Research Article | Open Access | Download PDF
Volume 3 | Issue 2 | Year 2013 | Article Id. IJPTT-V3I3P401 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I3P401Policy Management in Adhoc Networks
GantiNagaSatish, Prof. P. Suresh Varma
Citation :
GantiNagaSatish, Prof. P. Suresh Varma, "Policy Management in Adhoc Networks," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 2, pp. 27-32, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I3P401
Abstract
Policy-based management is based on defining a set of global rules, according to which a network or distributed system must operate. In the last few years, policy-based management has begun to emerge as the dominant paradigm for developing network and systems management functions, primarily, since it can reduce complexity in management applications. Although attempts are underway to standardize policy-based management, significant research challenges remain. The paper outlines the research agenda and application of policy management to security management.
Keywords
Policy Decision Point, Policy Enforcement Point, Policy Repository
References
[1] Mouna Ayari, Farouk Kamoun, Davor Males “Towards a
Policy-Based
Management for Ad Hoc Networks”
[2] Farooq Anjum and Petros Mouchtaris “Security For Wireless Ad
Hoc Networks”
[3] Annie Ibrahim Rana Micheal O Foghlu Policy-based Traffic
Management in Home Area Network –An Elementary Testbed
Model
[4] M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized Trust
Management,” Proceedings of the 17th IEEE Symposium on
Security and Privacy, IEEE Computer Society, New York, 1996, pp.
164–173.
[5] M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, “The
KeyNote Trust-Management System Version 2,” IETF RFC 2704,
September 1999.
[6] A. D. Keromytis, S. Ioannidis, M. Greenwald, and J. Smith,
“The STRONGMAN Architecture,”DISCEX 20003, Washington,
DC, April 2003.
[7] T. Markham and C. Payne, “Security at the Network Edge: A
Distributed Firewall Architecture,”DISCEX 20001, California, June
2001.
[8] A.Lindfors, “Policy Based Management in Ad-hoc
Networks”http://www.tml.hut.fi/Opinnot/Tik110.551/2000/papers/p
olicy_management/internetworking.html
[9] J.Moffet,M.Sloman, “ Policy Hierarchies for distributed
Systems Management” IEEE December 1993
[10] M.Solman, “ Policy Driven Management for Distributed
Systems” Journal of Network and Systems Manegement, DEC1994
[11] Jorge Pena Cotarelo “Policy Based Management of overlay
Networks” Sep 2010
[12] J. Wong, R. Hunt, “Policy Based Network Management”,
Department of Computer Science, University of Canterbury,
NewZealand, February 2003
[13] J. Wong, R. Hunt, “Policy Based Network Management”,
Department of Computer Science, University of Canterbury,
NewZealand, February 2003.
[14] K. S. Phanse, “Policy-Based Quality of Service Management in
Wireless Ad Hoc Networks”, Virginia Polytechnic Institute and
State University, October 2002.
[15] A. Munaretto, N. Agoulmine, M. Fonseca, “Policy-based
Management of Ad Hoc Entreprise Networks”, 2001.
[16] D. Verma, “Policy-Based Networking: Architecture and
Algorithms”, Chapter 3, published November 2000.
[17] S. L. Keoh, E. Lupu, and M. Sloman, “Peace: A policy-based
establishment of ad-hoc communities,” in the Proceedings of the
20th Annual Computer Security Applications Conference
(ACSAC), September 2004, pp. 386–395.
[18] R. Boutaba and I. Aib. Policy-based management: A historical
perspective. ACM Journal of Network and Systems Management,
15(4):447–480, December 2007.
[19] S. Boros. Policy-based network management with snmp. In
Proceedings of EUNICE, pages 13–15. University of Twente,
Netherlands, September 2000.
[20] R. Chadha et al, “Policy Based Mobile Ad hoc Network
Management” 5th IEEE Intl. Work. on Policies for Distributed
Systems and Networks.
[21] M. Sloman, E. Lupu, “Policy Specification for Programmable
Networks”, Proceedings of First International Working Conference
on Active Networks (IWAN’99), Berlin, June 1999.