Network policy languages: a survey and a new approach
A survey of current network policy languages is presented. Next, a summary of the techniques for detecting policy conflicts is given. Finally, a new language, path-based policy language, which offers improvements to these is introduced. Previous network policy languages vary from the very specific,...
Gespeichert in:
Veröffentlicht in: | IEEE network 2001-01, Vol.15 (1), p.10-21 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 21 |
---|---|
container_issue | 1 |
container_start_page | 10 |
container_title | IEEE network |
container_volume | 15 |
creator | Stone, G.N. Lundy, B. Xie, G.G. |
description | A survey of current network policy languages is presented. Next, a summary of the techniques for detecting policy conflicts is given. Finally, a new language, path-based policy language, which offers improvements to these is introduced. Previous network policy languages vary from the very specific, using packet filters at the bit level, to the more abstract where concepts are represented, with implementation details left up to individual network devices. As background information a policy framework model and policy-based routing protocols are discussed. The PPL's path-based approach for representing network policies is advantageous in that quality of service and security policies can be associated with an explicit path through the network. This assignment of policies to network flows aids in new initiatives such as integrated services. The more stringent requirement of supporting path-based policies can easily be relaxed with the use of wild card characters to also support differentiated services and best-effort service, which is provided by the Internet today. |
doi_str_mv | 10.1109/65.898818 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_26892827</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>898818</ieee_id><sourcerecordid>914639918</sourcerecordid><originalsourceid>FETCH-LOGICAL-c402t-ac3e458a23ead3f776d56b22c36019e1120de48d50a0df8c5d7f5474934b3ca43</originalsourceid><addsrcrecordid>eNqF0TtPwzAQAGALgUQpDKxMEQOIIcXv2Gyo4iVVsIDEZrnOpaSkSbATqv57jFIxMMB0Ot2ne-gQOiZ4QgjWl1JMlFaKqB00IkKolAj5uotGWGmcKsz5PjoIYYkx4YLRERKP0K0b_560TVW6TVLZetHbBYSrxCah95-wSWydx6SGdWLb1jfWvR2ivcJWAY62cYxebm-ep_fp7OnuYXo9Sx3HtEutY8CFspSBzVmRZTIXck6pYxITDYRQnANXucAW54VyIs8KwTOuGZ8zZzkbo_Ohbxz70UPozKoMDqq4JTR9MJpwybQmKsqzPyVVihKc6f-hVJoqmkV4-gsum97X8VxDKROZ0JhGdDEg55sQPBSm9eXK-o0h2Hw_xEhhhodEezLYEgB-3Lb4BT_YgxA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>223575902</pqid></control><display><type>article</type><title>Network policy languages: a survey and a new approach</title><source>IEEE Electronic Library (IEL)</source><creator>Stone, G.N. ; Lundy, B. ; Xie, G.G.</creator><creatorcontrib>Stone, G.N. ; Lundy, B. ; Xie, G.G.</creatorcontrib><description>A survey of current network policy languages is presented. Next, a summary of the techniques for detecting policy conflicts is given. Finally, a new language, path-based policy language, which offers improvements to these is introduced. Previous network policy languages vary from the very specific, using packet filters at the bit level, to the more abstract where concepts are represented, with implementation details left up to individual network devices. As background information a policy framework model and policy-based routing protocols are discussed. The PPL's path-based approach for representing network policies is advantageous in that quality of service and security policies can be associated with an explicit path through the network. This assignment of policies to network flows aids in new initiatives such as integrated services. The more stringent requirement of supporting path-based policies can easily be relaxed with the use of wild card characters to also support differentiated services and best-effort service, which is provided by the Internet today.</description><identifier>ISSN: 0890-8044</identifier><identifier>EISSN: 1558-156X</identifier><identifier>DOI: 10.1109/65.898818</identifier><identifier>CODEN: IENEET</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Aids ; Business community ; Computer information security ; Computer networks ; Cryptography ; Devices ; Filters ; Information security ; Information technology ; Internet ; Intserv networks ; NASA ; Networks ; Policies ; Protocol (computers) ; Quality of service ; Routing (telecommunications) ; Routing protocols ; Telecommunication traffic ; Virtual private networks ; Web and internet services</subject><ispartof>IEEE network, 2001-01, Vol.15 (1), p.10-21</ispartof><rights>Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan/Feb 2001</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c402t-ac3e458a23ead3f776d56b22c36019e1120de48d50a0df8c5d7f5474934b3ca43</citedby><cites>FETCH-LOGICAL-c402t-ac3e458a23ead3f776d56b22c36019e1120de48d50a0df8c5d7f5474934b3ca43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/898818$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/898818$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Stone, G.N.</creatorcontrib><creatorcontrib>Lundy, B.</creatorcontrib><creatorcontrib>Xie, G.G.</creatorcontrib><title>Network policy languages: a survey and a new approach</title><title>IEEE network</title><addtitle>NET-M</addtitle><description>A survey of current network policy languages is presented. Next, a summary of the techniques for detecting policy conflicts is given. Finally, a new language, path-based policy language, which offers improvements to these is introduced. Previous network policy languages vary from the very specific, using packet filters at the bit level, to the more abstract where concepts are represented, with implementation details left up to individual network devices. As background information a policy framework model and policy-based routing protocols are discussed. The PPL's path-based approach for representing network policies is advantageous in that quality of service and security policies can be associated with an explicit path through the network. This assignment of policies to network flows aids in new initiatives such as integrated services. The more stringent requirement of supporting path-based policies can easily be relaxed with the use of wild card characters to also support differentiated services and best-effort service, which is provided by the Internet today.