Academia.eduAcademia.edu

Policy Based Management

description762 papers
group82 followers
lightbulbAbout this topic
Policy Based Management is an approach in organizational governance that utilizes predefined policies to automate and manage system behaviors and resource allocation. It aims to align IT operations with business objectives by enforcing rules and guidelines that govern decision-making processes and operational practices.
lightbulbAbout this topic
Policy Based Management is an approach in organizational governance that utilizes predefined policies to automate and manage system behaviors and resource allocation. It aims to align IT operations with business objectives by enforcing rules and guidelines that govern decision-making processes and operational practices.

Key research themes

1. How do governments manage complex policy advisory systems beyond control mechanisms?

This theme investigates the forms and dimensions of policy advisory system (PAS) management employed by governments to optimize their interaction with advisory sources. It moves beyond simplistic control frameworks to explore government agency and discretion in PAS management across various administrative traditions, considering proactive and reactive strategies to coordinate diverse advisory resources.

Key finding: This paper introduces a conceptual framework categorizing PAS management into four forms—authoritative, dependent, laissez-faire, or absent—based on government agency and discretion rather than control alone. Empirical cases... Read more

2. What are effective models and mechanisms for decomposition and enforcement of policy-based management in distributed systems?

This research area focuses on how high-level policies can be automatically decomposed into resource-specific low-level policies for distributed enforcement. It addresses challenges of scalability, coordination, and semantic expressiveness in policy languages to ensure consistent, dynamic, and secure policy application across heterogeneous resources and devices in complex environments such as access control, network management, and mobile pervasive computing.

Key finding: The paper presents a model representing resource hierarchies and illustrates an automated policy decomposition process, which refines high-level access control policies into simpler, low-level policies tailored for each... Read more
Key finding: This paper proposes a semantic policy engine (Rei) and an enforcement architecture for mobile devices in pervasive environments, where devices dynamically obtain policy certificates based on contextual information such as... Read more
Key finding: The paper introduces a policy-based framework to translate high-level network intents into hierarchically decomposed policies executed through closed control loops guided by finite state machines. This approach abstracts the... Read more
Key finding: This research develops a dynamically adaptable Policy Enforcement Point (PEP) compliant with the XACMLv3 standard that supports the enforcement of complex policy obligations. The adaptive PEP reacts in real-time to policy... Read more

3. How can qualitative inquiry methodologies enhance agent-based models (ABMs) for policy formulation and evaluation?

This theme explores the integration of qualitative research approaches into the development of agent-based models to better capture human behavior and interactions in policy contexts. It tackles methodological challenges of balancing comparability across cases with the need for context-specific flexibility and introduces frameworks that support both theoretical and empirical ABMs designed to inform complex policy formulation and ex-ante evaluation, especially when quantitative data is limited or unavailable.

Key finding: The authors propose a two-stage methodology that begins by developing a novel conceptual framework centered on a specific policy problem, integrating existing theories with qualitative insights from case studies. Following... Read more

4. What challenges and solutions exist for coordinating and avoiding conflicts in policy-based management systems?

This research thread focuses on identifying, classifying, and resolving conflicts that arise within policy-based management systems, especially when multiple policies operate concurrently or hierarchical policies refine each other. It seeks to ensure correct and conflict-free enforcement of policies to maintain system consistency, performance, and security. Approaches include static and dynamic conflict detection methods, overlap domain analysis, temporal logic patterns, and negotiation frameworks to harmonize policy interactions in adaptive and distributed environments.

Key finding: This paper presents PobMC, an adaptive policy-based management approach featuring a classification of system policy conflicts into categories such as propagation, action composition, and constraint conflicts. It introduces... Read more
Key finding: The authors address the policy negotiation problem in multi-domain tactical networks, which is known to be NP-complete, by developing an automated negotiation mechanism based on policies. Their approach facilitates efficient... Read more
Key finding: This paper proposes a situation-aware dynamic authorization model that integrates Complex Event Processing with XACML architecture to enable dynamic, circumstance-based access control in healthcare environments. It... Read more

5. What role do policy formulation tools and methodologies play in enhancing public policy design and governance?

This theme examines the development and use of analytical and procedural tools designed to support the policy formulation phase in public governance. It highlights distinctions between formulation and implementation, the diversity of tools ranging from forecasting to problem structuring, and the critical importance of understanding when, why, and how these tools are applied to generate, evaluate, and select robust policy options to achieve societal goals.

Key finding: The chapter advances an 'instruments perspective' that categorizes policy formulation tools as essential to generating and evaluating options prior to implementation. It critiques the literature's traditional focus on... Read more

6. What are the challenges and approaches to enhancing resilience and situational awareness through adaptive IT and policy management during crises?

