Lundy Lewis; Implementing Policy in Enterprise Networks; IEEE Communications Magazine, vol. 34, Issue 1; pp. 50-55, Jan. 1996. |
Terplan, Communications Networks Management "Configuration Management," (Chapter 7, pp. 199-262), Second edition, Prentice Hall, Englewood Cliffs, New Jersey 07632 (1992). |
Sloman, Network and Distributed Systems Management, Addison-Wesley Publishing Company, Wokingham, England (1994). |
"Domains: A Framework For Structuring Management Policy" (Chapter 16, pp. 433-453). |
Moffett, "Specification of Management Policies and Discretionary Access Control," (Chapter 17, pp. 455-480). |
Magee, "Configuration of Distributed Systems," (Chapter 18, pp. 483-497). |
Ericson et al., Expert Systems Applications In Integrated Network Management, "Configuration Management Applications," (Chapter 3, pp. 151-192), Artech House, 685 Canton Street, Norwood, MA 02062 (1989). |
Weis, Journal of Network Systems Management, Plenum Publishing Corp., "Policies In Network And Systems Management--Formal Definition And Architecture," Plenum Publishing Corp., (1994). |
Roos et al., Integrated Network Management III, "Modelling Management Policy Using Enriched Managed Objects," Elsevier Science Publishers, North holland, pp. 207-215 (1993). |
Jonathan D. Moffett and Morris S. Sloman, "Policy Hierarchies for Distributed Systems Management", IEEE Journal on Selected Areas in Communications, vol. 11, No. 9, Dec. 1993, pp. 1404-1414. |
Jonathan D. Moffett and Morris S. Sloman, "Policy Conflict Analysis in Distributed System Management", Journal of Organizational Computing, 4(1) 194, pp. 1-22. |
Cheriton et al., "Host Groups: A Multicast Extension For Datagram Internetworks," Data Communications Symposium, Sep. 1985, pp. 172-179 (USA). |
"Method For Assigning Network Applications To Users and Groups," IBM Technical Disclosure Bulletin, vol. 37, No. 4b, Apr. 1994 (New York, USA). |