首页 > 最新文献

2008 IEEE Workshop on Policies for Distributed Systems and Networks最新文献

英文 中文
Policy Specification and Enforcement for Smart ID Cards Deployment 智能身份证部署的政策规定及执行
Pub Date : 2008-06-02 DOI: 10.1109/POLICY.2008.14
R. Chandramouli
Deployment of smart cards for identity verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called identity management system (IDMS) is often used. To protect the integrity, confidentiality and privacy of the credential data that is collected, stored and disseminated through IDMS, a sophisticated set of policies governing data flows, processing and distribution are required. In this paper, we present a policy specification and enforcement framework using XML, XML schemas and XSLT that was developed for secure management of the infrastructure system used for a large scale smart ID card deployment.
部署用于身份验证的智能卡需要从异构系统(有时是遗留系统)收集凭据并向系统提供凭据。为了简化此过程,通常使用称为身份管理系统(IDMS)的集中式身份存储。为了保护通过IDMS收集、存储和传播的凭证数据的完整性、机密性和隐私性,需要一套管理数据流、处理和分发的复杂策略。在本文中,我们提出了一个使用XML、XML模式和XSLT的策略规范和实施框架,该框架是为大规模智能身份证部署所使用的基础设施系统的安全管理而开发的。
{"title":"Policy Specification and Enforcement for Smart ID Cards Deployment","authors":"R. Chandramouli","doi":"10.1109/POLICY.2008.14","DOIUrl":"https://doi.org/10.1109/POLICY.2008.14","url":null,"abstract":"Deployment of smart cards for identity verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called identity management system (IDMS) is often used. To protect the integrity, confidentiality and privacy of the credential data that is collected, stored and disseminated through IDMS, a sophisticated set of policies governing data flows, processing and distribution are required. In this paper, we present a policy specification and enforcement framework using XML, XML schemas and XSLT that was developed for secure management of the infrastructure system used for a large scale smart ID card deployment.","PeriodicalId":247708,"journal":{"name":"2008 IEEE Workshop on Policies for Distributed Systems and Networks","volume":"NS34 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116551454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Algebra for Integration and Analysis of Ponder2 Policies Ponder2策略的积分与分析代数
Pub Date : 2008-06-02 DOI: 10.1109/POLICY.2008.42
Hang Zhao, Jorge Lobo, S. Bellovin
Traditional policies often focus on access control requirement and there have been several proposals to define access control policy algebras to handle their compositions. Recently, obligations are increasingly being expressed as part of security policies. However, the compositions and interactions between these two have not yet been studied adequately. In this paper, we propose an algebra capturing both authorization and obligation policies. The algebra consists of two policy constants and six basic operations. It provides language independent mechanisms to manage policies. As a concrete example, we instantiate the algebra for the Ponder2 policy language.
传统策略通常关注访问控制需求,有几种建议定义访问控制策略代数来处理它们的组合。最近,义务越来越多地被表示为安全策略的一部分。然而,这两者的组成和相互作用尚未得到充分的研究。在本文中,我们提出了一个同时捕获授权和义务策略的代数。该代数由两个策略常数和六个基本运算组成。它提供了独立于语言的机制来管理策略。作为一个具体的例子,我们实例化了Ponder2策略语言的代数。
{"title":"An Algebra for Integration and Analysis of Ponder2 Policies","authors":"Hang Zhao, Jorge Lobo, S. Bellovin","doi":"10.1109/POLICY.2008.42","DOIUrl":"https://doi.org/10.1109/POLICY.2008.42","url":null,"abstract":"Traditional policies often focus on access control requirement and there have been several proposals to define access control policy algebras to handle their compositions. Recently, obligations are increasingly being expressed as part of security policies. However, the compositions and interactions between these two have not yet been studied adequately. In this paper, we propose an algebra capturing both authorization and obligation policies. The algebra consists of two policy constants and six basic operations. It provides language independent mechanisms to manage policies. As a concrete example, we instantiate the algebra for the Ponder2 policy language.","PeriodicalId":247708,"journal":{"name":"2008 IEEE Workshop on Policies for Distributed Systems and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122299566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Policy Management across Multiple Platforms and Application Domains 跨多个平台和应用程序域的策略管理
Pub Date : 2008-06-02 DOI: 10.1109/POLICY.2008.35
Matt Johnson, J. Bradshaw, Hyuckchul Jung, Niranjan Suri, M. Carvalho
One of the challenges of building a policy management framework is making it flexible enough to handle differences in both policy semantics and enforcement strategies across multiple platforms and application domains. The system must be expressive enough in each application domain to provide the richness needed for interesting policies. It must also provide a simple and flexible enforcement mechanism for adaptation to a variety of systems. In this paper we discuss the application of the KAoS policy services framework to human-robot teamwork - an application that involves a variety of application domains and enforcement at different levels of control; from low level network resource control to high level organizational constraints and coordination management. The study culminated in an outdoor field exercise that required coordination of mixed sub teams composed of two people and five robots whose task was to find and apprehend an intruder on a Navy pier.
