Table Of ContentIBM PRESS NEWSLETTER
Sign up for the monthly IBM PRESS NEWSLETTER at
ibmpressbooks.com/newsletters
LEARN
• NEW PODCASTS
from your favorite authors
• ARTICLES & INTERVIEWS
with authors
• SPECIAL OFFERS
from IBM Press and partners
• NOTICES & REMINDERS
about author appearances and conferences
WIN
Sign up for the IBM PRESS NEWSLETTER and
you will be automatically entered into a
QUARTERLY GIVE-AWAY
for 3 months access to Safari Books Online –
online access to more than 5000 books
A $150 VALUE!
Sign up at ibmpressbooks.com/newsletter
REGISTER YOUR BOOK
ibmpressbooks.com/ibmregister
REGISTRATION ENTITLES YOU TO:
• Supplemental materials that may be available
• Advance notice of forthcoming editions
• A coupon that can be used on your next purchase from ibmpressbooks.com
Visit ibmpressbooks.com
for all product information
Related Books of Interest
A Practical Guide to Understanding DB2
Trusted Computing Learning Visually with Examples,
Second Edition
by David Challener, Kent Yoder, Ryan Catherman,
David Safford, and Leendert Van Doorn by Raul F. Chong, Xiaomei Wang, Michael Dang,
ISBN: 0-13-239842-7 and Dwaine R. Snow
ISBN: 0-13-158018-3
Every year, computer security threats become more
severe. Software alone can no longer adequately IBM® DB2® 9 and DB2 9.5 provide breakthrough
defend against them: what’s needed is secure capabilities for providing Information on Demand,
hardware. The Trusted Platform Module (TPM) implementing Web services and Service Oriented
makes that possible by providing a complete, Architecture, and streamlining information man-
open industry standard for implementing trusted agement. Understanding DB2: Learning Visually
computing hardware subsystems in PCs. Already with Examples, Second Edition, is the easiest way
available from virtually every leading PC manufac- to master the latest versions of DB2 and apply their
turer, TPM gives software professionals powerful full power to your business challenges.
new ways to protect their customers. Now, there’s
Written by four IBM DB2 experts, this book
a start-to-fi nish guide for every software profes- introduces key concepts with dozens of examples
sional and security specialist who wants to utilize drawn from the authors’ experience working
this breakthrough security technology. with DB2 in enterprise environments. Thoroughly
Authored by innovators who helped create TPM updated for DB2 9.5, it covers new innovations
and implement its leading-edge products, this ranging from manageability to performance and
practical book covers all facets of TPM technol- XML support to API integration. Each concept is
ogy: what it can achieve, how it works, and how presented with easy-to-understand screenshots,
to write applications for it. The authors offer deep, diagrams, charts, and tables. This book is for
real-world insights into both TPM and the Trusted everyone who works with DB2: database admin-
Computing Group (TCG) Software Stack. Then, to istrators, system administrators, developers, and
demonstrate how TPM can solve many of today’s consultants. With hundreds of well-designed review
most challenging security problems, they present questions and answers, it will also help profession-
four start-to-fi nish case studies, each with exten- als prepare for the IBM DB2 Certifi cation Exams
sive C-based code examples. 730, 731, or 736.
Listen to the author’s podcast at:
ibmpressbooks.com/podcasts
Sign up for the monthly IBM Press newsletter at
ibmpressbooks/newsletters
Related Books of Interest
Implementing ITIL RFID Sourcebook
Confi guration Management
by Sandip Lahiri
by Larry Klosterboer ISBN: 0-13-185137-3
ISBN: 0-13-242593-9 Approaching crucial decisions about Radio
The IT Infrastructure Library® (ITIL®) helps you Frequency Identifi cation (RFID) technology?
make better technology choices, manages IT This book will help you make choices that
more effectively, and drives greater business maximize the business value of RFID technology
value from all your IT investments. The core of and minimize its risks. IBM’s Sandip Lahiri, an
ITIL is confi guration management: the discipline experienced RFID solution architect, presents up-
of identifying, tracking, and controlling your IT to-the-minute insight for evaluating RFID; defi ning
environment’s diverse components to gain optimal strategies, blueprints, and timetables; and
accurate and timely information for better deploying systems that deliver what they promise.
decision-making.
Drawing on his experience, Lahiri offers candid
Now, there’s a practical, start-to-fi nish guide assessments of RFID’s potential advantages,
to ITIL confi guration management for every IT its technical capabilities and limitations, and
leader, manager, and practitioner. ITIL-certifi ed its business process implications. He identifi es
architect and solutions provider Larry Klosterboer pitfalls that have tripped up early adopters, and
helps you establish a clear roadmap for success, shows how to overcome or work around them.
customize standard processes to your unique This must-have resource can also act as a
needs, and avoid the pitfalls that stand in your reference guide to any nontechnical person
way. You’ll learn how to plan your implementation, who wants to know about the technology.
deploy tools and processes, administer ongoing
From building business cases to testing tags, this
confi guration management tasks, refi ne ITIL
book shares powerful insights into virtually every
information, and leverage it for competitive
issue you’re likely to face. Whatever your role in
advantage. Throughout, Klosterboer demystifi es
RFID strategy, planning, or execution, have Sandip
ITIL’s jargon and illuminates each technique with
Lahiri’s experience and knowledge on your side:
real-world advice and examples.
