SlideShare a Scribd company logo
1 of 14
Goal-Decomposition and
Abductive Reasoning for Policy
Refinement and Analysis
Emil Lupu
Department of Computing
Imperial College London
work in collaboration with A. Bandara and A. Russo
Goals and Initial Observations
•  Policy Refinement: (stepwise)
derivation of enforceable policies from
higher level goals and SLAs.
•  Cannot be automated generally.
Requirements →Implementation
•  Difficult in general: incomplete
specifications, numerous possibilities.
⇒ Easier if problem is constrained
•  Simpler in practice: Application
specific goals typically achieved in a
small number of ways. Need to
encode typical solutions.
⇒ Patterns.
Approach
•  Pattern-based Requirements Engineering technique for goalelaboration.
•  Abductive reasoning used to derive policy elements for refined
policies.
•  Abductive reasoning for policy analysis to ensure consistency of
refinement.
•  Formal representation for policies and managed objects
automatically derived from design-level models (UML) and policy
specification notations (Ponder).

A. Bandara, E. Lupu, A. Russo, et al. Policy Refinement for DiffServ Quality of
Service Management. IEEE eTNSM 3(2):2-13, 2006.
Originally Proposed 1999, also see Policy 2003 and Policy 2004
Rationale
•  Pattern based approach:
–  Define and apply the “application specific” refinement patterns
–  Encode policies resulting from refinement in a new pattern: reuse.

•  Formal Specification
–  For detecting inconsistencies (conflicts), performing analysis and
validation

•  Model of Managed Objects
–  Because policies are dependent upon the state of managed
resources

•  Abductive reasoning
–  To be able to reason with partial information
–  To provide explanations during analysis
–  To elaborate plan of actions for achieving goals
Policy Analysis and Refinement Framework
Behavioural model
of managed objects

Policy specification
Organisational model of
managed objects
Property checks

Goals

Errors + Conflicts

Low-level
Actions

Refined
Policies
Policy Refinement
High-Level
Policy

On file transfer,
if external recipient
transfer should be prohibited

(Event)
(Condition)
(Goal)
P ⇒ !Q

P ⇒ !R

D
C

Elaborate

Abduce

Strategy
Strategy
Strategy

Select

Select

B

KAOS Patterns

Objects

Map

A

E

R ⇒ !Q

On transferFile(File, From, To)
when To.Organisation != From.Organisation;
subject s = /VMRSvcMgr;
target t = From.Organisation.Firewall;
do t.blockTraffic(‘ftp’, From.IP, To.IP);
Policy Analysis and Refinement Toolkit
UML Editor

Analysis/Refinement Client Tool

(e.g. ArgoUML)

Domain Service

Analysis Service

Persistence Provider

Analyser

File RDBMS LDAP

…

A-System

XMI File

CodeGen
XSLT

SISCtus Prolog
Policies, Managed Objects,
Goals, Domain Structure

Presentation and demo at:
http://www.doc.ic.ac.uk/~bandara/research/ponderART-Demo/

Prolog
Files
Advantages and Limitations
•  Combines refinement, analysis and, validation.
•  Permits reuse of solutions once derived.
•  Provides understandable explanations:
–  Why a particular plan of actions is a suitable refinement?
–  Which strategy is being used?
–  Which sequence of events leads to a specific conflict?

•  May provide multiple solutions in an unconstrained problem
space. Should be combined with approaches to compare
refinement solutions e.g., utility functions.
•  Requires some technical knowledge and human intervention.
•  Requires models of managed resources. Can be combined with
model transformation techniques.
Model-checking for policy refinement
•  Model-checking: popular for analysis since using search space
reduction techniques. Tools such as SPIN allow verification of
larger models.
•  The “price” paid for this reduction is that only a subset (and often
a single) solution is returned - the counter example to a property
•  Binary value - property holds unless a counter example is found.
•  Why is the counter example is an adequate refinement solution?
•  Use of SPIN for test generation: 1) inadequate coverage of
generated tests 2) traces too long to be useful (Gargantini &
Heitmeyer ESEC/FSE 1999)
J Rubio-Loyola, J Serrat, M Charalambides, P Flegkas, G Pavlou. A Functional
Solution for Goal-oriented Policy Refinement. IEEE Policy 2006. Canada.
J Rubio-Loyola, J Serrat, M Charalambides, P Flegkas, G Pavlou. A
Methodological Approach toward the Refinement Problem in Policy-based
Systems. IEEE CommMag Oct. 2006, pp. 60-68
Any solution is not suitable for refinement!

