Policy Workshop 2001
29-31 January 2001
HP Laboratories, Bristol, UK

Conference Proceedings

Policies for Distributed Systems and Networks

Sloman, M., Imperial College, London, UK
Lobo, J., Bell Labs, Murray Hill, NJ, USA
Lupu, E.C., Imperial College, London, UK
(Eds.)

Springer Verlag Lecture Notes in Computer Science. VOL. 1995
ISBN 3-540-41610-2
Price DM 78,   See 
http://link.springer.de/link/service/series/0558/tocs/t1995.htm  
for details

Position Papers   pdf 1Mbyte file

Invited Talks  pdf 1Mbyte file

Additional Invited Talks (not in the above file)

    Joe Pato's Slides  pdf 2.5Mbyte file
    Matt Blaze's Slides

Programme  Overview

Monday 29

Tuesday 30

Wednesday 31

9:00-10:30 Registration and Coffee

Invited Talks: 

  • Policy and the IETF - Theory and Practice
    John Strassner 
    Past Chairman IETF Policy Working Group, Cisco, USA
    Abstract
  • Provisioning Your Future through Policy-based Management
    Rick Roeling

    OpenView PolicyXpert Architect, Hewlett-Packard , USA
    Abstract

Invited Talks: 

  • Trust Management and Security Policy
    Matt Blaze, 
    AT&T Research Laboratories, USA
    Abstract Slides
  • On the Negotiation of Access Control Policies
    Virgil Gligor
    Himanshu Khurana, University of Maryland at College Park, USA
    Abstract

 

Welcome Address
Keynote:
  • Mechanized Policy, Fact or Fancy?
    Joe Pato, Principal Scientist, Trusted E-Services Lab - HP Labs, Cambridge MA USA.
    Abstract 
Coffee
11:00-13:00  Policy Specification and Analysis
Network Policy Realization Panel: Future Directions for Policy Research
Chair: Morris Sloman
Lunch
14:00-16:00  RBAC and Security Policy  Perspectives on Policy Architectures
Tea
16:30-18:00 Formal and Natural Language for Policy 
 Policy Applications
18:00 Reception at HP Laboratories Conference Dinner
Roman Baths Pump Room, Bath
 

                      

Full Paper Session: 4x25 min + 20 min discussion

                      

Position Paper Session: 4x 15 min + 30 min discussion

                      

Invited speakers 30 min, Keynote 45 min

 


Policy Workshop 2001
29-31 January 2001
HP Laboratories, Bristol, UK

Program

 

Monday 29 January 2001 

8.45 - 9.30:  Registration and Coffee

9.30:   Welcome

9.40 - 10.30 Keynote

Chair: Cheh Goh, HP Labs, Bristol

10.30 - 11.00 Coffee 

11.00 - 13.00 Session 1 Policy Specification and Analysis

Chair: Peter Linington, University of Kent, UK

13.00-14.00 Lunch

14:00 - 16.00 Session 2 RBAC and Security Policy

Chair: Ravi Sandhu, George Mason University, USA

16.00 - 16.30 Tea

16.30 - 18.00 Session 3  Formal and Natural Language for Policy 

Chair: Edgar Sibley, George Mason University, USA

18.00 - 19.30  Reception at HP Laboratories


Tuesday 30 January 2001 

9.00 - 10.30 Invited Talks

Chair: Francisco Garcia, Agilent Technologies, UK

10.30 - 11.00 Coffee

11.00 - 13.00 Session 4 Network Policy Realization

Chair:  Ed Elleson, LongBoard, USA

13.00-14.00 Lunch

14.00 - 16.00 Session 5 Perspectives on Policy Architectures

Chair:  John Vicente, Intel, USA

16.00-16.30 Tea

16.30 - 18.00 Session 6 Policy Applications

Chair: Ian Marshall, BTexaCT, UK

19.30 Conference Dinner at the Roman Bath Pump Rooms, Bath
           
Buses leave HP at 18.30

 


Wednesday 31 January 2001

9.00 - 10.30 Invited Talks

Chair:  Jonathan Moffett, University of York, USA

10.30 - 11.00 Coffee

11.00 - 13.00 Panel: Future Directions for Policy Research

Chair:  Morris Sloman, Imperial College, UK

Panelists:  

Ravi Sandhu, George Mason University, USA
to focus on RBAC and security issues.

John Strassner, Cisco, USA
to focus on information modelling.

Ed Elleson, LongBoard, USA 
to focus on what is required for network management.

Bret Michel, Naval Postgraduate School, USA
 to focus on enterprise policy and  trust.

Marek Sergot, Imperial College, UK
to focus on prospects of developing  (appropriate) formal-logical languages and tools.

Policy based frameworks are comparatively new, mostly with vendor-specific tools to support policy specification. There is not much commonality in the approaches being followed in policy-based network management, role-based access control, security policies for operating systems, databases or firewalls. This panel will address some of issues we should be focusing on for future research.

13.00 Close of Conference