DIMACS Working Group Meeting on Policy Driven Decision Making and Dynamic Interoperability
December 8, 2000
DIMACS Center, Rutgers University, Piscataway, NJ
- Organizers:
- Tom Buckman, MITRE Corporation, buckmant@mitre.org
- Joan Feigenbaum, Yale University, jf@cs.yale.edu
- Fred Roberts, Rutgers University, froberts@dimacs.rutgers.edu
Presented under the auspices of the Special Year on Next Generation Networks Technologies and Applications.
Co-sponsored by DIMACS, the Office of Naval Research and the National Science Foundation.
ABSTRACTS
1.
A Taxonomy for Computer Systems Interoperability
Bruce Barnes, Terry Bollinger and Edgar Sibley
Abstract: Interoperability between heterogeneous computer systems is
vital to many types of enterprises, but the need for interoperability is
particularly conspicuous in naval and other military applications where
pressing new requirements may arise quickly and change rapidly. This
presentation will describe the problem and provides a visual taxonomy to
help understand the scope and research needs of this enormous problem.
It explores several dimensions of computer systems interoperability
including, the diversity of equipment and personnel over which systems
interoperability is needed. Each of the various elements of computer
systems infrastructure must interoperate. Another dimension includes
some of the attributes of the computer systems such as, scalability,
functionality, and binding time.
2.
TITLE: XML Based InteroperabilityComponents
SPEAKER: Dr. Tom Buckman, MITRE Corporation
ABSTRACT
XML has emerged as an essential construct in a number of recent initiatives
aimed at improving interoperability at the business component level. These
initiatives hold the promise of greatly improving the ability of
organizations to quickly join themselves together to achieve mutually
agreed goals and objectives. However, absent from the current work is
consideration of how to rapidly conduct policy negotiations between these
organization and translate the results into a coordinated set of actions
that can be used to help automate the process of the organizations joining
themselves together.
This talk looks at the enabling role of XML within the architecture
frameworks of three initiatives aimed at improving interoperability at the
business component level: RosettaNet, ebXML and Open Buying on the Internet
(OBI). Key ideas are highlighted and the potential role of policy based
decision making in extending these ideas is illustrated.
3.
TITLE: Conflict Resolution in Policy Management
SPEAKER: Jan Chomicki, Associate Professor, CSE Dept, University at Buffalo
ABSTRACT:
The simple event-condition-action (ECA) rule paradigm of active databases
has proved very useful in many database applications. However, its
applicability goes beyond data management. ECA rules can be used in
network management and monitoring, electronic commerce, security and access
management, and other application areas, to express policies -- collections
of general principles specifying the desired behavior of a
system. Usually, policies are coded in an imperative programming language
like Java. This makes for implementation ease and efficiency but limits
what can be done with policies. For instance, it is difficult to maintain,
verify, or analyze such policies.
In this talk I will use a declarative policy definition language PDL, in
which policies are formulated as sets of ECA rules. In contrast to standard
database trigger languages, PDL has a rich event sublanguage but allows
only uninterpreted actions. In addition to rules, one can specify in PDL
constraints on concurrent or sequential execution of actions. I will
address the issue of defining policy monitors that guarantee that
constraint violations (action conflicts) are fully resolved at run-time.
The monitors resolve conflicts through action cancellation or delay. The
monitors may also differ with respect to a novel property called
"unobtrusiveness" which requires that conflict resolution produce a result
corresponding to some conflict-free execution of the policy. I will show
how to specify the monitors declaratively using (a variant of) Datalog. I
will also present algorithms for the evaluation of monitors and study their
computational properties. Finally, I will describe the architecture of a
PDL-based policy server being used to provide centralized administration of
a soft switch in a communication network.
4.
