summaryrefslogtreecommitdiffstats
path: root/src/site-docs/adoc/fragments/reference-publications
diff options
context:
space:
mode:
authorramverma <ram.krishna.verma@ericsson.com>2018-07-31 18:25:39 +0100
committerramverma <ram.krishna.verma@ericsson.com>2018-07-31 18:27:31 +0100
commitaf74a6270d6ab6badf04a97495a6ef8ccded9b4b (patch)
tree2c7a536e54207a0870ca2008ce457a64de917ab9 /src/site-docs/adoc/fragments/reference-publications
parent9e318f20f2e64970bf3c2e3a5532c516231a6f8a (diff)
Adding first set of apex-pdp document changes
Adding document changes for auth, context, core, model, services & the main apex-pdp module. Change-Id: Id0d026baa258f1dc6998978f9911f3c4a73b5b3b Issue-ID: POLICY-867 Signed-off-by: ramverma <ram.krishna.verma@ericsson.com>
Diffstat (limited to 'src/site-docs/adoc/fragments/reference-publications')
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/5g-2015.adoc47
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/apex.adoc22
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/cnsm-2014.adoc55
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/cnsm-2015.adoc55
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/im-2013.adoc55
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/im-2017a.adoc55
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/im-2017b.adoc58
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/monami-2012.adoc32
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/monami-2013.adoc57
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/noms-2016.adoc54
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/noms-2018a.adoc60
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/noms-2018b.adoc56
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/noms-2018c.adoc51
-rw-r--r--src/site-docs/adoc/fragments/reference-publications/policy-general.adoc21
14 files changed, 678 insertions, 0 deletions
diff --git a/src/site-docs/adoc/fragments/reference-publications/5g-2015.adoc b/src/site-docs/adoc/fragments/reference-publications/5g-2015.adoc
new file mode 100644
index 000000000..6013e7c98
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/5g-2015.adoc
@@ -0,0 +1,47 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== 5G & Autonomic Networking (5G Summit 2015)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| 5G & Autonomic Networking - Challenges in closing the Loop
+
+h| Venue
+| 1st IEEE 5G Summit, Princeton, May 25, 2015
+
+h| Abstract
+| This presentation outlines the problems with existing policy based management systems and why we now need adaptive policy based management systems enabling networks to be self-governed. The talk focuses on the integration of key technologies shaping the future of the ENM Automation Framework, including control theory, predictive analytics, policy-based management context aware computing, knowledge engineering and semantics, modelling of adaptive behavior.
+
+h| Links
+| link:https://www.researchgate.net/publication/277329201_5G_Autonomic_Networking_-_Challenges_in_closing_the_Loop[Research Gate] [accessed Aug 11, 2017]
+
+link:https://ieeetv.ieee.org/mobile/video/princeton-5g-summit-sven-van-der-meer-keynote-automatic-automation[Recorded Talk at IEEE TV] [accessed Aug 11, 2017]
+
+h| BibTeX
+a|
+[source,bibtex]
+----
+@article{VanDerMeer2015b,
+ Author = {van der Meer, Sven},
+ Journal = {IEEE First International 5G Summit},
+ Month = {May},
+ Title = {{5G \& Autonomic Networking - Challenges in closing the Loop}},
+ Url = {https://ieeetv.ieee.org/mobile/video/princeton-5g-summit-sven-van-der-meer-keynote-automatic-automation},
+ Year = {2015},
+----
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/apex.adoc b/src/site-docs/adoc/fragments/reference-publications/apex.adoc
new file mode 100644
index 000000000..4f52fe85c
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/apex.adoc
@@ -0,0 +1,22 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== APEX & Policy
+
+The following publications discuss APEX and policy aspects, such as
+
+* Adaptive Policies
+* SON Use Case with Adaptive Policies
+* The APEX Engine, including performance analysis
+* Distributed Information Management, also known as the APEX Context management
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/cnsm-2014.adoc b/src/site-docs/adoc/fragments/reference-publications/cnsm-2014.adoc
new file mode 100644
index 000000000..27042a949
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/cnsm-2014.adoc
@@ -0,0 +1,55 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== Towards NFV (CNSM'14)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| Towards Real-time Management of Virtualized Telecommunication Networks
+
+h| Venue
+| IEEE CNSM, Rio de Janeiro, November 2014
+
+h| Abstract
+| The idea of virtualizing network functions is driven by recent advances in network-focused hardware. In 2012, several large telecommunication operators issued a call to action for Network Function Virtualization (NFV) 1. The underlying idea is that every network service currently delivered on proprietary, application specific hardware should be deliverable using virtual machines. This means that routers, firewalls, load balancers and other network devices run virtualized on commodity hardware. Consequently, ETSI is extending this idea to mobile networks. Here, parts of the core and the radio access network will be virtualized. The immediate advantage is that any Virtual Network Function (VNF) can now be deployed, redeployed and un-deployed in the same way as any traditional virtual machine. Thus, NFV will result in more dynamic and agile networks than seen heretofore. However, this will raise a number of serious issues in managing these future networks. In this paper, we examine issues and challenges in orchestrating these virtualized functions and their interconnections to provide a more agile mobile telecommunication network.