You’ll dramatically improve your odds of success.
Listen to the author’s podcast at:
ibmpressbooks.com/podcasts
Visit ibmpressbooks.com
for all product information
Related Books of Interest
Lotus Notes Developer’s
Toolbox
Elliott
ISBN: 0-13-221448-2
IBM Rational Unifi ed
Process Reference and
Certifi cation Guide
Mainframe Basics for Shuja, Krebs
Security Professionals ISBN: 0-13-156292-4
Getting Started with RACF WebSphere Business
by Ori Pomerantz, Barbara Vander Weele, Integration Primer
Mark Nelson, and Tim Hahn Iyengar, Jessani, Chilanti
ISBN: 0-13-173856-9 ISBN: 0-13-224831-X
For over 40 years, the IBM mainframe has been
the backbone of the world’s largest enterprises. Understanding
If you’re coming to the IBM System z® mainframe DB2 9 Security
platform from UNIX®, Linux®, or Windows®, you
Bond, See, Wong, Chan
need practical guidance on leveraging its unique
ISBN: 0-13-134590-7
security capabilities. Now, IBM experts have written
the fi rst authoritative book on mainframe security
specifi cally designed to build on your experience Mining the Talk
in other environments. Spangler, Kreulen
The authors illuminate the mainframe’s security ISBN: 0-13-233953-6
model and call special attention to z/OS®
security techniques that differ from UNIX, Linux,
and Windows. They thoroughly introduce IBM’s
Service-Oriented
powerful Resource Access Control Facility
Architecture (SOA) Compass
(RACF®) security subsystem and demonstrate
Bieberstein, Bose, Fiammante,
how mainframe security integrates into your
Jones, Shah
enterprise-wide IT security infrastructure. If you’re
ISBN: 0-13-187002-5
an experienced system administrator or security
professional, there’s no faster way to extend
Persistence in
your expertise into “big iron” environments.
the Enterprise
Barcia, Hambrick, Brown,
Peterson, Bhogal
ISBN: 0-13-158756-0
Sign up for the monthly IBM Press newsletter at
ibmpressbooks/newsletters
Policy Technologies for
Self-Managing Systems
This page intentionally left blank
Policy Technologies for
Self-Managing Systems
Dakshi Agrawal
Seraphin Calo
Kang-Won Lee
Jorge Lobo
Dinesh Verma
IBM Press
Pearson plc
Upper Saddle River,NJ • Boston• Indianapolis • San Francisco
New York • Toronto • Montreal • London • Munich • Paris • Madrid
Cape Town • Sydney • Tokyo • Singapore • Mexico City
ibmpressbooks.com
The authors and publisher have taken care in the preparation of this book, but make no expressed or
implied warranty of any kind and assume no responsibility for errors or omissions. No liability is
assumed for incidental or consequential damages in connection with or arising out of the use of the
information or programs contained herein.
© Copyright 2009 by International Business Machines Corporation. All rights reserved.
Note to U.S. Government Users: Documentation related to restricted right. Use, duplication, or disclo-
sure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corporation.
IBM Press Program Managers: Tara Woodman, Ellice Uffer
Cover design: IBM Corporation
Associate Publisher: Mark Taub
Marketing Manager: Kourtnaye Sturgeon
Publicist: Heather Fox
Acquisitions Editor: Bernard Goodwin
Managing Editor: Patrick Kanouse
Designer: Alan Clements
Senior Project Editor: Tonya Simpson
Copy Editor: Mike Henry
Indexer: Tim Wright
Compositor: TnT Design, Inc.
Proofreader: Williams Woods Publishing Services
Manufacturing Buyer: Dan Uhrig
Published by Pearson plc
Publishing as IBM Press
IBM Press offers excellent discounts on this book when ordered in quantity for bulk purchases or spe-
cial sales, which may include electronic versions and/or custom covers and content particular to your
business, training goals, marketing focus, and branding interests. For more information, please contact:
U. S. Corporate and Government Sales
1-800-382-3419
[email protected].
For sales outside the U. S., please contact:
International Sales
[email protected].
The following terms are trademarks or registered trademarks of International Business Machines
Corporation in the United States, other countries, or both: IBM, the IBM logo, IBM Press, AIX, OS/2,
Tivoli, and WebSphere. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc.
in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows
logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a
registered trademark of The Open Group in the United States and other countries. Linux is a regis-
tered trademark of Linus Torvalds in the United States, other countries, or both. Other company,
product, or service names may be trademarks or service marks of others.
Library of Congress Cataloging-in-Publication Data
Policy technologies for self managing systems / Dakshi Agrawal ... [et al.].
p. cm.
ISBN 0-13-221307-9 (hardback : alk. paper) 1. Systems engineering. I. Agrawal, Dakshi.
TA168.P58 2008
658.4’03—dc22
2008034941
All rights reserved. This publication is protected by copyright, and permission must be obtained from
the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in
any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For informa-
tion regarding permissions, write to:
Pearson Education, Inc
Rights and Contracts Department
501 Boylston Street, Suite 900
Boston, MA 02116
Fax (617) 671 3447
ISBN-13: 978-0-13-221307-3
ISBN-10: 0-13-221307-9
Text printed in the United States on recycled paper at R.R. Donnelley in Crawfordsville, Indiana.
First printing September 2008