Abstract | ||
---|---|---|
As the IT infrastructure complexity and pervasiveness grows, autonomic computing can greatly simplify its deployment and usage. Essentially, the goal of autonomic computing is to shift the burden of management of the component systems from the user to the system. In order to accomplish this, autonomic computing demands that the system be able to accept high level policies, analyze them, and provide meaningful feedback to simplify the usage of the infrastructure by domain experts and minimize human involvement in the loop. Policies, in general are defined at a higher level in terms of business objects, their attributes, and operations. On the other hand managed resources, on which the policies are finally going to execute, have their own access control lists to limit the operations that an application user can perform. As a result, many policies which are syntactically and semantically correct, may fail to execute at run time due to ACL violations. This paper describes an approach wherein the information on access control provided at the managed resources level is leveraged to check for policy executability and provide meaningful feedback in case there are problems. This is done at policy specification time as opposed to runtime, which is not desirable, as is typically done by current systems. Furthermore, this avoids redundant access control specifications which can lead to inconsistencies in addition to being a burden on the user. A pragmatic approach for checking policy executability from an access control viewpoint and providing several types of feedback are the focus of this paper. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1109/POLICY.2006.9 | POLICY |
Keywords | Field | DocType |
avoids redundant access control,fine-grained analysis,access control,policy executability,application user,autonomic computing,own access control list,access control viewpoint,autonomic computing demand,access control inference,high level policy,policy managers,meaningful feedback,pervasive computing,formal specification,information technology,resource management,computer architecture,databases,feedback,feedback loop,computer science,resource allocation,authorisation | Resource management,Autonomic computing,Computer security,Computer science,Business object,Formal specification,Resource allocation,Information technology management,Access control,Ubiquitous computing | Conference |
ISBN | Citations | PageRank |
0-7695-2598-9 | 0 | 0.34 |
References | Authors | |
7 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ranga R. Vatsavai | 1 | 20 | 3.38 |
Sharma Chakravarthy | 2 | 246 | 18.92 |
Mukesh Mohania | 3 | 496 | 42.79 |