构建策略管理框架的挑战之一是使其足够灵活,以处理跨多个平台和应用程序域的策略语义和实施策略的差异。系统必须在每个应用程序域中具有足够的表达能力,以提供有趣的策略所需的丰富内容。它还必须提供一种简单而灵活的执行机制,以适应各种制度。在本文中,我们讨论了KAoS策略服务框架在人-机器人团队合作中的应用——一个涉及各种应用领域和不同控制级别执行的应用;从低级网络资源控制到高级组织约束和协调管理。这项研究在一场户外野外演习中达到高潮,该演习要求由两人和五个机器人组成的混合小队进行协调,任务是在海军码头找到并逮捕入侵者。
{"title":"Policy Management across Multiple Platforms and Application Domains","authors":"Matt Johnson, J. Bradshaw, Hyuckchul Jung, Niranjan Suri, M. Carvalho","doi":"10.1109/POLICY.2008.35","DOIUrl":"https://doi.org/10.1109/POLICY.2008.35","url":null,"abstract":"One of the challenges of building a policy management framework is making it flexible enough to handle differences in both policy semantics and enforcement strategies across multiple platforms and application domains. The system must be expressive enough in each application domain to provide the richness needed for interesting policies. It must also provide a simple and flexible enforcement mechanism for adaptation to a variety of systems. In this paper we discuss the application of the KAoS policy services framework to human-robot teamwork - an application that involves a variety of application domains and enforcement at different levels of control; from low level network resource control to high level organizational constraints and coordination management. The study culminated in an outdoor field exercise that required coordination of mixed sub teams composed of two people and five robots whose task was to find and apprehend an intruder on a Navy pier.","PeriodicalId":247708,"journal":{"name":"2008 IEEE Workshop on Policies for Distributed Systems and Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117075564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Policy Validation for System Automation: A Case Study 系统自动化的策略验证:案例研究
Pub Date : 2008-06-02 DOI: 10.1109/POLICY.2008.19
E. Zarpas, C. Eisner, Sivan Tal
Policies can be understood as specifications; therefore they can be translated more or less easily into formal languages and then be verified by formal techniques such as model checking. In this paper, we focus on formal verification of real-life industrial policies of the IBM Tivoli System Automation for Multi-Platform (ISA). We use PSL to model the system and describe the desired behavior and the RuleBase PE model checker to verify it.
策略可以理解为规范;因此,可以或多或少地将它们翻译成形式语言,然后通过模型检查等形式技术进行验证。在本文中,我们着重于IBM Tivoli System Automation for Multi-Platform (ISA)的现实产业政策的形式化验证。我们使用PSL对系统建模并描述期望的行为,并使用RuleBase PE模型检查器对其进行验证。
{"title":"Policy Validation for System Automation: A Case Study","authors":"E. Zarpas, C. Eisner, Sivan Tal","doi":"10.1109/POLICY.2008.19","DOIUrl":"https://doi.org/10.1109/POLICY.2008.19","url":null,"abstract":"Policies can be understood as specifications; therefore they can be translated more or less easily into formal languages and then be verified by formal techniques such as model checking. In this paper, we focus on formal verification of real-life industrial policies of the IBM Tivoli System Automation for Multi-Platform (ISA). We use PSL to model the system and describe the desired behavior and the RuleBase PE model checker to verify it.","PeriodicalId":247708,"journal":{"name":"2008 IEEE Workshop on Policies for Distributed Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129885715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Policy-Governed Information Exchange in a U.S. Army Operational Scenario 美国陆军作战场景中策略控制的信息交换
Pub Date : 2008-06-02 DOI: 10.1109/POLICY.2008.26
L. Bunch, J. Bradshaw, Clifford O. Young
The authors are investigating how emerging policy and semantic Web technologies can be used to help provide the best set of available tactical information to the Soldier in the field. In this initial effort, Researchers from the U.S. Army Research Labs (ARL) and the Florida Institute for Human and Machine Cognition (IHMC) have developed a system that demonstrates the potential of these technologies in a small-scale U.S. army mockup scenario. The system represents and reasons about domain-specific policies to help recognize what documents the end soldier is allowed to receive given the current mission context. The system also relies on policies to help recognize when appropriate human approval can be obtained or a specific transformation of the information can be performed to allow the information to be sent. Semantic Web technologies are further used to describe the properties and features of each document and relate these features to mission contexts in which the information is likely to be appropriate. The result is a compelling demonstration of the role that policies and semantic Web technologies can play in promoting the Army's need to share information while remaining vigilant of the requirements to protect methods and sources.
