1999
DOI: 10.1007/3-540-48443-4_6
|View full text |Cite
|
Sign up to set email alerts
|

Non-Functional Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0
2

Year Published

2000
2000
2006
2006

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 5 publications
0
13
0
2
Order By: Relevance
“…Consequently, there are interesting questions about how to design a suitably powerful yet usable policy specification language for such a system. For example, various meta-level architectures like Aspect Oriented Programming [Kiczales et al 1997] have been suggested as general frameworks for enforcing a variety of security policies [Bert Robben and Verbaeten 1999], but it is not clear what class of security policies they can enforce.…”
Section: Related and Future Workmentioning
confidence: 99%
“…Consequently, there are interesting questions about how to design a suitably powerful yet usable policy specification language for such a system. For example, various meta-level architectures like Aspect Oriented Programming [Kiczales et al 1997] have been suggested as general frameworks for enforcing a variety of security policies [Bert Robben and Verbaeten 1999], but it is not clear what class of security policies they can enforce.…”
Section: Related and Future Workmentioning
confidence: 99%
“…Presented by the DistriNet research group in Katholieke Universiteit Leuven, Correlate [16,33,34,40], is a concurrent object-oriented language based on C++ (and later Java) to support mobile agents. It has a flexible runtime engine to support migration and location independent inter-object communication.…”
Section: Correlatementioning
confidence: 99%
“…Many policies will also contain some restrictions or guards confining the rule action to appropriate occasions. This event-conditionaction (ECA) format is standard for rule-based adaptation systems [4,5,6,8,9,16,19,33,34,35,36,40], where an adaptation management system is responsible for monitoring these events, evaluating the conditions and initiating the management action on the targeted managed object. In a policy-based dynamic adaptation system it should be possible to edit the rule set and have them re-interpreted to support the dynamic addition of new rules or changes in policy.…”
Section: Principals and Key Ideasmentioning
confidence: 99%
“…Run-time reflection is a powerful technique that is successfully used to implement non-functional requirements such as load balancing, fault tolerance and security [2], [9], [10], [11]. The code that realizes the non-functional requirements is expressed as meta-programs using a metaobject protocol to reflect the base-level behavior.…”
Section: Introductionmentioning
confidence: 99%