|Appears in Collections:||Computing Science and Mathematics Conference Papers and Proceedings|
|Peer Review Status:||Refereed|
Turner, Kenneth J
|Title:||Handling Policy Conflicts in Call Control|
Ryan, Mark D
|Citation:||Blair L & Turner KJ (2005) Handling Policy Conflicts in Call Control, Reiff-Marganiec Stephan, Ryan Mark D (ed.) Feature Interactions in Telecommunications and Software Systems VIII, ICFI'05: 8th International Conference on Feature Interactions in Telecommunications and Software Systems, University of Leicester, Amsterdam: IOS Press, pp. 39-57.|
|Conference Name:||ICFI'05: 8th International Conference on Feature Interactions in Telecommunications and Software Systems|
|Conference Location:||University of Leicester|
|Abstract:||Policies are becoming increasingly important in modern computer systems as a mechanism for end users and organisations to exhibit a level of control over software. Policies have long been established as an effective mechanism for enabling appropriate access control over resources, and for enforcing security considerations. However they are now becoming valued as a more general management mechanism for large-scale heterogeneous systems, including those exhibiting adaptive or autonomic behaviour. In the telecommunications domain, features have been widely used to provide users with (limited) control over calls. However, features have the disadvantage that they are low-level and implementation-oriented in nature. Furthermore, apart from limited parameterisation of some features, they tend to be very inflexible. Policies, in contrast, have the potential to be much higher-level, goaloriented, and very flexible. This paper presents an architecture and its realisation for distributed and hierarchical policies within the telecommunications domain. The work deals with the important issue of policy conflict – the analogy of feature interaction.|
|Status:||Post-print (author final draft post-refereeing)|
|Rights:||Published in Feature Interactions in Telecommunications and Software Systems VIII. Copyright: IOS Press|
Computing Science - CSM Dept
This item is protected by original copyright
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
If you believe that any material held in STORRE infringes copyright, please contact firstname.lastname@example.org providing details and we will remove the Work from public display in STORRE and investigate your claim.