A Policy Authoring Process and DEN-ng Model Extension for Federation Governance
- 2 Citations
- 318 Downloads
Abstract
To support rapidly evolving business models, communications network management systems are increasingly being federated to provide more flexible, end-to-end service management. In the future, such federation will need to be achieved dynamically, thus management systems will need to incorporate capabilities supporting negotiation of federations and management of their lifecycle. We discuss how federations can be governed via negotiated federation-level policies, that should be consistent with the relevant local policies of individual federation members. We describe a policy authoring process, outlining the steps to be taken when local or federation-level policies are created, modified or withdrawn. As this process depends on the presence of a rich system model for policy analysis we describe an extension to DEN-ng that models governance of federated domains. Finally, we outline a case study relating to inter-organisation XMPP federations to illustrate the policy authoring process.
Keywords
Local Policy Policy Rule Policy Decision Point Network Management System Policy Enforcement PointPreview
Unable to display preview. Download preview PDF.
References
- 1.Barrett, K., Davy, S., Strassner, J., Jennings, B., van der Meer, S., Donnelly, W.: A Model based Approach for Policy Tool Generation and Policy Analysis. In: Proc. 2007 IEEE Global Information Infrastructure Symposium (GIIS 2007), pp. 99–105 (2007)Google Scholar
- 2.Bhatti, R., Bertino, E., Ghafoor, A.: X-FEDERATE: A Policy Engineering Framework for Federated Access Management. IEEE Transactions on Software Engineering 32, 330–346 (2006)Google Scholar
- 3.Brennan, R., Lewis, D., Keeney, J., Etzioni, Z., Feeney, K., O’ Sullivan, D., Lozano, J.A., Jennings, B.: Policy-based Integration of Multi-provider Digital Home Services. IEEE Network 23(6), 50–56 (2009)Google Scholar
- 4.Davy, S., Jennings, B., Strassner, J.: The Policy Continuum – A Formal Model. In: Proc. 2nd IEEE International Workshop on Modelling Autonomic Communications Environments (MACE 2007), pp. 65–79 (2007)Google Scholar
- 5.Davy, S., Jennings, B., Strassner, J.: The Policy Continuum – Policy Authoring and Conflict Analysis. Computer Communications 31, 2981–2995 (2008)Google Scholar
- 6.Feeney, K., Lewis, D., Wade, V.: Policy based Management for Internet Communities. In: Proc. 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), pp. 23–32 (2004)Google Scholar
- 7.Heimbigner, D., McLeod, D.: A Federated Architecture for Information Management. ACM Transactions on Information Systems 3(3), 278 (1985)Google Scholar
- 8.Hull, R., Kumar, B., Lieuwen, D.: Towards Federated Policy Management. In: Proc. 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), pp. 183–194 (2003)Google Scholar
- 9.Jennings, B., Feeney, K., Brennan, R., Balasubramaniam, S., Botvich, D., van der Meer, S.: Federating Autonomic Network Management Systems for Flexible Control of End-to-end Communications Services. In: Autonomic Network Management Principles. Elsevier, Amsterdam (2010s) (to appear)Google Scholar
- 10.Machiraju, V., Sahai, A., Van Moorsel, A.: Web Services Management Network: An Overlay Network for Federated Service Management. In: Proc. 8th IFIP/IEEE International Symposium on Integrated Network Management (IM 2003), vol. 3, pp. 351–364 (2003)Google Scholar
- 11.Strassner, J.: DEN-ng: Achieving Business-driven Network Management. In: Proc. 2002 IEEE/IFIP Network Operations and Management Symposium (NOMS 2002), pp. 753–766 (2002)Google Scholar
- 12.Strassner, J.: Policy-Based Network Management: Solutions for the Next Generation. The Morgan Kaufmann Series in Networking. Morgan Kaufmann, San Francisco (2003)Google Scholar
- 13.Strassner, J., de Souza, J., van der Meer, S., Davy, S., Barrett, K., Raymer, D., Samudrala, S.: The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking. Journal of Network and Systems Management 17, 5–32 (2009)Google Scholar