+
+h| Links
+| link:https://www.researchgate.net/publication/272164781_Towards_Real-time_Management_of_Virtualized_Telecommunication_Networks[Research Gate] [accessed Aug 11, 2017]
+
+h| BibTeX
+a|
+[source,bibtex]
+----
+@inproceedings{DBLP:conf/cnsm/KeeneyMF14,
+ author = {John Keeney and
+ Sven van der Meer and
+ Liam Fallon},
+ title = {Towards Real-time Management of
+ Virtualized Telecommunication Networks},
+ booktitle = {10th International Conference on Network and Service Management,
+ {CNSM} 2014, Rio de Janeiro, Brazil, November 17-21, 2014},
+ pages = {388--393},
+ year = {2014},
+ crossref = {DBLP:conf/cnsm/2014},
+ url = {https://doi.org/10.1109/CNSM.2014.7014200},
+ doi = {10.1109/CNSM.2014.7014200},
+ timestamp = {Tue, 23 May 2017 01:11:56 +0200},
+ biburl = {http://dblp.org/rec/bib/conf/cnsm/KeeneyMF14},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+----
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/cnsm-2015.adoc b/src/site-docs/adoc/fragments/reference-publications/cnsm-2015.adoc
new file mode 100644
index 000000000..01bd55d00
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/cnsm-2015.adoc
@@ -0,0 +1,55 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== Dynamically Adaptive Policies (CNSM'15)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| Dynamically Adaptive Policies for Dynamically Adaptive Telecommunications Networks
+
+h| Venue
+| IEEE CNSM, Barcelona, November 2015
+
+h| Abstract
+| New technologies are changing the world of communication networks and even more so their management. Cloud computing and predictive analytics have removed the need for specialized compute hardware and created products that continuously search for and find insights in management data. Virtualization of networks and network functions, SDN and NFV, are beginning to be mature enough for production networks resulting in much more flexible and dynamic networks. IoT and M2M traffic and new customer demands are driving new thinking and demands for 5G networks. Almost every aspect in the control and management of networks has seen new dimensions of flexibility and dynamicity, with the notable exception of the policies that drive them. This paper discusses the need to add adaptiveness to classic policies, describes a novel approach for adaptive policies, shows how adaptive policies will form part of future network frameworks and architectures, and finally discusses early use cases developed for mobile operators.