作者正在研究如何利用新出现的政策和语义网技术,为战场上的士兵提供最佳的战术信息。在最初的努力中,来自美国陆军研究实验室(ARL)和佛罗里达人类与机器认知研究所(IHMC)的研究人员开发了一个系统,在小规模的美国陆军模型场景中展示了这些技术的潜力。系统表示和解释特定于领域的策略,以帮助识别给定当前任务上下文允许终端士兵接收哪些文档。该系统还依赖策略来帮助识别何时可以获得适当的人工批准,或何时可以执行信息的特定转换以允许发送信息。语义Web技术进一步用于描述每个文档的属性和特征,并将这些特征与信息可能适合的任务上下文联系起来。结果令人信服地证明了政策和语义网技术在促进陆军共享信息需求的同时保持对保护方法和来源的需求的警惕方面可以发挥的作用。
{"title":"Policy-Governed Information Exchange in a U.S. Army Operational Scenario","authors":"L. Bunch, J. Bradshaw, Clifford O. Young","doi":"10.1109/POLICY.2008.26","DOIUrl":"https://doi.org/10.1109/POLICY.2008.26","url":null,"abstract":"The authors are investigating how emerging policy and semantic Web technologies can be used to help provide the best set of available tactical information to the Soldier in the field. In this initial effort, Researchers from the U.S. Army Research Labs (ARL) and the Florida Institute for Human and Machine Cognition (IHMC) have developed a system that demonstrates the potential of these technologies in a small-scale U.S. army mockup scenario. The system represents and reasons about domain-specific policies to help recognize what documents the end soldier is allowed to receive given the current mission context. The system also relies on policies to help recognize when appropriate human approval can be obtained or a specific transformation of the information can be performed to allow the information to be sent. Semantic Web technologies are further used to describe the properties and features of each document and relate these features to mission contexts in which the information is likely to be appropriate. The result is a compelling demonstration of the role that policies and semantic Web technologies can play in promoting the Army's need to share information while remaining vigilant of the requirements to protect methods and sources.","PeriodicalId":247708,"journal":{"name":"2008 IEEE Workshop on Policies for Distributed Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129290493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Concurrent Enforcement of Usage Control Policies 同时执行使用控制策略
Pub Date : 2008-06-02 DOI: 10.1109/POLICY.2008.44
H. Janicke, A. Cau, F. Siewe, H. Zedan
Policy-based approaches to the management of systems distinguish between the specification of requirements, in the form of policies, and their enforcement on the system. In this work we focus on the latter aspect and investigate the enforcement of stateful policies in a concurrent environment. As a representative of stateful policies we use the UCON model and show how dependencies between policy rules affect their enforcement. We propose a technique for enforcing policies concurrently based on the static analysis of dependencies between policies. The potential of our technique for improving the efficacy of enforcement mechanisms is illustrated using a small, but representative example.