</description><subject>Aids</subject><subject>Business community</subject><subject>Computer information security</subject><subject>Computer networks</subject><subject>Cryptography</subject><subject>Devices</subject><subject>Filters</subject><subject>Information security</subject><subject>Information technology</subject><subject>Internet</subject><subject>Intserv networks</subject><subject>NASA</subject><subject>Networks</subject><subject>Policies</subject><subject>Protocol (computers)</subject><subject>Quality of service</subject><subject>Routing (telecommunications)</subject><subject>Routing protocols</subject><subject>Telecommunication traffic</subject><subject>Virtual private networks</subject><subject>Web and internet services</subject><issn>0890-8044</issn><issn>1558-156X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2001</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNqF0TtPwzAQAGALgUQpDKxMEQOIIcXv2Gyo4iVVsIDEZrnOpaSkSbATqv57jFIxMMB0Ot2ne-gQOiZ4QgjWl1JMlFaKqB00IkKolAj5uotGWGmcKsz5PjoIYYkx4YLRERKP0K0b_560TVW6TVLZetHbBYSrxCah95-wSWydx6SGdWLb1jfWvR2ivcJWAY62cYxebm-ep_fp7OnuYXo9Sx3HtEutY8CFspSBzVmRZTIXck6pYxITDYRQnANXucAW54VyIs8KwTOuGZ8zZzkbo_Ohbxz70UPozKoMDqq4JTR9MJpwybQmKsqzPyVVihKc6f-hVJoqmkV4-gsum97X8VxDKROZ0JhGdDEg55sQPBSm9eXK-o0h2Hw_xEhhhodEezLYEgB-3Lb4BT_YgxA</recordid><startdate>200101</startdate><enddate>200101</enddate><creator>Stone, G.N.</creator><creator>Lundy, B.</creator><creator>Xie, G.G.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>200101</creationdate><title>Network policy languages: a survey and a new approach</title><author>Stone, G.N. ; Lundy, B. ; Xie, G.G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c402t-ac3e458a23ead3f776d56b22c36019e1120de48d50a0df8c5d7f5474934b3ca43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Aids</topic><topic>Business community</topic><topic>Computer information security</topic><topic>Computer networks</topic><topic>Cryptography</topic><topic>Devices</topic><topic>Filters</topic><topic>Information security</topic><topic>Information technology</topic><topic>Internet</topic><topic>Intserv networks</topic><topic>NASA</topic><topic>Networks</topic><topic>Policies</topic><topic>Protocol (computers)</topic><topic>Quality of service</topic><topic>Routing (telecommunications)</topic><topic>Routing protocols</topic><topic>Telecommunication traffic</topic><topic>Virtual private networks</topic><topic>Web and internet services</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Stone, G.N.</creatorcontrib><creatorcontrib>Lundy, B.</creatorcontrib><creatorcontrib>Xie, G.G.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE network</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Stone, G.N.</au><au>Lundy, B.</au><au>Xie, G.G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Network policy languages: a survey and a new approach</atitle><jtitle>IEEE network</jtitle><stitle>NET-M</stitle><date>2001-01</date><risdate>2001</risdate><volume>15</volume><issue>1</issue><spage>10</spage><epage>21</epage><pages>10-21</pages><issn>0890-8044</issn><eissn>1558-156X</eissn><coden>IENEET</coden><abstract>A survey of current network policy languages is presented. Next, a summary of the techniques for detecting policy conflicts is given. Finally, a new language, path-based policy language, which offers improvements to these is introduced. Previous network policy languages vary from the very specific, using packet filters at the bit level, to the more abstract where concepts are represented, with implementation details left up to individual network devices. As background information a policy framework model and policy-based routing protocols are discussed. The PPL's path-based approach for representing network policies is advantageous in that quality of service and security policies can be associated with an explicit path through the network. This assignment of policies to network flows aids in new initiatives such as integrated services. The more stringent requirement of supporting path-based policies can easily be relaxed with the use of wild card characters to also support differentiated services and best-effort service, which is provided by the Internet today.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/65.898818</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0890-8044 |
ispartof | IEEE network, 2001-01, Vol.15 (1), p.10-21 |
issn | 0890-8044 1558-156X |
language | eng |
recordid | cdi_proquest_miscellaneous_26892827 |
source | IEEE Electronic Library (IEL) |
subjects | Aids Business community Computer information security Computer networks Cryptography Devices Filters Information security Information technology Internet Intserv networks NASA Networks Policies Protocol (computers) Quality of service Routing (telecommunications) Routing protocols Telecommunication traffic Virtual private networks Web and internet services |
title | Network policy languages: a survey and a new approach |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T11%3A53%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Network%20policy%20languages:%20a%20survey%20and%20a%20new%20approach&rft.jtitle=IEEE%20network&rft.au=Stone,%20G.N.&rft.date=2001-01&rft.volume=15&rft.issue=1&rft.spage=10&rft.epage=21&rft.pages=10-21&rft.issn=0890-8044&rft.eissn=1558-156X&rft.coden=IENEET&rft_id=info:doi/10.1109/65.898818&rft_dat=%3Cproquest_RIE%3E914639918%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=223575902&rft_id=info:pmid/&rft_ieee_id=898818&rfr_iscdi=true |