+
+h| Links
+| link:https://www.researchgate.net/publication/282576518_Dynamically_Adaptive_Policies_for_Dynamically_Adaptive_Telecommunications_Networks[Research Gate] [accessed Aug 11, 2017]
+
+h| BibTeX
+a|
+[source,bibtex]
+----
+@inproceedings{DBLP:conf/cnsm/MeerKF15,
+ author = {Sven van der Meer and
+ John Keeney and
+ Liam Fallon},
+ title = {Dynamically Adaptive Policies for
+ Dynamically Adaptive Telecommunications Networks},
+ booktitle = {11th International Conference on Network and Service Management,
+ {CNSM} 2015, Barcelona, Spain, November 9-13, 2015},
+ pages = {182--186},
+ year = {2015},
+ crossref = {DBLP:conf/cnsm/2015},
+ url = {https://doi.org/10.1109/CNSM.2015.7367357},
+ doi = {10.1109/CNSM.2015.7367357},
+ timestamp = {Tue, 23 May 2017 01:11:56 +0200},
+ biburl = {http://dblp.org/rec/bib/conf/cnsm/MeerKF15},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+----
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/im-2013.adoc b/src/site-docs/adoc/fragments/reference-publications/im-2013.adoc
new file mode 100644
index 000000000..0c9000a02
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/im-2013.adoc
@@ -0,0 +1,55 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== Recommender System (IM'13)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| A Recommender-system for Telecommunications Network Management Actions
+
+h| Venue
+| IEEE IM, Ghent, May 2013
+
+h| Abstract
+| Research and products in telecoms network management have long been focused on the automation of processes to keep complex managed networks in an operational state, while being profitable to operate for the network operator. Due to the ever increasing scale and complexity of the problem domain, coupled with specific constraints (legal, regulatory, technological change), a fully automated management approach is virtually impossible. It remains the responsibility of human Network Operations Centre (NOC) operators to oversee and manage the running of the network, where their main task is to respond to huge numbers of messages, errors, warnings and faults constantly flowing from the managed network. In the past, network operators either employed expert systems or became very dependent on expert knowledge of their operational staff. Considering the current explosion in size and complexity of managed telecoms network, it is widely understood and accepted that current manual and semiautomated approaches cannot scale. In this paper we investigate the applicability of recommender systems as an approach to assist NOC operators to correctly respond to indications of incidents in the network they are actively managing.
+
+h| Links
+| link:https://www.researchgate.net/publication/259785776_A_recommender-system_for_telecommunications_network_management_actions[Research Gate] [accessed Aug 11, 2017]
+
+h| BibTeX
+a|
+[source,bibtex]
+----
+@inproceedings{DBLP:conf/im/KeeneyMH13,
+ author = {John Keeney and
+ Sven van der Meer and
+ Gabriel Hogan},
+ title = {A Recommender-system for Telecommunications
+ Network Management Actions},
+ booktitle = {2013 {IFIP/IEEE} International Symposium on Integrated
+ Network Management
+ {IM} 2013, Ghent, Belgium, May 27-31, 2013},
+ pages = {760--763},
+ year = {2013},
+ crossref = {DBLP:conf/im/2013},
+ url = {http://ieeexplore.ieee.org/document/6573072/},
+ timestamp = {Sun, 30 Apr 2017 09:41:39 +0200},
+ biburl = {http://dblp.org/rec/bib/conf/im/KeeneyMH13},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+----
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/im-2017a.adoc b/src/site-docs/adoc/fragments/reference-publications/im-2017a.adoc
new file mode 100644
index 000000000..0daeebbe2
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/im-2017a.adoc
@@ -0,0 +1,55 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== D-MIM (IM'17)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| Distributed Management Information Models
+
+h| Venue
+| IEEE IM, Lisbon, May 2017
+
+h| Abstract
+| The use of information models to share and allow modification of network element state is one of the best and most widely adopted ideas in network management. The formal structure of information models and the controlled manner of accessing and changing such models brings both flexibility and control when managing network elements. However, keeping information models synchronized and consistent across network elements and management systems is also one of the most challenging tasks in network management system development. Today this problem is exasperated with the advent of ephemeral network functions and elements and also by the need for distributed scalable cooperating management functions running in containerized distributed cloud deployments. In computer science, there have been major advances in systems that allow seamless distribution of data across distributed executing entities, and separately in systems that allow highly granular data access synchronization across distributed entities. However, such systems do not place importance on " information model " concepts, with data usually distributed as largely unmodeled unstructured data maps. In this paper, we describe our novel approach for distributed information models. We describe how information models are distributed to dispersed network elements and management systems, how synchronized access to distributed information models is achieved, how information models are persisted, and how lookups and changes to information models are logged.
