Abstract
This paper summarizes the research work that has been conducted in the context of the RTIPA project on policy-based QoS (Quality of Service) and security management for distributed multimedia services. It presents an architecture allowing the derivation of policies from the service level down to the network level. It is a step towards an end-to-end QoS and security management for distributed multimedia services running on the new generation of IP networks.
RTIPA: Real-Time Internet Platform Architectures, ITEA (Information Technology for European Advancement) project
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-540-35127-6_28
Chapter PDF
Similar content being viewed by others
References
RTIPA http://www.extra.research.philips.com/euprojects/rtipa/ or http://www.itea-office.org/projects/facts_sheets/rtipa_fact_sheet.htm
R. Yavatkar et al., A Framework for Policy-Based Admission Control, RFC 2753, January 2000
B. Moore et al., Policy Core Information Model-Version 1 Specification, RFC 3060, February 2001. http://www.ietf.org/rfc/rfc3060.txt.
B. Moore et al., Policy Core Information Model Extensions V.7, http://www.ietf.org/internet-drafts/draft-ietf-policy-pcim-ext-07.txt, March. 2002.
Y. Snir et al., Policy QoS Information Model, Policy framework Working Group, Internet Draft, http://www.ietf.org/internet-drafts/draft-ietf-policy-qos-info-model-04.txt, November 2001.
B. Moore et al., Information Model for Describing Network Device QoS Datapath Mechanisms, Policy framework Working Group, Internet Draft, http://www.ietf.org/internet-drafts/draft-ietf-policy-qos-device-info-model-08.txt, May 2002.
J. Jason et al., IPsec Configuration Policy Model, Internet Protocol Security Policy Working Group, Internet Draft, February 2002.
J. Zao et al, Domain Based Internet Security Policy Management, Proceedings of DARPA Information Survivability Conference and EXposition 2000 (DISCEX’ 00), January 2000.
R. Chandramouli, Implementation of Multiple Access Control Policies within a CORBASEC Framework, 22th National Information Systems Security Conference NISSC’1999.
Corba “Security Service” Specification v 1.7, OMG, March 2001 (ftp://ftp.omg.org/pub/docs/formal/01-03-08.pdf)
N. Dulay et al., A Policy Deployment Model for the Ponder Language, 7th IFIP/IEEE International Symposium on Integrated Network Management (IM’2001), Seattle, USA May 2001.
N. Damianou et al., Ponder: Language for Specifying Security and Management Policies for Distributed Systems, The Language Specification Version 2.3, October 2000. http://www-dse.doc.ic.ac.uk/Research/policies/ponder/PonderSpec.pdf
P. Leydekkers et al., A Computational and Engineering View on Open Distributed Real-time Multimedia Exchange, In Lecture Notes in Computer Science-Number 1018-Springer Verlag-ISBN: 3-540-60647-5-Proceedings of Network and Operating System Support for Digital Audio and Video (NOSSDAV’95), Durham, New Hampshire, USA, April 1995.
P. Leydekkers and V.C.J. Gay, ODP View on Quality of Service for Open Distributed Multimedia Environments, In ‘Quality of Service-Description, Modelling and Management’, A. Vogel and J. de Meer editors. Proceedings of the 4th International IFIP Workshop on QoS, Paris, March 1996.
M. D. J. Cox and R. G. Davison, Concepts, Activities and Issues of Policy-Based Communications Management. BT Technology, Vol 17 No 3 July 1999.
Jajodia S. et al., Principles for a Telecommunications Management Network, ITU-T M.3010, February 2000.
H.J. Tjaja, SLA Enforced by Policy, masters thesis, KPN/Twente University internal report, 2001.
K. Nichols et al.., Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers, RFC 2474, December 1998.
S. Kent and R. Atkinson, IP Authentication Header, RFC 2402, November 1998.
S. Kent and R. Atkinson, IP Encapsulating Security Payload (ESP), RFC 2406, November 1998.
S. Kent and R. Atkinson, Security Architecture for the Internet Protocol, RFC 2401, November 1998.
J. van Ossenbruggen et al., Towards Second and Third Generation Web-Based Multimedia. In: The Tenth International World Wide Web Conference, May 2001, Hong Kong
SMIL 2.0 documentation http://www.w3.org/TR/2000/WD-smil20-20000921/
M. Riguidel, Introduction to Policy Management, RTIPA Technical Report, 2000.
D. Marriott, PhD Thesis, Policy Service for Distributed Systems, Department of Computing, Imperial College, London, 1997.
N. Damianou, A Policy Framework for Management of Distributed Systems, PhD Thesis, Imperial College of London, February 2002.
T. Koch et al., Policy Definition Language for Automated Management of Distributed Systems, Proceedings of the Second International Workshop on System Management, IEEE Computer Society Press, 1996.
J. Hoagland, Specifying and Implementing Security Policies Using LaSCO, the Language for Security Constraints on Objects, PhD Thesis University of California, Davis Department of Computer Science, 2000.
M. Hitchens et al., Tower: A Language for Role Based Access Control, Policy 2001, LNCS 1995, pp. 88–106, 2001.
Jajodia S. et al, A Logical Language for Expressing Authorizations. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE Press, 1997. p. 31–42.
S. Duflos et al., An Architecture for End-to-End Policy-Based Security Management, Submitted to the eighth IFIP/IEEE International Symposium on Integrated Network Management (IM 2003), March 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this paper
Cite this paper
Gay, V., Duflos, S., Kervella, B., Diaz, G., Horlait, E. (2002). Policy-Based Quality of Service and Security Management for Multimedia Services on IP Networks in the RTIPA Project. In: Almeroth, K.C., Hasan, M. (eds) Management of Multimedia on the Internet. MMNS 2002. Lecture Notes in Computer Science, vol 2496. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45812-3_3
Download citation
DOI: https://doi.org/10.1007/3-540-45812-3_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44271-4
Online ISBN: 978-3-540-45812-8
eBook Packages: Springer Book Archive