TITLE: Dynamic Policies Through Context-Sensitive Situations
SPEAKER: Dr. Opher Etzion Manager, Active Management Technologies;
IBM Research Laboratory in Haifa
ABSTRACT:
Policies may be driven by complex combination of events that may have
temporal or spatio-temporal characteristics. An example is the stock market
domain : "If I am not in a meeting then notify me whenever IBM stock went
up by three percent within two hours". Amit (Active middleware technology)
is a research project in IBM that deals with integration of data and events
from different sources, to provide high-speed situation detection
mechanism. In the talk I'll describe the technology features, as well as
one of its applications, the management of virtual enterprises integrating
events from the IT infrastructure ("a communication line has failed") and
from the business processes world ("the delivery truck has been delayed due
to a blocked road").
5.
Generalized Certificate Revocation
Carl A. Gunter, University of Pennsylvania
This talk introduces a language for creating and manipulating
CERTIFICATES, that is, digitally signed data based on public key
cryptography, and a system for REVOKING certificates. Our approach
provides a uniform mechanism for secure distribution of public key
bindings, authorizations, and revocation information. An external
language for the description of these and other forms of data is
compiled into an intermediate language with a well-defined
denotational and operational semantics. The internal language is used
to carry out consistency checks for security and optimizations for
efficiency. Our primary contribution is a technique for treating
revocation data DUALLY to other sorts of information using a polarity
discipline in the intermediate language. This is joint work with
Trevor Jim. A paper on the topic can be found at
http://www.cis.upenn.edu/~qcm/papers/popl00.ps.
6.
Communal Access Control Policies, and Interoperability Between Them
Naftaly Minsky, Rutgers University
It is my thesis that for a group of autonomous agents to interoperate
effectively, they must be able to trust each other to comply with some common
rules-of-engagement, or a policy. Moreover, it stands to reason that if the
members of the group in question are heterogeneous, with little or no
trust in
each other, then their interaction-policy needs to be enforced; and that this
enforcement needs to be de-centralized, if the group can be large.
Guided by this thesis we have developed a coordination mechanism called
Law-Governed Interaction (LGI), that enables a community C of distributed
agents to interact under an explicit and strictly enforced policy, called the
``law'' of this community. This mechanism, which is currently prototyped by
the
Moses toolkit, has the following characteristics:
(a) The membership of C can change dynamically, and can be very large.
(b) LGI makes no assumptions about the structure and behavior of members
of C, which can, therefore, be quite heterogeneous.
(c) The deployment of a community under a specified law is easy,
incremental, and can be done dynamically.
(d) The enforcement of laws under LGI is strictly decentralized---for
scalability.
In the talk, I will attempt to motivate this mechanism, and describe
its nature.
7.
Network Configuration Management and Interoperability
S. Raj Rajagopalan, Telcordia Technologies
Security has often been cited as the primary obstacle in the fielding of many
technologies in both commercial and DoD networks. Past experience also
demonstrates our inability to manage networks in such a way that desired
security properties are upheld as the network changes. Network management
tools are needed to automate management of firewall networks in dynamic
environments to the fullest extent possible. Rather than depend on human
administrators to provide the right configurations on each network element, it
would be necessary in the future to enable network elements to adapt to change
by reconfiguring as appropriate. The challenge would then be for these network
elements to know the right reconfiguration so that the appropriate security
policies are upheld while legitimate users are not inconvenienced by loss of
service. This project focuses on management of configurations of network
elements so that stated policies can be upheld.
Our specific application is to design, develop, and demonstrate a prototype
system for automatically managing a network of firewalls in an enterprise
network so that security policy is upheld constantly as the network
changes. Specifically, we aim to build an automatic reconfiguration system that
not only guarantees that the security policy is being upheld in a network but
also allows two different administrative domains with different security
policies to negotiate their interconnections to uphold their respective
security policies. The salient aspects of our approach are: (1) strict
separation between the policy, network topology, and the mechanisms used to
implement the policy, (2) specification of policies and topology at all layers
in the network from the physical layer to the application layer in as human
comprehensible language as possible, (3) reduction of policy administration to
configuration management using models of network elements and protocols, (4)
extension of policy administration to all relevant network elements such as
firewalls, routers, switches, workstations, etc, and (5) explicit composability
of network policies and models to reason about a network as a whole rather than
individual elements.
Other Workshops
DIMACS Homepage
Contacting the Center
Document last modified on December 8, 2000.