Policy transformation techniques in policy-based systems management

被引:18
|
作者
Beigi, MS [1 ]
Calo, S [1 ]
Verma, D [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
D O I
10.1109/POLICY.2004.1309146
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Policy based systems management provides a means for administrators, end-users and application developers to manage and dynamically change the behavior of computing systems, One advantage of policy-based management is that it simplifies and automates the administration of IT environments. A significant part of the simplification is obtained by allowing the system administrator to specify only the objectives or goals that are to be met, rather than having to specify detailed configuration parameters for each of the different devices in the system. It may not be obvious to the administrator how the goals can be achieved without having to know the internals of the system. This knowledge thus needs to be captured in the policy driven actions. The existing algorithms for mapping policy objectives to specific configuration details tend to be specific to each policy discipline. This makes the policy-based approach harder to deploy for new disciplines. In this paper, we address different types of policy transformations and propose methods, which are not discipline specific for mapping objectives to system configurations.
引用
收藏
页码:13 / 22
页数:10
相关论文
共 50 条
  • [1] Policy-based management of networked computing systems
    Agrawal, D
    Lee, KW
    Lobo, J
    IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (10) : 69 - 75
  • [2] Conflicts in policy-based distributed systems management
    Lupu, EC
    Sloman, M
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1999, 25 (06) : 852 - 869
  • [3] Conflicts in policy-based distributed systems management
    Department of Computing, Imperial College, London SW7 2BZ, United Kingdom
    IEEE Trans Software Eng, 6 (852-869):
  • [4] Policy-based security management for enterprise systems
    Mukkamala, R
    Chekuri, L
    Moharrum, M
    Palley, S
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII, 2004, 144 : 219 - 233
  • [5] Policy-based network management
    Pujolle, G
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2004, 59 (1-2): : 2 - 9
  • [6] Dynamic conflict detection in policy-based management systems
    Dunlop, N
    Indulska, J
    Raymond, K
    SIXTH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2002, : 15 - 26
  • [7] Policy-based IPsec management
    Li, M
    IEEE NETWORK, 2003, 17 (06): : 36 - 43
  • [8] Policy-based network management
    Choudhary, AR
    BELL LABS TECHNICAL JOURNAL, 2004, 9 (01) : 19 - 29
  • [9] Policy-based network management
    Wang, CK
    2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 101 - 105
  • [10] Methods for conflict resolution in policy-based management systems
    Dunlop, N
    Indulska, J
    Raymond, K
    SEVENTH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2003, : 98 - 109