•  Can I get from A to B? - Analysis problem.
•  How should I go to B each time I need it? - Policy Refinement problem
Further Thoughts on Model-Checking
•  Requires complete information regarding the initial system state.
Can the absence of a counterexample simply be due to missing
information regarding the initial state?
•  Is specialised for the dynamic behaviour and temporal
properties. How can static properties be checked e.g. “what
access rights have been granted to junior operators users?”
Case-based Reasoning Approaches
•  In essence a classification problem: input (configuration) parameters
w.r.t. desired values for the high level goal.
•  Successful in some areas: product selection, image interpretation,
intrusion detection. Mostly for “numerical problems”. Functional
decomposition is more difficult.
•  Relies on: solutions being known or leant, similarity metrics existing,
non overlapping cases, knowing “all” relevant configuration
parameters.
•  Does not provide explanations unless similarity metrics are meaningful.
Debugging case-based inferences is a nightmare.
•  Useful for constrained numerical problems. Selection amongst a
number of known solutions, e.g. patterns (for planning), parameter
values for reconfiguration actions.

MS Beigi, S Calo D Verma. Policy Transformation Techniques in Policy-based
Systems Management IEEE Policy 2004, New-York, June 2004.
Policy Transformation Using the Policy
Continuum
•  Policy Continuum, cf. 1993-1995 debate on the number of levels of
abstraction.
•  Whenever I hear Transformation I think of Compilation
–  Useful for transforming a device independent model into device commands.
–  Applicable when the input language and the output language are well defined and a
transformation process exists that can transform all inputs into outputs
–  Difficult to reverse transformations. Difficult to “manage” the number of
transformations required and their interdependencies. Correctness? Consistency?
Explanations? Require formal reasoning.

•  Ontologies … again.
–  If specified with all integrity constraints and relations are they less complex than
formal specifications?
–  Ontolgy “mapping” is intractable in the general case event when applied to simple
labelling. In which cases is it tractable?

S Davy, B Jennings, J Strassner. Conflict-Prevention via Model-Driven Policy
Refinement. IEEE DSOM’06, LNCS 4269, pp 209-220.
Conclusions
•  Policy Refinement is work in progress.
•  … but there has been a lot of progress in the last 3-4 years.
•  Initial spectrum of techniques can tackle different aspects of
refinement. Tools and implementations have been developed.
•  Experimentation in application specific domains required:
characteristics of application domains, complexity studies, …
•  Combination of techniques required for more generic cases.
•  CBR, pattern based goal decomposition, abductive reasoning and
model transformation address slightly different problems and are
complementary to some degree.
•  Model checking: useful analysis technique, but refinement is different
•  Ontology mapping and transformation. Beyond trivial application
specific mappings will require other refinement techniques for its
magic.

More Related Content

What's hot

Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Joseph Hennawy
 
Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012Joseph Hennawy
 
Machine Learning Methods for Parameter Acquisition in a Human ...
Machine Learning Methods for Parameter Acquisition in a Human ...Machine Learning Methods for Parameter Acquisition in a Human ...
Machine Learning Methods for Parameter Acquisition in a Human ...butest
 
Interface interoperability
Interface interoperabilityInterface interoperability
Interface interoperabilitymsdanij
 
06 styles and_greenfield_design
06 styles and_greenfield_design06 styles and_greenfield_design
06 styles and_greenfield_designMajong DevJfu
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...DETER-Project
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectDETER-Project
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...DETER-Project
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosStenio Fernandes
 
Towards a methodology for a Quantitative (Risk) Assessment of Critical Infras...
Towards a methodology for a Quantitative (Risk) Assessment of Critical Infras...Towards a methodology for a Quantitative (Risk) Assessment of Critical Infras...
Towards a methodology for a Quantitative (Risk) Assessment of Critical Infras...Global Risk Forum GRFDavos
 
Mobile Multimodal Interaction: An Investigation and Implementation of Context...
Mobile Multimodal Interaction: An Investigation and Implementation of Context...Mobile Multimodal Interaction: An Investigation and Implementation of Context...
Mobile Multimodal Interaction: An Investigation and Implementation of Context...Mafer Solorzano
 
Kostogryzov 10.12.2009
Kostogryzov 10.12.2009Kostogryzov 10.12.2009
Kostogryzov 10.12.2009Mathmodels Net
 
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsInspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsJulie Greensmith
 
Level 3 IT Principles Overview
Level 3 IT Principles OverviewLevel 3 IT Principles Overview
Level 3 IT Principles OverviewStellaITEC
 
Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)Kim Herzig
 

What's hot (16)

Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012
 
Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012
 
Machine Learning Methods for Parameter Acquisition in a Human ...
Machine Learning Methods for Parameter Acquisition in a Human ...Machine Learning Methods for Parameter Acquisition in a Human ...
Machine Learning Methods for Parameter Acquisition in a Human ...
 