+
+h| Links
+| link:https://www.researchgate.net/publication/316629867_Distributed_Management_Information_Models[Research Gate] [accessed Aug 11, 2017]
+
+h| BibTeX
+a|
+[source,bibtex]
+----
+@inproceedings{DBLP:conf/im/FallonKM17,
+ author = {Liam Fallon and
+ John Keeney and
+ Sven van der Meer},
+ title = {Distributed Management Information Models},
+ booktitle = {2017 {IFIP/IEEE} International Symposium on Integrated
+ Network Management
+ {IM} 2017, Lisbon, Portugal, May 8-12, 2017},
+ pages = {414--420},
+ year = {2017},
+ crossref = {DBLP:conf/im/2017},
+ url = {https://doi.org/10.23919/INM.2017.7987306},
+ doi = {10.23919/INM.2017.7987306},
+ timestamp = {Fri, 28 Jul 2017 12:12:57 +0200},
+ biburl = {http://dblp.org/rec/bib/conf/im/FallonKM17},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+----
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/im-2017b.adoc b/src/site-docs/adoc/fragments/reference-publications/im-2017b.adoc
new file mode 100644
index 000000000..92a59bcd1
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/im-2017b.adoc
@@ -0,0 +1,58 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== COMPA AADM (IM'2017)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| Using the COMPA Autonomous Architecture for Mobile Network Security
+
+h| Venue
+| IEEE IM, Lisbon, May, 2017
+
+h| Abstract
+| The COMPA (Control, Orchestration, Management, Policy, and Analytics) adaptive control loop realizes an automation pattern that can operate recursively at many layers in a carrier network. An overall COMPA autonomic control loop can orchestrate functions, themselves implemented as COMPA autonomic loops. Thus the COMPA automation patter can recurse right down to resource level in a network. One of the most exciting application areas for the COMPA automation pattern is in assuring mobile network security. The recursive nature of the pattern is the ideal mechanism for automating monitoring and root cause analysis of security threats to networks. In this paper we present a Proof of Concept of a COMPA compliant system for a Distributed Denial of Service (DDoS) scenario. The system monitors, performs root cause analysis, and mitigates a DDoS attack. The system was built by integrating a number of existing components that were deployed as VNFs. Our experiences of using the system were that the system could handle a DDoS attack quickly and automatically. In addition, the system was very flexible to build and deploy.
+
+h| Links
+| link:https://www.researchgate.net/publication/317014658_Using_the_COMPA_Autonomous_Architecture_for_Mobile_Network_Security[Research Gate] [accessed Aug 11, 2017]
+
+h| BibTeX
+a|
+[source,bibtex]
+----
+@inproceedings{DBLP:conf/im/FallonKMQM17,
+ author = {Liam Fallon and
+ John Keeney and
+ Mark McFadden and
+ John Quilty and
+ Sven van der Meer},
+ title = {Using the {COMPA} Autonomous Architecture
+ for Mobile Network Security},
+ booktitle = {2017 {IFIP/IEEE} International Symposium on Integrated
+ Network Management
+ {IM} 2017, Lisbon, Portugal, May 8-12, 2017},
+ pages = {747--753},
+ year = {2017},
+ crossref = {DBLP:conf/im/2017},
+ url = {https://doi.org/10.23919/INM.2017.7987370},
+ doi = {10.23919/INM.2017.7987370},
+ timestamp = {Fri, 28 Jul 2017 12:12:57 +0200},
+ biburl = {http://dblp.org/rec/bib/conf/im/FallonKMQM17},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+----
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/monami-2012.adoc b/src/site-docs/adoc/fragments/reference-publications/monami-2012.adoc
new file mode 100644
index 000000000..3ad4fc8cf
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/monami-2012.adoc
@@ -0,0 +1,32 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== HetNets, Big Data, Cloud, SDN ... (Monami'12)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| HetNets, Big Data, Cloud, SDN...all problems solved and your lunch served, right?
+
+h| Venue
+| Keynote, 4th MONAMI, Hamburg, September, 2012
+
+h| Abstract
+| What happens when you get a huge increase of devices and cells (i.e.Heterogeneous Networks - HetNets), all of which have to be monitored and managed, and our current OSSs are already overburdened, handling their existing workloads? In other domains, there are many promising techniques, such as smart filtering, complex event processing, and predictive analytics, but they are not as effectively applied to network management. Why is that? Can we do better? Instead of being overloaded with all of the hype (BigData and Cloud and Software-Defined Networking) and hoping that by mixing some combination of these magic ingredients a solution will emerge, a combination of science and engineering might be a better way to solve the problem! This keynote will discuss a number of common misconceptions with regard to technologies, all of which cause us to spend money on useless mechanisms and services. Focusing on the actual problems, which are a combination of current state of business, foreseeable future, and customer demands, we will be able to point to a number of real problems that require a solution. As with many things, there is no silver bullet but a combination of social and behavioral, technical and methodological advances that will facilitate a networked society, and in the process change the nature of OSSs from Operation Support Systems to Opportunity Support Systems.
