Incremental validation of policy-based systems

被引:0
|
作者
Graham, A [1 ]
Radhakrishnan, T [1 ]
Grossner, C [1 ]
机构
[1] Concordia Univ, Dept Comp Sci, Montreal, PQ H3G 1M8, Canada
关键词
D O I
10.1109/POLICY.2004.1309176
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Management and control of systems are becoming more and more automated and based on policies that are expressed in a suitable Policy specification language. Such policies need to be validated to ensure correct operation of the managed or controlled systems. The set of policies in a system is dynamic and is constantly changing. When this set is very large, incremental policy validation is a topic worth exploring. In this paper, such a notion of incremental policy-validation is introduced. The well-known decision tables, a systems analysis tool, are adapted for representing policies. Based on such adaptations, two algorithms are developed for incremental validation and they are compared, with respect to the number of computations they require.
引用
收藏
页码:240 / 249
页数:10
相关论文
共 50 条
  • [31] An automated policy-based management framework for differentiated communication systems
    Samaan, N
    Karmouch, A
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (12) : 2236 - 2247
  • [32] Policy-Based Multiple Access for Decentralized Low Power Systems
    Muharemovic, Tarik
    Sabbarwal, Ashutosh
    Aazhang, Behnaam
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (01) : 256 - 267
  • [33] A Policy-Based Routing Scheme for Multi-Robot Systems
    Purkayastha, Punyaslok
    Hovareshti, Pedram
    Baras, John S.
    2008 MEDITERRANEAN CONFERENCE ON CONTROL AUTOMATION, VOLS 1-4, 2008, : 1557 - +
  • [34] Towards self-configuring policy-based management systems
    Ouda, Abdelnasser
    Lutfiyya, Hanan
    Bauer, Michael
    2008 IEEE WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2008, : 215 - 218
  • [35] Policy-based SQLIA detection and prevention approach for RFID systems
    Abawajy, Jemal
    Fernando, Harinda
    COMPUTER STANDARDS & INTERFACES, 2015, 38 : 64 - 71
  • [36] Policy-based security management for ad hoc wireless systems
    Zheng, Harold
    Wang, Sherry
    Nichols, Robert A.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2531 - 2537
  • [37] Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems
    Lee, Adam J.
    Winslett, Marianne
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (02)
  • [38] Policy-based network management
    Pujolle, G
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2004, 59 (1-2): : 2 - 9
  • [39] Policy-Based Sanitizable Signatures
    Samelin, Kai
    Slamanig, Daniel
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 538 - 563
  • [40] Policy-based cryptography and applications
    Bagga, W
    Molva, R
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 72 - 87