Interface interoperability
Interface interoperabilityInterface interoperability
Interface interoperability
 
06 styles and_greenfield_design
06 styles and_greenfield_design06 styles and_greenfield_design
06 styles and_greenfield_design
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER Project
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 
Towards a methodology for a Quantitative (Risk) Assessment of Critical Infras...
Towards a methodology for a Quantitative (Risk) Assessment of Critical Infras...Towards a methodology for a Quantitative (Risk) Assessment of Critical Infras...
Towards a methodology for a Quantitative (Risk) Assessment of Critical Infras...
 
Mobile Multimodal Interaction: An Investigation and Implementation of Context...
Mobile Multimodal Interaction: An Investigation and Implementation of Context...Mobile Multimodal Interaction: An Investigation and Implementation of Context...
Mobile Multimodal Interaction: An Investigation and Implementation of Context...
 
Kostogryzov 10.12.2009
Kostogryzov 10.12.2009Kostogryzov 10.12.2009
Kostogryzov 10.12.2009
 
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsInspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune Systems
 
Level 3 IT Principles Overview
Level 3 IT Principles OverviewLevel 3 IT Principles Overview
Level 3 IT Principles Overview
 
Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)
 
KA Resume
KA ResumeKA Resume
KA Resume
 

Similar to Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement

B2 2006 sizing_benchmarking
B2 2006 sizing_benchmarkingB2 2006 sizing_benchmarking
B2 2006 sizing_benchmarkingSteve Feldman
 
B2 2006 sizing_benchmarking (1)
B2 2006 sizing_benchmarking (1)B2 2006 sizing_benchmarking (1)
B2 2006 sizing_benchmarking (1)Steve Feldman
 
Kaggle Days Paris - Alberto Danese - ML Interpretability
Kaggle Days Paris - Alberto Danese - ML InterpretabilityKaggle Days Paris - Alberto Danese - ML Interpretability
Kaggle Days Paris - Alberto Danese - ML InterpretabilityAlberto Danese
 
Sfeldman performance bb_worldemea07
Sfeldman performance bb_worldemea07Sfeldman performance bb_worldemea07
Sfeldman performance bb_worldemea07Steve Feldman
 
Requirements Engineering Processes
Requirements Engineering ProcessesRequirements Engineering Processes
Requirements Engineering ProcessesRa'Fat Al-Msie'deen
 
Pareto-Optimal Search-Based Software Engineering (POSBSE): A Literature Survey
Pareto-Optimal Search-Based Software Engineering (POSBSE): A Literature SurveyPareto-Optimal Search-Based Software Engineering (POSBSE): A Literature Survey
Pareto-Optimal Search-Based Software Engineering (POSBSE): A Literature SurveyAbdel Salam Sayyad
 
Technical research writing
Technical research writing   Technical research writing
Technical research writing AJAL A J
 
Makine Öğrenmesi, Yapay Zeka ve Veri Bilimi Süreçlerinin Otomatikleştirilmesi...
Makine Öğrenmesi, Yapay Zeka ve Veri Bilimi Süreçlerinin Otomatikleştirilmesi...Makine Öğrenmesi, Yapay Zeka ve Veri Bilimi Süreçlerinin Otomatikleştirilmesi...
Makine Öğrenmesi, Yapay Zeka ve Veri Bilimi Süreçlerinin Otomatikleştirilmesi...Ali Alkan
 
[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineering[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineeringIvano Malavolta
 
Operations Research Digital Material.pdf
Operations Research Digital Material.pdfOperations Research Digital Material.pdf
Operations Research Digital Material.pdfTANVEERSINGHSOLANKI
 

Similar to Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement (20)

Operations Research
Operations ResearchOperations Research
Operations Research
 
B2 2006 sizing_benchmarking
B2 2006 sizing_benchmarkingB2 2006 sizing_benchmarking
B2 2006 sizing_benchmarking
 
B2 2006 sizing_benchmarking (1)
B2 2006 sizing_benchmarking (1)B2 2006 sizing_benchmarking (1)
B2 2006 sizing_benchmarking (1)
 
Man.ppt
Man.pptMan.ppt
Man.ppt
 
Intro to ml_2021
Intro to ml_2021Intro to ml_2021
Intro to ml_2021
 
3 analysis and design overview
3 analysis and design overview3 analysis and design overview
3 analysis and design overview
 