基于策略的系统管理方法区分了需求的说明(以策略的形式)和它们在系统上的执行。在本文中,我们将关注后一个方面,并研究在并发环境中执行有状态策略。作为有状态策略的代表,我们使用UCON模型,并展示策略规则之间的依赖关系如何影响其实施。我们提出了一种基于策略之间依赖关系的静态分析并发执行策略的技术。我们的技术在提高执行机制效力方面的潜力是通过一个小而有代表性的例子来说明的。
{"title":"Concurrent Enforcement of Usage Control Policies","authors":"H. Janicke, A. Cau, F. Siewe, H. Zedan","doi":"10.1109/POLICY.2008.44","DOIUrl":"https://doi.org/10.1109/POLICY.2008.44","url":null,"abstract":"Policy-based approaches to the management of systems distinguish between the specification of requirements, in the form of policies, and their enforcement on the system. In this work we focus on the latter aspect and investigate the enforcement of stateful policies in a concurrent environment. As a representative of stateful policies we use the UCON model and show how dependencies between policy rules affect their enforcement. We propose a technique for enforcing policies concurrently based on the static analysis of dependencies between policies. The potential of our technique for improving the efficacy of enforcement mechanisms is illustrated using a small, but representative example.","PeriodicalId":247708,"journal":{"name":"2008 IEEE Workshop on Policies for Distributed Systems and Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124020851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
EXAM: An Environment for Access Control Policy Analysis and Management 考试:访问控制策略分析和管理环境
Pub Date : 2008-06-02 DOI: 10.1109/POLICY.2008.30
P. Rao, D. Lin, E. Bertino, Ninghui Li, Jorge Lobo
As distributed collaborative applications and architectures are adopting policy-based solutions for tasks such as access control, network security and data privacy, the management and consolidation of a large number of policies is becoming a crucial component of such solutions. In large-scale distributed collaborative applications like Web services, there is need for analyzing policy interaction and performing policy integration. In this demonstration, we present EXAM, a comprehensive environment for policy analysis and management, which can be used to perform a variety of functions such as policy property analyses, policy similarity analysis, policy integration. Our work focuses on analysis of access control policies written in XACML (Extensible Access Control Markup Language) [5]. We consider XACML policies because XACML is a rich language able to represent many policies of interest to real world applications and is gaining widespread adoption in the industry.
由于分布式协作应用程序和体系结构正在为访问控制、网络安全和数据隐私等任务采用基于策略的解决方案,因此管理和整合大量策略正成为此类解决方案的关键组成部分。在Web服务等大规模分布式协作应用程序中,需要分析策略交互并执行策略集成。在本演示中,我们介绍了EXAM,这是一个用于策略分析和管理的综合环境,可用于执行各种功能,如策略属性分析、策略相似性分析、策略集成。我们的工作重点是分析用XACML(可扩展访问控制标记语言)编写的访问控制策略[5]。我们考虑XACML策略,因为XACML是一种丰富的语言,能够表示实际应用程序感兴趣的许多策略,并且在业界得到了广泛的采用。
{"title":"EXAM: An Environment for Access Control Policy Analysis and Management","authors":"P. Rao, D. Lin, E. Bertino, Ninghui Li, Jorge Lobo","doi":"10.1109/POLICY.2008.30","DOIUrl":"https://doi.org/10.1109/POLICY.2008.30","url":null,"abstract":"As distributed collaborative applications and architectures are adopting policy-based solutions for tasks such as access control, network security and data privacy, the management and consolidation of a large number of policies is becoming a crucial component of such solutions. In large-scale distributed collaborative applications like Web services, there is need for analyzing policy interaction and performing policy integration. In this demonstration, we present EXAM, a comprehensive environment for policy analysis and management, which can be used to perform a variety of functions such as policy property analyses, policy similarity analysis, policy integration. Our work focuses on analysis of access control policies written in XACML (Extensible Access Control Markup Language) [5]. We consider XACML policies because XACML is a rich language able to represent many policies of interest to real world applications and is gaining widespread adoption in the industry.","PeriodicalId":247708,"journal":{"name":"2008 IEEE Workshop on Policies for Distributed Systems and Networks","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131644169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Ponder2 - A Policy Environment for Autonomous Pervasive Systems Ponder2 -自治普适系统的政策环境
Pub Date : 2008-06-02 DOI: 10.1109/POLICY.2008.10
K. Twidle, Emil C. Lupu, Naranker Dulay, M. Sloman
Policies form an important part of management activities and are an effective means of implementing self-adaptation in pervasive systems. Many policy- based systems designed to date focus on large-scale networks and distributed systems. Consequently, they are often fragmented, dependent on infrastructure and lacking flexibility and extensibility. This demonstration presents Ponder2, a self-contained, stand-alone policy environment that is suitable for a wide range of applications in environments ranging from single devices, to personal area networks, ad-hoc networks and distributed systems. Ponder2 environments can be federated giving a consistent view of the name spaces within the environments and the ability to propagate events in a transparent manner.
