SLIDE 2 Policies
- Originally introduced to separate the strategy for resource allocation in OSs
from the mechanisms controlling the resources. R Levin et al.Policy/Mechanism Separation in Hydra. 5th Symp. on Operating Systems Principles (SOSP), November 1975.
- Became popular in large centralised access control systems and
subsequently, in the early 90’s, for managing large networks and distributed systems.
- Policies apply to large sets of objects providing uniform configuration.
- Provide the means to automate adaptation across large systems
Policy Areas
Network and Systems Management Access Control and Security Management Enterprise Distributed Object Computing Policy Workshop 1999 Privacy Trust Business Rules Multi-Agent Systems Web-Services SLAs Negotiation Semantic Web Data Centric Security
Policies for Large Systems require Complex Policy Systems
- Build on complex software infrastructure: CIM, LDAP
, Storage, Databases, Web-Services (WS-*), Grid-Environments, ...
- Systems are functionally separated. A function realised for the entire system
e.g., Authentication, Fault-Diagnostics, Accounting, ...
- Architectures are tightly coupled, making in difficult and laborious to add new
elements.
- Computational power is infinite (or almost). Components are always available
- Policies are replacing human actions.
Examples: Ponder
LDAP Server Domain Service Front End HypTree Browser Editor
Policy Object enable Enforcement Agents enable Deleted Dormant Loaded Enabled load unload disable Access Controllers (Authorisation Policies) Policy Management Agents (Obligation & Refrain Policies)
Deployment
Policy Source Text Code Assembler Call Policy- Service to store policy code in directory IC Scope/ Type Analysis Semantic Analyser AST Syntax Analyser (SableCC) Syntax Analysis XML Code Generator Java security Code Generator Win2000 security Code Generator
...
Java obligation policies
Compiler
OPOs RPOs
load, enable,.. checkRefrains enable,disable eventHandler
enable,disable checkRefrain register, ... eventEngine
ACs
OEOs REOs
Policy Management Agent Event Service
Access Controllers 1 2 3 7 4 5 6 2 8 9
Enforcement Configuration Manager Toolkit
London network edge router edge router Paris network tr1
inst inst mstruct /london/tr1 = trafficT(op1, qos1)
core network tr2
mstruct /paris/tr2 = trafficT(op1, qos2)
Roles, Rel Management Structures CIM DiffServ Analysis Refinement