This research stream is concerned with designing IT systems and management policies that dynamically adapt to crises such as natural disasters. It addresses how situational awareness concepts can be operationalized through policy-driven reconfiguration and resource allocation, to maintain system functionality and support emergency response despite degraded infrastructures and shifting operational contexts.

Key finding: The paper identifies the need for dynamic adaptation of IT management and security policies in response to real-time situational awareness during crises. It advocates the use of policy-driven decision support systems... Read more

7. What security concerns arise in policy-based monitoring systems and how can distribution protect data confidentiality?

The focus here is on mitigating risks posed by centralized monitoring system vulnerabilities, which if exploited, can reveal critical operational data to attackers. The work investigates distributed, policy-oriented architectures that partition monitoring data and correlation tasks, limiting single point compromise and preserving confidentiality while ensuring effective and scalable security event correlation across organizational infrastructures.

Key finding: The paper proposes a resource-centric distribution algorithm for deploying Datalog-based event correlation policies across multiple monitoring hosts, thereby decentralizing sensitive information. By rewriting policies into... Read more

8. How can policy-based frameworks support service-oriented architecture (SOA) management and dynamic behavioral control?

This research theme reviews and evaluates existing policy frameworks regarding their applicability for managing dynamic, heterogeneous SOA environments. It examines the capabilities of different policy languages and management models to enforce access control, service level agreements, and dynamic resource provisioning tailored to the unique challenges of SOA, including interoperability, flexibility, and compliance with enterprise logic.

Key finding: The survey critically evaluates IETF, Ponder, KAoS, Rei, and WS-Policy frameworks against SOA-specific criteria, highlighting each framework's strengths and weaknesses. It emphasizes that while existing frameworks offer... Read more

