Next:
List of Figures
Up:
main
Previous:
main
Contents
Contents
List of Figures
List of Tables
1. Introduction
1.1 Motivation
1.2 Objective and Contribution
1.3 Approach
1.4 Outline
2. Survey of Management Policy Approaches
2.1 Management Policies
2.2 Policy Work at the Imperial College
2.2.1 Initial Research Interest on Policies
2.2.2 Authorisation and Obligation Policies
2.2.3 Current Research Activities
2.2.4 Discussion
2.3 Policy Work by Koch
2.4 Constraint-based Policies by Goh
2.4.1 Refinement
2.4.2 Passive Policies
2.4.3 Active Policies
2.4.4 Discussion
2.5 Summary and Terminology
3. Previous Work on Metapolicies
3.1 Metapolicies by Hosmer
3.1.1 Explicit Information
3.1.2 Coordination of Policies
3.1.3 Properties of Metapolicies
3.2 Metapolicies by Kühnhauser
3.3 Metapolicies at the Imperial College
3.4 Summary and Discussion
4. Policy Life Cycle
4.1 Previous Work
4.2 Policy Supporting Processes
4.2.1 Supporting Processes and Active Policies
4.2.2 Functional Model
4.2.3 Delegation Process
4.2.4 Refinement Process
4.2.5 Distribution Process
4.2.6 Test Process
4.2.7 Enforcement Process
4.3 Enhanced Policy Life Cycle
4.4 Summary and Conclusion
5. Policy Management with Metapolicies
5.1 Requirements for Metapolicies
5.2 Definition of Metapolicies
5.3 Active and Passive Metapolicies
5.4 Classification of Metapolicies
5.4.1 Refinement
5.4.2 Delegation
5.4.3 Integration
5.4.4 Conflict
5.4.5 Exception
5.4.6 Enforcement
5.5 Metapolicy Examples
5.5.1 Refinement
5.5.2 Delegation
5.5.3 Integration
5.5.4 Conflict
5.5.5 Exception
5.5.6 Enforcement
5.6 Properties of Metapolicies
5.7 Benefits of Metapolicies
5.8 Summary
6. Policy-based Management System
6.1 An Example of a Management System
6.1.1 Purpose
6.1.2 Policy-based Approach
6.1.3 Architecture of the Management System
6.2 Metapolicies and the Management System
6.2.1 Restrictions on Metapolicies in a Management System
6.2.2 Requirements for Using Metapolicies
6.2.3 Realisation of Metapolicy Support
6.3 Implementing Metapolicies in NoCScontrol
6.3.1 Supporting Processes
6.3.2 Architectural Changes
6.3.3 Metapolicy Examples
6.3.4 Policy and Metapolicy Enforcement
6.3.5 Implementation Details
6.3.6 Scalability and Possible Enhancements of the Implementation
6.4 Summary and Conclusion
7. Summary and Outlook
Bibliography
Copyright Munich Network Management Team