政策是管理活动的重要组成部分,是在普遍系统中实现自我适应的有效手段。迄今为止,许多基于策略的系统都是针对大规模网络和分布式系统设计的。因此,它们往往是碎片化的,依赖于基础设施,缺乏灵活性和可扩展性。本演示展示了Ponder2,这是一个独立的策略环境,适用于从单个设备到个人局域网、自组织网络和分布式系统等环境中的广泛应用程序。Ponder2环境可以联合起来,提供环境内名称空间的一致视图,并能够以透明的方式传播事件。
{"title":"Ponder2 - A Policy Environment for Autonomous Pervasive Systems","authors":"K. Twidle, Emil C. Lupu, Naranker Dulay, M. Sloman","doi":"10.1109/POLICY.2008.10","DOIUrl":"https://doi.org/10.1109/POLICY.2008.10","url":null,"abstract":"Policies form an important part of management activities and are an effective means of implementing self-adaptation in pervasive systems. Many policy- based systems designed to date focus on large-scale networks and distributed systems. Consequently, they are often fragmented, dependent on infrastructure and lacking flexibility and extensibility. This demonstration presents Ponder2, a self-contained, stand-alone policy environment that is suitable for a wide range of applications in environments ranging from single devices, to personal area networks, ad-hoc networks and distributed systems. Ponder2 environments can be federated giving a consistent view of the name spaces within the environments and the ability to propagate events in a transparent manner.","PeriodicalId":247708,"journal":{"name":"2008 IEEE Workshop on Policies for Distributed Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129872873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Policy Peering for Next-Generation Networks 下一代网络的策略对等
Pub Date : 2008-06-02 DOI: 10.1109/POLICY.2008.27
K. Bogineni, F. Andreasen
This paper discusses policy architecture for converged service provider networks and the need for policy peering. A policy peering architecture is proposed. The design principles and requirements for the peering interface and its use for static and dynamic policies across service providers are explained.
本文讨论了融合服务提供商网络的策略体系结构以及策略对等的需求。提出了一种策略对等体系结构。解释了对等接口的设计原则和需求,以及它在跨服务提供者的静态和动态策略中的使用。
{"title":"Policy Peering for Next-Generation Networks","authors":"K. Bogineni, F. Andreasen","doi":"10.1109/POLICY.2008.27","DOIUrl":"https://doi.org/10.1109/POLICY.2008.27","url":null,"abstract":"This paper discusses policy architecture for converged service provider networks and the need for policy peering. A policy peering architecture is proposed. The design principles and requirements for the peering interface and its use for static and dynamic policies across service providers are explained.","PeriodicalId":247708,"journal":{"name":"2008 IEEE Workshop on Policies for Distributed Systems and Networks","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131652058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demonstrating Selected W3C Policy Languages Interest Group Use Cases Using the KAoS Policy Services Framework 使用KAoS策略服务框架演示选定的W3C策略语言兴趣组用例
Pub Date : 2008-06-02 DOI: 10.1109/POLICY.2008.49
Andrzej Uszok, J. Bradshaw
This demonstration will present policies and scenarios from selected W3C Policy Language Group use cases. The flexibility of the KAoS ontology-based policy services framework will be demonstrated by modeling the very diverse policies described in the use cases. The integration of the KAoS policy decision point (Guard) with the JBoss server will be shown. One of the use cases requires spatial reasoning for location-based policies.
此演示将展示来自所选W3C Policy Language Group用例的策略和场景。通过对用例中描述的非常多样化的策略进行建模,将展示基于KAoS本体的策略服务框架的灵活性。将展示KAoS策略决策点(Guard)与JBoss服务器的集成。其中一个用例需要对基于位置的策略进行空间推理。
{"title":"Demonstrating Selected W3C Policy Languages Interest Group Use Cases Using the KAoS Policy Services Framework","authors":"Andrzej Uszok, J. Bradshaw","doi":"10.1109/POLICY.2008.49","DOIUrl":"https://doi.org/10.1109/POLICY.2008.49","url":null,"abstract":"This demonstration will present policies and scenarios from selected W3C Policy Language Group use cases. The flexibility of the KAoS ontology-based policy services framework will be demonstrated by modeling the very diverse policies described in the use cases. The integration of the KAoS policy decision point (Guard) with the JBoss server will be shown. One of the use cases requires spatial reasoning for location-based policies.","PeriodicalId":247708,"journal":{"name":"2008 IEEE Workshop on Policies for Distributed Systems and Networks","volume":"36 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134128428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2008 IEEE Workshop on Policies for Distributed Systems and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1