Model-Based Management of Network Resources
Resumo
The modelling of access control rules in terms of high-level policies has been subject of research over the last decade. Policies, in this context, define if an access is permitted or forbidden to be performed. However, they do not prescribe rules for the utilization of network resources. In this manner, a user or application might consume available resources with superfluous activities, hindering other high-priority users or applications to work properly. Following this motivation, our approach associate to a policy a set of requirements that must be fulfilled for each access. We adopt model-based management concepts, in which a policy is defined in terms of abstract entities and is represented at different levels of abstraction.
Referências
Lück, I., Schäfer, C., and Krumm, H. (2001). Model-based tool-assistance for packet-filter design. In POLICY '01: Proceedings of the International Workshop on Policies for Distributed Systems and Networks, pages 120-136, London, UK. Springer-Verlag.
Porto de Albuquerque, J., Krumm, H., and de Geus, P. L. (2005). Policy modeling and refinement for network security systems. In IEEE 6th International Workshop on Policies for Distributed Systems and Networks, Stockholm, Sweden.
R. S. Sandhu, E. J. Coyne, H. L. F. and Youman, C. E. (1996). Role-based access control models. In IEEE Computer.
Sloman, M. (1993). Policy hierarchies for distributed systems management. In IEEE Journal on Selected Areas in Communications, pages 1404-1414.