The work described in this technical report falls under the general problem of developing methods that would allow us to engineer software systems that are reliable and would offer a certain acceptable level of quality in their operation. This report shows how the analysis and refinement of policies for Quality of Service can be carried out within logic by exploiting forms of abductive and argumentative reasoning. In particular, it provides two main contributions. The first is an extension of earlier work on the use of abductive reasoning for automatic policy refinement by exploiting the use of integrity constraints within abduction and its integration with constraint solving. This has allowed us to enhance this refinement process in variou...
Policy-based management provides the ability to (re-)configure differentiated services networks so t...
In a policy-based system management, a policy refinement process is required to translate abstract p...
The use of agent's technology in electronic commerce environments leads to the necessity to introduc...
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network secu...
As the interest in using policy-based approaches for systems management grows, it is becoming increa...
Firewalls remain the main perimeter security protection for corporate networks. However, network siz...
Policy-based management provides the ability to (re-) configure differentiated services networks so ...
As the interest in using policy-based approaches for systems management grows, it is becoming increa...
Policy conflict analysis processes based solely on the examination of policy language constructs ca...
Network and host-based access controls, for example, firewall systems, are important points of secur...
The present report continues the work of deliverable I2-D2 [Bonatti and Olmedilla, 2005b] by present...
Policy refinement is meant to derive low-level enforceable policies from high-level guidelines. Alth...
Policy-based management provides the ability to dynamically re-configure DiffServ networks such that...
Firewalls have been widely used to protect not only small and local networks but also large enterpri...
New functionality is added to telecommunications systems in the form of features or services. Howeve...
Policy-based management provides the ability to (re-)configure differentiated services networks so t...
In a policy-based system management, a policy refinement process is required to translate abstract p...
The use of agent's technology in electronic commerce environments leads to the necessity to introduc...
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network secu...
As the interest in using policy-based approaches for systems management grows, it is becoming increa...
Firewalls remain the main perimeter security protection for corporate networks. However, network siz...
Policy-based management provides the ability to (re-) configure differentiated services networks so ...
As the interest in using policy-based approaches for systems management grows, it is becoming increa...
Policy conflict analysis processes based solely on the examination of policy language constructs ca...
Network and host-based access controls, for example, firewall systems, are important points of secur...
The present report continues the work of deliverable I2-D2 [Bonatti and Olmedilla, 2005b] by present...
Policy refinement is meant to derive low-level enforceable policies from high-level guidelines. Alth...
Policy-based management provides the ability to dynamically re-configure DiffServ networks such that...
Firewalls have been widely used to protect not only small and local networks but also large enterpri...
New functionality is added to telecommunications systems in the form of features or services. Howeve...
Policy-based management provides the ability to (re-)configure differentiated services networks so t...
In a policy-based system management, a policy refinement process is required to translate abstract p...
The use of agent's technology in electronic commerce environments leads to the necessity to introduc...