Hierarchical policy-based replication

被引:0
|
作者
Doherty, Cormac J. [1 ]
Hurley, Neil J. [1 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci & Informat, Dublin 2, Ireland
关键词
D O I
10.1109/PCCC.2007.358902
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a system for policy-based autonomic replication of data. The system supports multiple distinct replication schemes for a single data item in order to exploit the range of consistency and quality of service requirements of clients. Based on traffic mix and client requirements, nodes in the system may make independent, integrated replica management decisions based on a partial view of the network. A policy based control mechanism is used to administer, manage, and control dynamic replication and access to resources.
引用
收藏
页码:254 / +
页数:2
相关论文
共 50 条
  • [31] Policy-based management for IP networks
    Stevens, ML
    Weiss, WJ
    BELL LABS TECHNICAL JOURNAL, 1999, 4 (04) : 75 - 94
  • [32] Policy-based autonomic control service
    Badr, N
    Taleb-Bendiab, A
    Reilly, D
    FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 99 - 102
  • [33] A policy-based storage management framework
    Devarakonda, M
    Gelb, J
    Saha, A
    Strickland, J
    THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 232 - 235
  • [34] Revocable Policy-Based Chameleon Hash
    Xu, Shengmin
    Ning, Jianting
    Ma, Jinhua
    Xu, Guowen
    Yuan, Jiaming
    Deng, Robert H.
    COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 327 - 347
  • [35] Policy-based NFV Management and Orchestration
    Makaya, Christian
    Freimuth, Douglas
    Wood, David
    Calo, Seraphin
    2015 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORK (NFV-SDN), 2015, : 128 - 134
  • [36] Policy-Based Grooming in Optical Networks
    Fábio Luciano Verdi
    Cláudio Carvalho
    Maurício F. Magalhães
    Edmundo R. M. Madeira
    Journal of Network and Systems Management, 2008, 16 : 325 - 349
  • [37] Policy-Based Authentication for Mobile Agents
    Wang, Yikai
    Mu, Yi
    Zhang, Minjie
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 123 - 137
  • [38] A policy-based Mobile Agent infrastructure
    Montanari, R
    Tonti, G
    Stefanelli, C
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2003, : 370 - 379
  • [39] Formal Policy-Based Provenance Audit
    Butin, Denis
    Demirel, Denise
    Buchmann, Johannes
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 234 - 253
  • [40] Distributed policy-based management enabling policy adaptation
    Yoshihara, K
    Isomura, M
    Horiuchi, H
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (07) : 1854 - 1865