process. In order to take a policy specification into account in the development of a system specification, the notion of policy adherence is formalized as a relation between policy specifications and system specifications. Adherence of a system specification to a policy specification means that the former satisfies the latter. The integrated development process is supported by refinement, where both the policy specification and the system specification may be de...
Policy-based management is based on defining a set of global rules, according to which a network or ...
Policies are widely used in many different systems and applications. Recently, it has been recognize...
In spite of the wide adoption of policy-based approaches for security management, and many existing ...
Policy-basedmanagement is an approach to the management of sys-tems with respect to issues such as s...
Policy refinement is meant to derive low-level enforceable policies from high-level guidelines. Alth...
With the ever increasing importance of computer networks such as the Internet,and the today almost u...
Abstract—We describe a method for policy refinement. The refinement process involves stages of decom...
In a policy-based system management, a policy refinement process is required to translate abstract p...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
system management, policy-based, management requirements © Copyright Hewlett-Packard Company 1998 Th...
The specification of policies is a crucial aspect in the development of complex systems, since polic...
Since the 1970’s it has been acknowledged that a complex system can be broken into (a) its invariant...
AbstractThis paper describes a mean field approach to defining and implementing policy-based system ...
Policy rules define what behavior is desired in a softwarebased system, they do not describe the cor...
The automation of policy refinement, whilst promising great benefits for policy-based management, ha...
Policy-based management is based on defining a set of global rules, according to which a network or ...
Policies are widely used in many different systems and applications. Recently, it has been recognize...
In spite of the wide adoption of policy-based approaches for security management, and many existing ...
Policy-basedmanagement is an approach to the management of sys-tems with respect to issues such as s...
Policy refinement is meant to derive low-level enforceable policies from high-level guidelines. Alth...
With the ever increasing importance of computer networks such as the Internet,and the today almost u...
Abstract—We describe a method for policy refinement. The refinement process involves stages of decom...
In a policy-based system management, a policy refinement process is required to translate abstract p...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
system management, policy-based, management requirements © Copyright Hewlett-Packard Company 1998 Th...
The specification of policies is a crucial aspect in the development of complex systems, since polic...
Since the 1970’s it has been acknowledged that a complex system can be broken into (a) its invariant...
AbstractThis paper describes a mean field approach to defining and implementing policy-based system ...
Policy rules define what behavior is desired in a softwarebased system, they do not describe the cor...
The automation of policy refinement, whilst promising great benefits for policy-based management, ha...
Policy-based management is based on defining a set of global rules, according to which a network or ...
Policies are widely used in many different systems and applications. Recently, it has been recognize...
In spite of the wide adoption of policy-based approaches for security management, and many existing ...