Network policy languages: a survey and a new approach

A survey of current network policy languages is presented. Next, a summary of the techniques for detecting policy conflicts is given. Finally, a new language, path-based policy language, which offers improvements to these is introduced. Previous network policy languages vary from the very specific,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE network 2001-01, Vol.15 (1), p.10-21
Hauptverfasser: Stone, G.N., Lundy, B., Xie, G.G.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 21
container_issue 1
container_start_page 10
container_title IEEE network
container_volume 15
creator Stone, G.N.
Lundy, B.
Xie, G.G.
description A survey of current network policy languages is presented. Next, a summary of the techniques for detecting policy conflicts is given. Finally, a new language, path-based policy language, which offers improvements to these is introduced. Previous network policy languages vary from the very specific, using packet filters at the bit level, to the more abstract where concepts are represented, with implementation details left up to individual network devices. As background information a policy framework model and policy-based routing protocols are discussed. The PPL's path-based approach for representing network policies is advantageous in that quality of service and security policies can be associated with an explicit path through the network. This assignment of policies to network flows aids in new initiatives such as integrated services. The more stringent requirement of supporting path-based policies can easily be relaxed with the use of wild card characters to also support differentiated services and best-effort service, which is provided by the Internet today.
doi_str_mv 10.1109/65.898818
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_26892827</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>898818</ieee_id><sourcerecordid>914639918</sourcerecordid><originalsourceid>FETCH-LOGICAL-c402t-ac3e458a23ead3f776d56b22c36019e1120de48d50a0df8c5d7f5474934b3ca43</originalsourceid><addsrcrecordid>eNqF0TtPwzAQAGALgUQpDKxMEQOIIcXv2Gyo4iVVsIDEZrnOpaSkSbATqv57jFIxMMB0Ot2ne-gQOiZ4QgjWl1JMlFaKqB00IkKolAj5uotGWGmcKsz5PjoIYYkx4YLRERKP0K0b_560TVW6TVLZetHbBYSrxCah95-wSWydx6SGdWLb1jfWvR2ivcJWAY62cYxebm-ep_fp7OnuYXo9Sx3HtEutY8CFspSBzVmRZTIXck6pYxITDYRQnANXucAW54VyIs8KwTOuGZ8zZzkbo_Ohbxz70UPozKoMDqq4JTR9MJpwybQmKsqzPyVVihKc6f-hVJoqmkV4-gsum97X8VxDKROZ0JhGdDEg55sQPBSm9eXK-o0h2Hw_xEhhhodEezLYEgB-3Lb4BT_YgxA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>223575902</pqid></control><display><type>article</type><title>Network policy languages: a survey and a new approach</title><source>IEEE Electronic Library (IEL)</source><creator>Stone, G.N. ; Lundy, B. ; Xie, G.G.</creator><creatorcontrib>Stone, G.N. ; Lundy, B. ; Xie, G.G.</creatorcontrib><description>A survey of current network policy languages is presented. Next, a summary of the techniques for detecting policy conflicts is given. Finally, a new language, path-based policy language, which offers improvements to these is introduced. Previous network policy languages vary from the very specific, using packet filters at the bit level, to the more abstract where concepts are represented, with implementation details left up to individual network devices. As background information a policy framework model and policy-based routing protocols are discussed. The PPL's path-based approach for representing network policies is advantageous in that quality of service and security policies can be associated with an explicit path through the network. This assignment of policies to network flows aids in new initiatives such as integrated services. The more stringent requirement of supporting path-based policies can easily be relaxed with the use of wild card characters to also support differentiated services and best-effort service, which is provided by the Internet today.</description><identifier>ISSN: 0890-8044</identifier><identifier>EISSN: 1558-156X</identifier><identifier>DOI: 10.1109/65.898818</identifier><identifier>CODEN: IENEET</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Aids ; Business community ; Computer information security ; Computer networks ; Cryptography ; Devices ; Filters ; Information security ; Information technology ; Internet ; Intserv networks ; NASA ; Networks ; Policies ; Protocol (computers) ; Quality of service ; Routing (telecommunications) ; Routing protocols ; Telecommunication traffic ; Virtual private networks ; Web and internet services</subject><ispartof>IEEE network, 2001-01, Vol.15 (1), p.10-21</ispartof><rights>Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan/Feb 2001</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c402t-ac3e458a23ead3f776d56b22c36019e1120de48d50a0df8c5d7f5474934b3ca43</citedby><cites>FETCH-LOGICAL-c402t-ac3e458a23ead3f776d56b22c36019e1120de48d50a0df8c5d7f5474934b3ca43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/898818$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/898818$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Stone, G.N.</creatorcontrib><creatorcontrib>Lundy, B.</creatorcontrib><creatorcontrib>Xie, G.G.</creatorcontrib><title>Network policy languages: a survey and a new approach</title><title>IEEE network</title><addtitle>NET-M</addtitle><description>A survey of current network policy languages is presented. Next, a summary of the techniques for detecting policy conflicts is given. Finally, a new language, path-based policy language, which offers improvements to these is introduced. Previous network policy languages vary from the very specific, using packet filters at the bit level, to the more abstract where concepts are represented, with implementation details left up to individual network devices. As background information a policy framework model and policy-based routing protocols are discussed. The PPL's path-based approach for representing network policies is advantageous in that quality of service and security policies can be associated with an explicit path through the network. This assignment of policies to network flows aids in new initiatives such as integrated services. The more stringent requirement of supporting path-based policies can easily be relaxed with the use of wild card characters to also support differentiated services and best-effort service, which is provided by the Internet today.