Kaggle Days Paris - Alberto Danese - ML Interpretability
Kaggle Days Paris - Alberto Danese - ML InterpretabilityKaggle Days Paris - Alberto Danese - ML Interpretability
Kaggle Days Paris - Alberto Danese - ML Interpretability
 
Sfeldman performance bb_worldemea07
Sfeldman performance bb_worldemea07Sfeldman performance bb_worldemea07
Sfeldman performance bb_worldemea07
 
Requirements Engineering Processes
Requirements Engineering ProcessesRequirements Engineering Processes
Requirements Engineering Processes
 
Pareto-Optimal Search-Based Software Engineering (POSBSE): A Literature Survey
Pareto-Optimal Search-Based Software Engineering (POSBSE): A Literature SurveyPareto-Optimal Search-Based Software Engineering (POSBSE): A Literature Survey
Pareto-Optimal Search-Based Software Engineering (POSBSE): A Literature Survey
 
Technical research writing
Technical research writing   Technical research writing
Technical research writing
 
Makine Öğrenmesi, Yapay Zeka ve Veri Bilimi Süreçlerinin Otomatikleştirilmesi...
Makine Öğrenmesi, Yapay Zeka ve Veri Bilimi Süreçlerinin Otomatikleştirilmesi...Makine Öğrenmesi, Yapay Zeka ve Veri Bilimi Süreçlerinin Otomatikleştirilmesi...
Makine Öğrenmesi, Yapay Zeka ve Veri Bilimi Süreçlerinin Otomatikleştirilmesi...
 
The art of project estimation
The art of project estimationThe art of project estimation
The art of project estimation
 
Unit 2
Unit 2Unit 2
Unit 2
 
Analysis
AnalysisAnalysis
Analysis
 
[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineering[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineering
 
sdlc.pptx
sdlc.pptxsdlc.pptx
sdlc.pptx
 
CS8592-OOAD Lecture Notes Unit-1
CS8592-OOAD Lecture Notes Unit-1CS8592-OOAD Lecture Notes Unit-1
CS8592-OOAD Lecture Notes Unit-1
 
Operations Research Digital Material.pdf
Operations Research Digital Material.pdfOperations Research Digital Material.pdf
Operations Research Digital Material.pdf
 
Optimazation
OptimazationOptimazation
Optimazation
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement

  • 1. Goal-Decomposition and Abductive Reasoning for Policy Refinement and Analysis Emil Lupu Department of Computing Imperial College London work in collaboration with A. Bandara and A. Russo
  • 2. Goals and Initial Observations •  Policy Refinement: (stepwise) derivation of enforceable policies from higher level goals and SLAs. •  Cannot be automated generally. Requirements →Implementation •  Difficult in general: incomplete specifications, numerous possibilities. ⇒ Easier if problem is constrained •  Simpler in practice: Application specific goals typically achieved in a small number of ways. Need to encode typical solutions. ⇒ Patterns.
  • 3. Approach •  Pattern-based Requirements Engineering technique for goalelaboration. •  Abductive reasoning used to derive policy elements for refined policies. •  Abductive reasoning for policy analysis to ensure consistency of refinement. •  Formal representation for policies and managed objects automatically derived from design-level models (UML) and policy specification notations (Ponder). A. Bandara, E. Lupu, A. Russo, et al. Policy Refinement for DiffServ Quality of Service Management. IEEE eTNSM 3(2):2-13, 2006. Originally Proposed 1999, also see Policy 2003 and Policy 2004
  • 4. Rationale •  Pattern based approach: –  Define and apply the “application specific” refinement patterns –  Encode policies resulting from refinement in a new pattern: reuse. •  Formal Specification –  For detecting inconsistencies (conflicts), performing analysis and validation •  Model of Managed Objects –  Because policies are dependent upon the state of managed resources •  Abductive reasoning –  To be able to reason with partial information –  To provide explanations during analysis –  To elaborate plan of actions for achieving goals
  • 5. Policy Analysis and Refinement Framework Behavioural model of managed objects Policy specification Organisational model of managed objects Property checks Goals Errors + Conflicts Low-level Actions Refined Policies
  • 6. Policy Refinement High-Level Policy On file transfer, if external recipient transfer should be prohibited (Event) (Condition) (Goal) P ⇒ !Q P ⇒ !R D C Elaborate Abduce Strategy Strategy Strategy Select Select B KAOS Patterns Objects Map A E R ⇒ !Q On transferFile(File, From, To) when To.Organisation != From.Organisation; subject s = /VMRSvcMgr; target t = From.Organisation.Firewall; do t.blockTraffic(‘ftp’, From.IP, To.IP);
  • 7. Policy Analysis and Refinement Toolkit UML Editor Analysis/Refinement Client Tool (e.g. ArgoUML) Domain Service Analysis Service Persistence Provider Analyser File RDBMS LDAP … A-System XMI File CodeGen XSLT SISCtus Prolog Policies, Managed Objects, Goals, Domain Structure Presentation and demo at: http://www.doc.ic.ac.uk/~bandara/research/ponderART-Demo/ Prolog Files
  • 8. Advantages and Limitations •  Combines refinement, analysis and, validation. •  Permits reuse of solutions once derived. •  Provides understandable explanations: –  Why a particular plan of actions is a suitable refinement? –  Which strategy is being used? –  Which sequence of events leads to a specific conflict? •  May provide multiple solutions in an unconstrained problem space. Should be combined with approaches to compare refinement solutions e.g., utility functions. •  Requires some technical knowledge and human intervention. •  Requires models of managed resources. Can be combined with model transformation techniques.
  • 9. Model-checking for policy refinement •  Model-checking: popular for analysis since using search space reduction techniques. Tools such as SPIN allow verification of larger models. •  The “price” paid for this reduction is that only a subset (and often a single) solution is returned - the counter example to a property •  Binary value - property holds unless a counter example is found. •  Why is the counter example is an adequate refinement solution? •  Use of SPIN for test generation: 1) inadequate coverage of generated tests 2) traces too long to be useful (Gargantini & Heitmeyer ESEC/FSE 1999) J Rubio-Loyola, J Serrat, M Charalambides, P Flegkas, G Pavlou. A Functional Solution for Goal-oriented Policy Refinement. IEEE Policy 2006. Canada. J Rubio-Loyola, J Serrat, M Charalambides, P Flegkas, G Pavlou. A Methodological Approach toward the Refinement Problem in Policy-based Systems. IEEE CommMag Oct. 2006, pp. 60-68
  • 10. Any solution is not suitable for refinement! •  Can I get from A to B? - Analysis problem. •  How should I go to B each time I need it? - Policy Refinement problem
  • 11. Further Thoughts on Model-Checking •  Requires complete information regarding the initial system state. Can the absence of a counterexample simply be due to missing information regarding the initial state? •  Is specialised for the dynamic behaviour and temporal properties. How can static properties be checked e.g. “what access rights have been granted to junior operators users?”
  • 12. Case-based Reasoning Approaches •  In essence a classification problem: input (configuration) parameters w.r.t. desired values for the high level goal. •  Successful in some areas: product selection, image interpretation, intrusion detection. Mostly for “numerical problems”. Functional decomposition is more difficult. •  Relies on: solutions being known or leant, similarity metrics existing, non overlapping cases, knowing “all” relevant configuration parameters. •  Does not provide explanations unless similarity metrics are meaningful. Debugging case-based inferences is a nightmare. •  Useful for constrained numerical problems. Selection amongst a number of known solutions, e.g. patterns (for planning), parameter values for reconfiguration actions. MS Beigi, S Calo D Verma. Policy Transformation Techniques in Policy-based Systems Management IEEE Policy 2004, New-York, June 2004.
  • 13. Policy Transformation Using the Policy Continuum •  Policy Continuum, cf. 1993-1995 debate on the number of levels of abstraction. •  Whenever I hear Transformation I think of Compilation –  Useful for transforming a device independent model into device commands. –  Applicable when the input language and the output language are well defined and a transformation process exists that can transform all inputs into outputs –  Difficult to reverse transformations. Difficult to “manage” the number of transformations required and their interdependencies. Correctness? Consistency? Explanations? Require formal reasoning. •  Ontologies … again. –  If specified with all integrity constraints and relations are they less complex than formal specifications? –  Ontolgy “mapping” is intractable in the general case event when applied to simple labelling. In which cases is it tractable? S Davy, B Jennings, J Strassner. Conflict-Prevention via Model-Driven Policy Refinement. IEEE DSOM’06, LNCS 4269, pp 209-220.
  • 14. Conclusions •  Policy Refinement is work in progress. •  … but there has been a lot of progress in the last 3-4 years. •  Initial spectrum of techniques can tackle different aspects of refinement. Tools and implementations have been developed. •  Experimentation in application specific domains required: characteristics of application domains, complexity studies, … •  Combination of techniques required for more generic cases. •  CBR, pattern based goal decomposition, abductive reasoning and model transformation address slightly different problems and are complementary to some degree. •  Model checking: useful analysis technique, but refinement is different •  Ontology mapping and transformation. Beyond trivial application specific mappings will require other refinement techniques for its magic.