A Hierarchical Policy Specification Language and Enforcement Mechanism for Governing Digital Enterprises
نویسندگان
چکیده
This paper is part of a research program based on the thesis that the only reliable way for ensuring that a heterogeneous distributed community of software modules and people conforms to a given policy is for this policy to be enforced. We have devised a mechanism called law-governed interaction (LGI) for this purpose. As has been demonstrated in previous publications, LGI can be used to specify a wide range of policies to govern the interactions among the members of large and heterogeneous communities of agents dispersed throughout a distributed enterprise, and to enforce such policies in a decentralized and efficient manner. What concerns us in this paper is the fact that a typical enterprise is bound to be governed by a multitude of policies. Such policies are likely to be interrelated in complex ways, forming an ensemble of policies that is to govern the enterprise as a whole. As a step toward organizing such an ensemble of policies, we introduce in this paper a hierarchical inter-policy relation called superior/subordinate. This relation is intended to serve two distinct, if related, purposes. First, it is to help organize and classify a set of enterprise policies. Second, this relation is to help regulate the long term evolution of the various policies that govern an enterprise. For this purpose, each policy in the hierarchy should circumscribe the authority and the structure of policies subordinate to it, in some analogy to the manner in which a constitution in American jurisprudence constrains the laws subordinate to it. Broadly speaking, the hierarchical structure of the ensemble of policies that govern a given enterprise is to reflect the hierarchical structure of the enterprise itself.
منابع مشابه
Policy Specification Using Sequence Diagrams
With the ever increasing importance of computer networks such as the Internet, and the today almost ubiquitous online services, the needs for the management of these networks and services, as well as the management of the associated security, risk and trust are growing correspondingly. Policy based management of information systems has the last decade emerged as an adaptive and flexible approac...
متن کاملPolicy Mapper: A Simplified Approach for Administration of Location-based Access Control Policies
An important issue in mobile computing systems is the administration of locationbased access control policies, particularly the mechanism for specification and enforcement of spatial constraints. Simplifying the administration of such policies requires a mechanism that supports both an intuitive and scalable spatial constraint specification and a flexible enforcement architecture. In this paper...
متن کاملEnforcement of a P3P Privacy Policy
P3P is a machine readable XML language used by enterprises to express their privacy policy on a web site. The language is well supported with a number of tools now available for creating P3P policies, browsers beginning to support P3P function, and numerous web sites including P3P policy files on them. P3P is useful for declaring privacy promises but there is little experience in enforcing P3P ...
متن کاملA Policy Engineering Framework for Federated Access Management
Bhatti, Rafae A. Ph.D., Purdue University, May, 2006. A Policy Engineering Framework for Federated Access Management. Major Professor: Arif Ghafoor. Federated systems are an emerging paradigm for information sharing and integration. Such systems require access management policies that not only protect user privacy and resource security but also allow scalable and seamless interoperation. Curren...
متن کاملSimulation Verification and Validation by Dynamic Policy Specification and Enforcement
This article presents a new verification and validation technique for simulation using dynamic policy specification and enforcement. Security requirements, certain functional requirements, and constraints can be formally specified as policies, and they are used to check at runtime whether the behaviors of the system under simulation are within the given constraints. A policy violation reveals a...
متن کامل