The management of distributed and embedded service systems is a complex task as the services are exposed to changing environments which have to be reflected by the services' configurations. These configurations are commonly based on abstract management policies. Embedded devices usually lack the resources to perform the necessary computations to derive an actual configuration from an abstract policy. Thus we developed a two phase management approach that splits up the management process into a design-time and a runtime task. At design-time a model of the managed system is created. This model is augmented by high-level, environmentaware management policies that are automatically refined to low-level service configurations using graph-transformation techniques. This phase is based on the concepts of model-based management and on parts of the Generalized Role Based Access Control model to handle the modeling of the environmentaware policies. The runtime phase covers the enforcement of the environment-aware management policies by a set of management services responsible for the setting of suitable service configurations.
Service-orientation supports the construction of flexible and comprehensive industrial applications. The growing scale and complexity of the applications, however, demand for enhanced self-management functions providing efficient self-adaptation and repair mechanisms. We propose the approach of policy-controlled self-management which has been developed and successfully tested in the context of Web Service based control applications. We use hierarchically structured management policies where high-level policies serve as abstract definitions of management objectives and low-level policies represent concrete rules for resource monitoring und correcting interventions. The definition, analysis, refinement and deployment of the policies are supported by an interactive graphical modeling tool.
Index Terms-model-based management, fault tolerant systems, web services
Abstract-The paradigm of Service Oriented Architectures spreads throughout the domain of business software and enterprise networks. With the proposal of the Device Profile for Web-Services also small, less powerful embedded devices should be able to interact with services of the network infrastructure they are connected to. New challenges arise when it comes to the adaptive management of these devices. The available computing power is often too low to allow extensive runtime evaluations for automatic adaptation to new situations. Moreover when thinking of large scaled device networks the creation and management of security policies may become a complex task. In this paper we address the latter by splitting the security management task into a design-time and run-time task. At design-time the considered access control policy is graphically modeled applying the concepts of Role Based Access Control and the definition is aided by a modeling tool. At run-time the configurations created by this tool are the basis for the access control computations of a security service infrastructure.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.