+
+h| Links
+| link:https://www.researchgate.net/publication/279527537_HetNets_Big_Data_Cloud_SDNall_problems_solved_and_your_lunch_served_right[Research Gate] [accessed Aug 11, 2017]
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/monami-2013.adoc b/src/site-docs/adoc/fragments/reference-publications/monami-2013.adoc
new file mode 100644
index 000000000..157ed86dd
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/monami-2013.adoc
@@ -0,0 +1,57 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== Drools Performance (Monami'13)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| Cloudifying Mobile Network Management: Performance Tests of Event Distribution and Rule Processing
+
+h| Venue
+| Monami, Cork, November 2013
+
+h| Abstract
+| The explosion in consumer devices has resulted in a significant increase in the number of mobile telecommunications nodes. As a result of increased device and node numbers, network operators have experienced a large increase in associated events. In such an environment, scalability and performance of event handling become important aspects for Operation Support Systems (OSS). A traditional approach has been to centralize monitoring and decision functions. The scale of events in a modern mobile telecommunications network means such centralized implementations are performance limited. What is required is a remodeling of Complex Event Processing (monitoring) and Policies (decision making) towards a distributed yet coordinated system. This paper describes an extensible architecture for such a distributed policy-based event processing system. Our approach provides a pluggable mechanism into which various event handling functionality can be integrated. In order to illustrate the applicability of our approach we evaluate the performance of 2 message queuing protocols, Advanced Message Queuing Protocol (AMQP) based RabbitMQ and Java Web Sockets. Our performance evaluation illustrates the ability of our architecture to transparently integrate alternative event processing technologies.
+
+h| Links
+| ###
+
+h| BibTeX
+a|
+[source,bibtex]
+----
+@inproceedings{DBLP:conf/monami/DawarMKFB13,
+ author = {Sumit Dawar and
+ Sven van der Meer and
+ John Keeney and
+ Enda Fallon and
+ Tom Bennet},
+ title = {Cloudifying Mobile Network Management: Performance Tests
+ of Event Distribution and Rule Processing},
+ booktitle = {Mobile Networks and Management - 5th International Conference,
+ {MONAMI} 2013, Cork, Ireland, September 23-25, 2013},
+ pages = {94--107},
+ year = {2013},
+ crossref = {DBLP:conf/monami/2013},
+ url = {https://doi.org/10.1007/978-3-319-04277-0_8},
+ doi = {10.1007/978-3-319-04277-0_8},
+ timestamp = {Wed, 24 May 2017 08:27:31 +0200},
+ biburl = {http://dblp.org/rec/bib/conf/monami/DawarMKFB13},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+----
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/noms-2016.adoc b/src/site-docs/adoc/fragments/reference-publications/noms-2016.adoc
new file mode 100644
index 000000000..ee3dceea7
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/noms-2016.adoc
@@ -0,0 +1,54 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== APEX Engine (NOMS'16)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| APEX: An Engine for Dynamic Adaptive Policy Execution
+
+h| Venue
+| IEEE NOMS, Istanbul, April 2016
+
+h| Abstract
+| The advent of " Soft Networking " , where networks are composed of virtual nodes and links, promises to dramatically ease the definition and deployment of networks whilst allowing network applications that are limited only by the imagination of the developers of those applications. In such a dynamic environment, the Autonomic Management pattern supervised by policies has been recognized as holding more promise for management of Soft Networks than traditional techniques. We have proposed Dynamic Adaptive Policies as an approach to give classic policies the dynamicity and flexibility to manage such networks and whatever applications are running on them. In this paper, we describe our ongoing work on Apex, an engine that executes and administers Dynamic Adaptive Policies in a scalable and distributed manner.
