29-31 January 2001
Hosted by HP-Laboratories, Bristol, U.K.
Technical cosponsor: IEEE ComSoc
Policy based systems are the subject of a wide range of activities in universities, standardisation bodies and within industry. They have a wide spectrum of applications ranging from quality of service management within networks to security and enterprise modelling. This workshop will provide a forum for discussion and collaboration between researchers, developers and users of policy based systems. It will bring together the various communities working on policy and follows on from the successful informal
Policy Workshop held in November 1999.
Within the Internet community there is considerable interest in Policy Based Networking. A number of companies have announced tools to support the specification and deployment of policies. Much of this work is focused on policies for quality of service management within networks and the Internet Engineering and Distributed Management Task Forces (IETF/DMTF) is actively working on standards related to this area
(policy work links).
The Security community has focused on the specification and analysis of access control policy which has evolved into the work on Role-Based Access Control (RBAC). There has been work over a number of years in the academic community on specification and analysis of policies for Distributed Systems mostly concentrating on authorisation policies. Although there are strong similarities in the concepts and techniques used by the different communities there is no commonly accepted terminology or notation for specifying policy.
Several research groups are looking at high-level aspects of policy related to Enterprise Modelling. An ISO Open Distributed Processing working group is defining Policy and Role concepts within the Enterprise Viewpoint. Enterprise goals or Service Level Agreements can be considered as high-level abstract policies which must be progressively refined into implementable policies. The work on the specification and analysis of Business Rules is also relevant.
The common concept of policy, within all of the above communities, is that polices define a set of rules governing choices in the behaviour of the system. The motivation is to be able to modify policy in order to change system behaviour without having to re-implement the system, or restructure the requirements specification.
Authors are invited to submit papers addressing but not limited to the following topics:
![]() |
Abstractions and Notations for Policy Specification |
![]() |
Security Policies and Role Based Access Control |
![]() |
Management Policies |
![]() |
Policy Based Networking |
![]() |
Implementation Models and Techniques |
![]() |
Services for Storing and Manipulating Policies |
![]() |
Policy Support for Active Networks and Mobile Environments |
![]() |
Application-Specific Policy Frameworks |
![]() |
Policy Refinement |
![]() |
Policy Analysis |
![]() |
Business Rules |
![]() |
Standardisation Activities |
![]() |
Case Studies |
The emphasis of the workshop will be on practical approaches to policy, however, novel contributions are encouraged.
Policies for Distributed Systems and Networks
Sloman, M., Imperial College, London, UK
Lobo, J., Bell Labs, Murray Hill, NJ, USA
Lupu, E.C., Imperial College, London, UK
(Eds.)
Springer Verlag Lecture Notes in Computer
Science.VOL. 1995
ISBN 3-540-41610-2
Price DM 78, See the following for
abstracts and ordering information
http://link.springer.de/link/service/series/0558/tocs/t1995.htm
Position Papers pdf 1Mbyte file
Invited Talks pdf 1Mbyte file
Additional Invited Talks (not in the above file)
Joe Pato's Slides pdf 2.5Mbyte file
The workshop will include both invited papers and presentations on accepted refereed papers which will be published (probably by IEEE Press) in a proceedings. There will be substantial time allocated for discussions as well as panel sessions.
Submitted papers must present original, unpublished research or experiences. They should be full papers and be no longer than 10 pages IEEE double column format. Submissions must include a cover page in ASCII format, containing the title, author name(s) and affiliation(s), the complete address (telephone, fax, email) of the corresponding author, and an abstract (max 150 words) followed by up to 5 keywords.
Papers under review elsewhere must not be submitted to Policy 2000.
Authors are requested to submit papers in electronic PDF or Postscript format.
Paper Submission | 31 July 2000 |
Notification of Acceptance | 26 September 2000 |
Camera Ready Copies submitted | 26 October |
Workshop | 29-31 January 2001 |
Morris Sloman
Department of Computing, Imperial College
London SW7 2BZ, UK
Phone: +44 20 7594 8279
Fax: +44 20 7581 8024
email: m.sloman@doc.ic.ac.uk
Emil Lupu Department of Computing Imperial College London SW7 2BZ, UK Phone: +44 20 7594 8249 Fax: +44 20 7581 8024 email: e.c.lupu@doc.ic.ac.uk |
Jorge Lobo Bell Labs 600 Mountain Ave., 2c-219 Murray Hill, NJ 07974, USA Phone: +1-908-582-1731 Fax: +1-908-582-4092 email: jlobo@research.bell-labs.com |
Jan Ward
Events Co-ordinator
HP Labs, Bristol
Phone: +44 117 312 8032
Fax: +44 117 312 9364
email: jan@hplb.hpl.hp.com
David Black, EMC, USA
Matt Blaze, AT&T, USA
Naranker Dulay, Imperial College, UK
Jan Chomicki, Monmouth University, USA
Ed Ellesson, Tivoli Systems, USA
Kohei Iseda, Fujitsu, Japan
Francisco Garcia, Agilent Laboratories, Scotland
Cheh Goh, HP Laboratories, UK,
Peter Linington, University of Kent, UK
Hugh Mahon, HP, USA
Ian Marshall, BT Labs., UK
Zoran Milosevic, DSTC, Brisbane, Australia
Naftaly Minksy, Rutgers University, USA
Ken Moody, Cambridge University, UK
Jonathan Moffett, University of York, UK
Ravi Sandhu, George Mason University, USA
Edgar Sibley, George Mason University, USA
John Strassner, Cisco, USA
Vijay Varadharajan, University of Western Sydney, Australia
Dinesh Verma, IBM, USA
Andrea Westerinen, CISCO, USA
To subscribe or unsubscribe to the email distribution list visit
http://www2.doc.ic.ac.uk/mailman/listinfo.cgi/policy-sig
Pages maintained by: Emil Lupu (e.c.lupu@doc.ic.ac.uk)