International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 3 | Issue 2 | Year 2013 | Article Id. IJPTT-V3I3P401 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I3P401

Policy Management in Adhoc Networks


GantiNagaSatish, Prof. P. Suresh Varma

Citation :

GantiNagaSatish, Prof. P. Suresh Varma, "Policy Management in Adhoc Networks," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 2, pp. 27-32, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I3P401

Abstract

Policy-based management is based on defining a set of global rules, according to which a network or distributed system must operate. In the last few years, policy-based management has begun to emerge as the dominant paradigm for developing network and systems management functions, primarily, since it can reduce complexity in management applications. Although attempts are underway to standardize policy-based management, significant research challenges remain. The paper outlines the research agenda and application of policy management to security management.

Keywords

Policy Decision Point, Policy Enforcement Point, Policy Repository

References

[1] Mouna Ayari, Farouk Kamoun, Davor Males “Towards a Policy-Based Management for Ad Hoc Networks”
[2] Farooq Anjum and Petros Mouchtaris “Security For Wireless Ad Hoc Networks”
[3] Annie Ibrahim Rana Micheal O Foghlu Policy-based Traffic Management in Home Area Network –An Elementary Testbed Model
[4] M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized Trust Management,” Proceedings of the 17th IEEE Symposium on Security and Privacy, IEEE Computer Society, New York, 1996, pp. 164–173.
[5] M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, “The KeyNote Trust-Management System Version 2,” IETF RFC 2704, September 1999.
[6] A. D. Keromytis, S. Ioannidis, M. Greenwald, and J. Smith, “The STRONGMAN Architecture,”DISCEX 20003, Washington, DC, April 2003.
[7] T. Markham and C. Payne, “Security at the Network Edge: A Distributed Firewall Architecture,”DISCEX 20001, California, June 2001.
[8] A.Lindfors, “Policy Based Management in Ad-hoc Networks”http://www.tml.hut.fi/Opinnot/Tik110.551/2000/papers/p olicy_management/internetworking.html
[9] J.Moffet,M.Sloman, “ Policy Hierarchies for distributed Systems Management” IEEE December 1993
[10] M.Solman, “ Policy Driven Management for Distributed Systems” Journal of Network and Systems Manegement, DEC1994
[11] Jorge Pena Cotarelo “Policy Based Management of overlay Networks” Sep 2010
[12] J. Wong, R. Hunt, “Policy Based Network Management”, Department of Computer Science, University of Canterbury, NewZealand, February 2003
[13] J. Wong, R. Hunt, “Policy Based Network Management”, Department of Computer Science, University of Canterbury, NewZealand, February 2003. [14] K. S. Phanse, “Policy-Based Quality of Service Management in Wireless Ad Hoc Networks”, Virginia Polytechnic Institute and State University, October 2002.
[15] A. Munaretto, N. Agoulmine, M. Fonseca, “Policy-based Management of Ad Hoc Entreprise Networks”, 2001.
[16] D. Verma, “Policy-Based Networking: Architecture and Algorithms”, Chapter 3, published November 2000.
[17] S. L. Keoh, E. Lupu, and M. Sloman, “Peace: A policy-based establishment of ad-hoc communities,” in the Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), September 2004, pp. 386–395.
[18] R. Boutaba and I. Aib. Policy-based management: A historical perspective. ACM Journal of Network and Systems Management, 15(4):447–480, December 2007.
[19] S. Boros. Policy-based network management with snmp. In Proceedings of EUNICE, pages 13–15. University of Twente, Netherlands, September 2000.
[20] R. Chadha et al, “Policy Based Mobile Ad hoc Network Management” 5th IEEE Intl. Work. on Policies for Distributed Systems and Networks.
[21] M. Sloman, E. Lupu, “Policy Specification for Programmable Networks”, Proceedings of First International Working Conference on Active Networks (IWAN’99), Berlin, June 1999.