Foreword | p. xi |
Preface | p. xiii |
Policy Definition and Usage Scenarios | p. 1 |
Formal Definition of Policy | p. 2 |
Types, Nature, and Usage of Policies | p. 6 |
Policy-Based Self-Configuration | p. 10 |
Policy-Based Self-Protection in Computer Networks | p. 13 |
Policy-Based Self-Optimization in Computer Systems | p. 15 |
Policy-Based Self-Healing | p. 16 |
Building a Policy-Based Management System | p. 17 |
Summary | p. 20 |
Policy Lifecycle-Creation, Distribution, and Enforcement | p. 21 |
A Holistic View of the Policy Lifecycle | p. 22 |
Instances of Policy-Based Systems | p. 25 |
Network QoS Control | p. 25 |
Privacy Policy Publication | p. 27 |
Policy-Based Management of Enterprise Network Access | p. 28 |
Policy Creation | p. 30 |
Policy Distribution | p. 31 |
Policy Distribution Using Repositories | p. 35 |
Grouping of Policies by System Components Role | p. 36 |
Grouping of Policy Components | p. 37 |
Policy Creation and Distribution for Multiple Administrative Domains | p. 38 |
Policy Enforcement | p. 41 |
Policy Evaluation Trigger | p. 42 |
Policy Enforcement Context | p. 44 |
Data Gathering | p. 45 |
Policy Evaluation | p. 46 |
Decision Execution | p. 49 |
Summary | p. 50 |
Policy Information Model | p. 51 |
How Is an Information Model Described? | p. 52 |
Policy Information Models | p. 54 |
Why Use Information Models | p. 55 |
Condition-Action Information Model | p. 56 |
Event-Condition-Action Information Model | p. 59 |
Mode-Subject-Action-Target Information Model | p. 59 |
Grouping, Scope, and Priorities | p. 60 |
A Standardized Policy Model | p. 62 |
The Common Information Model (CIM) | p. 62 |
The CIM Policy Model | p. 63 |
Summary | p. 69 |
Policy Languages | p. 71 |
Declarative Nature of Policy Languages | p. 72 |
Survey of Policy Languages | p. 73 |
PDL | p. 73 |
Ponder | p. 76 |
CQL | p. 79 |
XACML | p. 81 |
ACPL | p. 81 |
CIM-SPL | p. 82 |
CIM-SPL Policy Rules | p. 82 |
Policy Groups | p. 87 |
An Example of CIM-SPL Policy | p. 89 |
Summary | p. 91 |
Policy Transformation and Analysis | p. 93 |
Policy Transformation | p. 94 |
Design-Time Techniques for Policy Transformation | p. 95 |
Transformation Using Analytical Models | p. 96 |
Transformation Using Static Rules | p. 96 |
Transformation by Policy Table Lookup | p. 97 |
Transformation Using Case-Based Reasoning | p. 99 |
Real-Time Policy Transformation | p. 104 |
Policy Analysis | p. 106 |
Conflict Checking | p. 106 |
Conflict Resolution | p. 109 |
Coverage Checking | p. 111 |
What-If Analysis | p. 112 |
Related Work | p. 113 |
Summary | p. 114 |
Policy-Based Configuration Management | p. 115 |
Configuration Management Overview | p. 116 |
Policy-Based Configuration Management | p. 118 |
Policy-Based Simplification of Configuration Management | p. 118 |
Policy-Based Tuning of System Configuration | p. 119 |
Policy-Based Checking of System Configuration | p. 120 |
Example in Storage Area Networks | p. 121 |
Configuration Checking of Storage Area Networks | p. 122 |
Policy Modeling and Representation | p. 125 |
Architecture of a Policy-Based SAN Configuration Checker | p. 128 |
Example in Hosted Server Environment | p. 131 |
Architecture for Self-Configuration | p. 133 |
Variations on the Architecture | p. 136 |
Summary | p. 137 |
Policy-Based Fault Management | p. 139 |
Fault Management Overview | p. 139 |
Fault Management in Networks | p. 141 |
Fault Management in Web-Based Applications | p. 144 |
Policy-Based Fault Management | p. 145 |
Policy-Based Acquisition of Fault Information | p. 146 |
Policy-Based Format Conversion | p. 147 |
Policy-Based Event Volume Reduction | p. 149 |
Policy-Based Root Cause Analysis | p. 150 |
Policy-Based Remedial Action | p. 151 |
Architecture of a Policy-Based Fault Management System | p. 153 |
Summary | p. 156 |
Policy-Based Security Management | p. 157 |
Overview of Security Management | p. 158 |
Policy Applications in Security | p. 159 |
Policy-Driven Access Control | p. 160 |
Higher-Level Access Policies | p. 163 |
Policy-Based Self-Protection | p. 164 |
Policy-Based Communication Assurance | p. 168 |
Policy-Based Security Assurance for IPsec Protocol | p. 168 |
Business Needs Satisfied by the Security Assurance Tool | p. 169 |
Communication Control Policies for IPsec Protocol | p. 170 |
Generating the Communication Control Policies | p. 172 |
Summary | p. 173 |
Related Topics | p. 175 |
Production Rules | p. 175 |
Business Rules and Processes | p. 177 |
IT Processes | p. 179 |
Event Correlation and Notification Systems | p. 180 |
Service Level Agreements | p. 183 |
Regulatory Compliance | p. 185 |
Proliferation of Policy-Based Technologies | p. 186 |
References | p. 189 |
Index | p. 195 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.