Leicester Research Archive

Leicester Research Archive >
College of Science and Engineering >
Computer Science, Department of >
Theses, Dept. of Computer Science >

Please use this identifier to cite or link to this item: http://hdl.handle.net/2381/10994

Title: Structural Domain Modelling for Policy Language Specialization with Conflict Analysis
Authors: Khowaja, Zohra Ahsan
Supervisors: Reiff-Marganiec, Stephan
Boronat, Artur
Award date: 22-Jun-2012
Presented at: University of Leicester
Abstract: Policies are descriptive and provide information which can be used to modify the behaviour of a system without the need of recompilation and redeployment. They are usually written in a policy definition language which allows end users to specify their requirements, preferences and constraints. Policies are used in many software application areas: network management, telecommunications, security, and access control are some typical examples. Ponder, KAoS, Rein, XACML, and WSPL are examples of policy definition languages. These languages are usually targeted at a specific domain, hence there is a plethora of languages. APPEL (the Adaptable Programmable Policy Environment Language) [69] has followed a different approach: It is a generic policy description language conceived with a clear separation between core language and its specialization for concrete domains. So far, there has not been any formal method for the extension and domain specialization of the APPEL policy language. Policy conflict can occur when a new or a modified policy is deployed in a policy server, which leads to unspecified behaviour. To make policy based systems conflict free it is necessary to detect and resolve conflicts before they occur, otherwise the intended behaviour of a policy cannot be guaranteed. We introduce a structural modelling approach to specialize the policy language for different domains, implemented in the VIATRA2 graph transformation tool. This approach is applied to APPEL. Our method for conflict analysis is based on the modelling methodology. As conflicts depend on domain knowledge, it is sensible to use this knowledge for conflict analysis. The identified conflicting actions are then encoded in the ALLOY model checker that confirm the existence of actual and potential conflicts.
Links: http://hdl.handle.net/2381/10994
Embargo on file until: 22-Jun-2015
Type: Thesis
Level: Doctoral
Qualification: PhD
Rights: Copyright © the author, 2012
Appears in Collections:Leicester Theses
Theses, Dept. of Computer Science

Files in This Item:

File Description SizeFormat
2012KhowajaZAphD.pdf1.57 MBAdobe PDFView/Open
View Statistics

Items in LRA are protected by copyright, with all rights reserved, unless otherwise indicated.

 

MAINTAINER