All papers in Policy Based Management

Customer eXperience is a blue print of customer requirements. In this era of heightened competition and volatile global economy, delivering services originating from diverse sources, without satisfying thorough customer experience... more
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each other according to changing objectives. Following the... more
The presented policy-based management system supports autonomous control and adaptation of a distributed system according to changing conditions and requirements by means of event-condition-action (ECA) rules. Furthermore, it supports... more
The superiority of the proposed planning software lies in the constraintbased model which is successfully combined with all the other components namely, analytical methods, rules of thumb, case-base, and database as well as the... more
The OpenFlow architecture is a proposal from the Clean Slate initiative to define a new Internet architecture where network devices are simple, and the control plane and management are performed on a centralized controller, called... more
The Dierentiated Services architecture has been proposed to oer quality of service in the Internet. Most works on Diserv (DS) handles QoS guarantees in a per node basis, which assumes that assuring QoS in a single node also leads to the... more
The policy based management is a technique to coordinate the configuration of several equipments in a network based on Service Level Agreements(SLAs). These abstract policies are difficult to be interpreted and implemented by network... more
The Differentiated Services architecture has been proposed to offer quality of service in the Internet. Most works on Diffserv (DS) handles QoS guarantees in a per node basis, which assumes that assuring QoS in a single node also leads to... more
Scalable distributed management is a key challenge for current Internet services and necessary for future ubiquitous services of wireless mobile users. Policybased Management (PBM) is seen as a practical solution for dealing with the... more
Several base elements for the provision of quality of service guarantees have been developed in the recent past. Of these, the Differentiated Services (DiffServ) architecture stands out as the most promising. In spite of this, various... more
Monitoring systems observe important information that could be a valuable resource to malicious users: attackers can use the knowledge of topology information, application logs, or configuration data to target attacks and make them hard... more
Software-Defined Networking (SDN) has raised the boundaries of cloud computing by offering unparalleled levels of control and flexibility to system administrators over their virtualized environments. To properly embrace this new era of... more
Network Composition is, in a rough way, the process which one network can offer/request services to/from another network with little or even no human interference. To explore the full potential of Network Composition, a new Internet... more
The possibility of dynamically managing Quality of Service (QoS) in heterogeneous networks represents a key element for telecom operators which aim at making their communication infrastructures able to support new emerging multimedia... more
Policies, which usually govern the behaviour of networking services (e.g., security, QoS, mobility, etc.), are becoming an increasingly popular approach for the dynamic regulation of web information systems. The adoption of a policy-based... more
Providing QoS-guaranteed services in current installed networks is an important issue, but only deploying QoS services is not enough to guarantee their success: QoS management must also be provided. Nowadays, policy-based network... more
We have studied the case of deploying services in public wireless networks based on IEEE802 .11 standard. Due to low cost, easy deployment , cost effectiveness and high performance, this technology appears as a very attractive solution... more
This paper describes RSM-WISP, a new management architecture designed for WISPs to facilitate the implementation and management of the services they offer at the access side of the WLAN, and to manage roaming contracts between WISPs. Our... more
We have studied the case of deploying services in public wireless networks based on IEEE802 .11 standard. Due to low cost, easy deployment , cost effectiveness and high performance, this technology appears as a very attractive solution... more
This paper describes a new management architecture designed for WISPs to facilitate the implementation and management of the services they offer at the access side of the WLAN, and to manage roaming contracts between WISPs. Our... more
Network Composition is, in a rough way, the process which one network can offer/request services to/from another network with little or even no human interference. To explore the full potential of Network Composition, a new Internet... more
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not... more
Policies are convenient means to modify system behaviour at run-time. Nowadays, policies are created in great numbers by different actors, ranging from system administrators to lay-users. However, this situation may lead naturally to... more
This paper deals with the twin concepts of optical networking and dense wavelength division multiplexing. The paper talks about the various optical network architectures and the various components of an all-optical network like Optical... more
By constraining the output rate of mobile hosts in a cell via DiffServ configuration mechanisms, it is possible to keep 802.11 networks in a non-saturation state. We present a policy-based management solution for video streaming service... more
Adequate architecture and technology can significantly improve adaptability and performance of the policy-based management systems. In this paper we present how policy enforcement point operation can be improved by applying the "object by... more
Wireless mobile nodes have extremely limited resources and are easily vulnerable to Denial of Service (DoS) attacks. The traditional techniques that can detect or prevent DoS attacks in wired networks often require considerable resources... more
The importance of integrated management stems from the vision of merging telecommunications and distributed computing systems management within the same framework, rapid globalization of world enterprises, and the pressing need for... more
Bursty, high-bandwidth, real-time and mission-critical applications are driving the need for better differentiation of service in the campus network beyond that provided by traditional best-effort services. The ability to provide these... more
As networks increase in size, heterogeneity, complexity and pervasiveness, effective management of such networks becomes more important and increasingly difficult. In this context, PBNM (Policy-Based Network Management) has been gaining... more
Policy based management have gained a crescent importance in the last years. New demands on internetworking, on services specification, on QoS achievement and generically on network management functionality, have driven this paradigm to a... more
OpenFlow is the first standardization of Software Defined Networks. OpenFlow approach, however, has number of limitations: it restricts its use within a single-domain, it is not scalable, and it does not adapt well to changes in local... more
On the design of a reliable programming model for wireless sensor networks (WSN), we must deal with various concerns, such as heterogeneousness of sensors, different sensing capabilities, dynamic updates and power consumption. The... more
Cloud computing is one of the biggest trends in information technology, with individuals, companies and even governments moving towards their use to save costs and increase flexibility. Cloud infrastructures are typically based on... more
Internet became a source of information which is convenient for any user to access it anywhere. This accessibility makes it extremely vulnerable to enthused and well-equipped users intent on disrupting the flow of information or using it... more
Most organizations use several security policies to con- trol different systems and data, comprising in this way a global complex policy. These security policies are often scattered over different environments, each one with its own... more
The advent of software radio technology and the resulting potential for dynamic access to the radio spectrum presents major new challenges in managing that access. These challenges arise from the likely spread of spectrum access... more
More subtle and explicit QoS control mechanisms are required at the radio access level, even though the simple and scalable Differentiated Services (DiffServ) QoS control model is acceptable for the core of the network. At the radio... more
Mobile devices (e.g. mobile handsets or PDAs) have gained much functionality and intelligence with the growth of mobile network technologies and the increased use of mobile services. As a consequence, mobile devices have become more... more
Network management faces the interrelated challenges of increasing network complexity, meeting sophisticated business requirements, and being subject to human oversight. Self-driving networks possess the key properties to overcome such... more
System management is a required task for all modern enterprises and organizations. This task must be performed in an efficient and integrated manner. Enterprise computing systems are usually organized into domains for the purpose of... more
Network Operator and the Service Providers can introduce environments and a plethora of computing equipment interacts their own policies, while a conflict detection and resolution with today's urban citizens. We refer to these ubiquitous... more
Wireless ad hoc networks pose major research challenges because of their increasing ubiquity and user-initiated formation. The motivation of this thesis emanates from the need for unrestricted wireless communication in a scalable and... more
For guidance on citations see FAQs.
This paper presents an approach to handle out of profile traffic using Common Open Policy Service and network monitoring feedback. The proposed approach is based on monitoring and reporting information sent by bandwidth monitors installed... more
We present a policy-centered QoS meta-model which can be used by service providers and consumers alike to express capabilities, requirements, constraints, and general management characteristics relevant for SLA establishment in service... more
Download research papers for free!