Conflict prevention via model-driven policy refinement

Steven Davy, Brendan Jennings, John Strassner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Citations (Scopus)


This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algorithm for the retrieval of application-specific data from an information model relating to the subject and targets of a given policy. This algorithm facilitates the linkage of policies loosely defined at a high level of abstraction to detailed behavioural constraints specified in the information model. Based on these constraints policies are then modified so that conflicts with other deployed policies can be readily identified using standard policy conflict detection techniques. This approach enables policy enforcement to be cognisant of application specific constraints, thereby resulting in a more trustworthy and dependable policy based management system.

Original languageEnglish
Title of host publicationLarge Scale Management of Distributed Systems - 17th IFIP/IEEE International Workshop on Distributed Systems
Subtitle of host publicationOperations and Management, DSOM 2006, Proceedings
EditorsRadu State, Sven van der Meer, Tom Pfeifer, Declan O’Sullivan
Number of pages12
ISBN (Print)3540476598, 9783540476597
Publication statusPublished - 2006
Event17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006 - Dublin, Ireland
Duration: 23 Oct 200625 Oct 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4269 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006


Dive into the research topics of 'Conflict prevention via model-driven policy refinement'. Together they form a unique fingerprint.

Cite this