As communications networks become increasingly dynamic, heterogeneous, less reliable, and larger in scale, it becomes difficult, if not impossible, to effectively manage these …
S Davy, B Jennings, J Strassner - Computer Communications, 2008 - Elsevier
The policy continuum is a fundamental component of any policy-based management implementation for autonomic networking, but as of yet has no formal operational semantics …
S Davy, B Jennings, J Strassner - Proceedings of the Second IEEE …, 2007 - academia.edu
The policy continuum, one of the cornerstones of autonomic network management, provides a framework for the development of stratified sets of policy languages, tied together by a …
D Raymer, S van der Meer… - Fifth IEEE Workshop on …, 2008 - ieeexplore.ieee.org
This paper aims to provide a roadmap on how to extend our understanding of the biological analogy applied to a single computing platform (Autonomic Computing) towards a larger …
A Lamba - International Journal of Scientific Research and …, 2013 - papers.ssrn.com
The management of security policies has become increasingly difficult for the security expert given the number of domains to manage their extent and their complexity. A security expert …
S Davy, B Jennings, J Strassner - NOMS 2008-2008 IEEE …, 2008 - ieeexplore.ieee.org
A key part of the policy authoring process is analysis of the potential for newly created or modified policies to conflict with already deployed policies. We propose an approach for …
Autonomic networking systems must be designed to achieve an appropriate balance between the operation of decentralized algorithms and processes that seek to maintain …
B Combemale, L Broto, X Crégut, M Daydé… - … Languages and Systems …, 2008 - Springer
Autonomic computing is recognized as one of the most promizing solutions to address the increasingly complex task of distributed environments' administration. In this context, many …
S Davy, B Jennings, J Strassner - 2009 IFIP/IEEE International …, 2009 - ieeexplore.ieee.org
We present a policy conflict analysis process that makes use of pre-defined semantic models of an application to perform effective and efficient conflict analysis. The process is …