</description><subject>Aids</subject><subject>Business community</subject><subject>Computer information security</subject><subject>Computer networks</subject><subject>Cryptography</subject><subject>Devices</subject><subject>Filters</subject><subject>Information security</subject><subject>Information technology</subject><subject>Internet</subject><subject>Intserv networks</subject><subject>NASA</subject><subject>Networks</subject><subject>Policies</subject><subject>Protocol (computers)</subject><subject>Quality of service</subject><subject>Routing (telecommunications)</subject><subject>Routing protocols</subject><subject>Telecommunication traffic</subject><subject>Virtual private networks</subject><subject>Web and internet services</subject><issn>0890-8044</issn><issn>1558-156X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2001</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNqF0TtPwzAQAGALgUQpDKxMEQOIIcXv2Gyo4iVVsIDEZrnOpaSkSbATqv57jFIxMMB0Ot2ne-gQOiZ4QgjWl1JMlFaKqB00IkKolAj5uotGWGmcKsz5PjoIYYkx4YLRERKP0K0b_560TVW6TVLZetHbBYSrxCah95-wSWydx6SGdWLb1jfWvR2ivcJWAY62cYxebm-ep_fp7OnuYXo9Sx3HtEutY8CFspSBzVmRZTIXck6pYxITDYRQnANXucAW54VyIs8KwTOuGZ8zZzkbo_Ohbxz70UPozKoMDqq4JTR9MJpwybQmKsqzPyVVihKc6f-hVJoqmkV4-gsum97X8VxDKROZ0JhGdDEg55sQPBSm9eXK-o0h2Hw_xEhhhodEezLYEgB-3Lb4BT_YgxA</recordid><startdate>200101</startdate><enddate>200101</enddate><creator>Stone, G.N.</creator><creator>Lundy, B.</creator><creator>Xie, G.G.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>200101</creationdate><title>Network policy languages: a survey and a new approach</title><author>Stone, G.N. ; Lundy, B. ; Xie, G.G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c402t-ac3e458a23ead3f776d56b22c36019e1120de48d50a0df8c5d7f5474934b3ca43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Aids</topic><topic>Business community</topic><topic>Computer information security</topic><topic>Computer networks</topic><topic>Cryptography</topic><topic>Devices</topic><topic>Filters</topic><topic>Information security</topic><topic>Information technology</topic><topic>Internet</topic><topic>Intserv networks</topic><topic>NASA</topic><topic>Networks</topic><topic>Policies</topic><topic>Protocol (computers)</topic><topic>Quality of service</topic><topic>Routing (telecommunications)</topic><topic>Routing protocols</topic><topic>Telecommunication traffic</topic><topic>Virtual private networks</topic><topic>Web and internet services</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Stone, G.N.</creatorcontrib><creatorcontrib>Lundy, B.</creatorcontrib><creatorcontrib>Xie, G.G.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE network</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Stone, G.N.</au><au>Lundy, B.</au><au>Xie, G.G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Network policy languages: a survey and a new approach</atitle><jtitle>IEEE network</jtitle><stitle>NET-M</stitle><date>2001-01</date><risdate>2001</risdate><volume>15</volume><issue>1</issue><spage>10</spage><epage>21</epage><pages>10-21</pages><issn>0890-8044</issn><eissn>1558-156X</eissn><coden>IENEET</coden><abstract>A survey of current network policy languages is presented. Next, a summary of the techniques for detecting policy conflicts is given. Finally, a new language, path-based policy language, which offers improvements to these is introduced. Previous network policy languages vary from the very specific, using packet filters at the bit level, to the more abstract where concepts are represented, with implementation details left up to individual network devices. As background information a policy framework model and policy-based routing protocols are discussed. The PPL's path-based approach for representing network policies is advantageous in that quality of service and security policies can be associated with an explicit path through the network. This assignment of policies to network flows aids in new initiatives such as integrated services. The more stringent requirement of supporting path-based policies can easily be relaxed with the use of wild card characters to also support differentiated services and best-effort service, which is provided by the Internet today.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/65.898818</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0890-8044
ispartof IEEE network, 2001-01, Vol.15 (1), p.10-21
issn 0890-8044
1558-156X
language eng
recordid cdi_proquest_miscellaneous_26892827
source IEEE Electronic Library (IEL)
subjects Aids
Business community
Computer information security
Computer networks
Cryptography
Devices
Filters
Information security
Information technology
Internet
Intserv networks
NASA
Networks
Policies
Protocol (computers)
Quality of service
Routing (telecommunications)
Routing protocols
Telecommunication traffic
Virtual private networks
Web and internet services
title Network policy languages: a survey and a new approach
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T11%3A53%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Network%20policy%20languages:%20a%20survey%20and%20a%20new%20approach&rft.jtitle=IEEE%20network&rft.au=Stone,%20G.N.&rft.date=2001-01&rft.volume=15&rft.issue=1&rft.spage=10&rft.epage=21&rft.pages=10-21&rft.issn=0890-8044&rft.eissn=1558-156X&rft.coden=IENEET&rft_id=info:doi/10.1109/65.898818&rft_dat=%3Cproquest_RIE%3E914639918%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=223575902&rft_id=info:pmid/&rft_ieee_id=898818&rfr_iscdi=true