+
+h| Links
+| link:https://www.researchgate.net/publication/303564082_Apex_An_Engine_for_Dynamic_Adaptive_Policy_Execution[Research Gate] [accessed Aug 11, 2017]
+
+h| BibTeX
+a|
+[source,bibtex]
+----
+@inproceedings{DBLP:conf/noms/FallonMK16,
+ author = {Liam Fallon and
+ Sven van der Meer and
+ John Keeney},
+ title = {Apex: An Engine for Dynamic Adaptive Policy Execution},
+ booktitle = {2016 {IEEE/IFIP} Network Operations and Management Symposium,
+ {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016},
+ pages = {699--702},
+ year = {2016},
+ crossref = {DBLP:conf/noms/2016},
+ url = {https://doi.org/10.1109/NOMS.2016.7502880},
+ doi = {10.1109/NOMS.2016.7502880},
+ timestamp = {Fri, 19 May 2017 01:26:25 +0200},
+ biburl = {http://dblp.org/rec/bib/conf/noms/FallonMK16},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+----
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/noms-2018a.adoc b/src/site-docs/adoc/fragments/reference-publications/noms-2018a.adoc
new file mode 100644
index 000000000..b7558da4e
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/noms-2018a.adoc
@@ -0,0 +1,60 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== Unifying Policy Theory (the APEX theory) (NOMS'18)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| Taming Policy Complexity: Model to Execution
+
+h| Venue
+| IEEE NOMS, Taipei, April 2018
+
+h| Abstract
+| Since the 1970’s it has been acknowledged that a
+complex system can be broken into (a) its invariant functional
+parts (mechanism), and (b) the externalized choices for how the
+system should behave (policy). Policy-based management’s main
+objective is to separate and externalize the decisions required by a
+system from the mechanisms provided by the system, and provide
+a way to define and evaluate these decisions. A few decades later,
+we have today a plethora of different policy models and even more
+policy languages – plus tooling – offering policy-based solutions
+for virtually any use case and scenario. However, policy-based
+management as a standalone domain has never been evaluated
+in terms of which parts are variant / invariant, i.e. which parts
+of policy-based management can be domain-, model-, language-,
+usecase-independent. In this paper, we introduce and define a
+formal universal policy model that does exactly that. The result
+is a model that can be used to design, implement, and deploy
+immutable policy infrastructure (engine and executor) being able
+to execute (virtually) any policy model.
+
+h| BibTeX
+a|
+[source,bibtex]
+----
+@inproceedings{noms/MeerMK18a,
+ author = {Sven van der Meer and
+ John Keeney and
+ Liam Fallon},
+ title = {Taming Policy Complexity: Model to Execution},
+ booktitle = {2018 {IEEE/IFIP} Network Operations and Management Symposium,
+ {NOMS} 2018, Taipei, Taiwan, April 23-27, 2018},
+ year = {2018}
+----
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/noms-2018b.adoc b/src/site-docs/adoc/fragments/reference-publications/noms-2018b.adoc
new file mode 100644
index 000000000..2500e70b1
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/noms-2018b.adoc
@@ -0,0 +1,56 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== 5G Management and Policy (NOMS'18)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| 5G Networks Must Be Autonomic!
+
+h| Venue
+| IEEE NOMS, Taipei, April 2018
+
+h| Abstract
+| 5G networks will be the first real converged networks
+supporting a plethora of different services, each with their
+own requirements. A static best-effort approach is no longer
+sufficient. Extreme flexibility and dynamicity is required, yet costs
+must be drastically reduced. The only way that these conflicting
+goals can be achieved is with vastly increased automation in the
+provision and operation of our future 5G networks. In this paper
+we briefly discuss the facilitators, goals and challenges for 5G
+networks. We identify some of the places where automation is not
+just helpful, but is in fact required for 5G to become a reality.
+We go on to present a conceptual approach for modeling and
+achieving autonomic operations and management in 5G networks
+positioning modern policy-based management as a key enabler
+for autonomic 5G network management.
+
+h| BibTeX
+a|
+[source,bibtex]
+----
+@inproceedings{noms/MeerMK18b,
+ author = {Sven van der Meer and
+ John Keeney and
+ Liam Fallon},
+ title = {5G Networks Must Be Autonomic!},
+ booktitle = {2018 {IEEE/IFIP} Network Operations and Management Symposium,
+ {NOMS} 2018, Taipei, Taiwan, April 23-27, 2018},
+ year = {2018}
+----
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/noms-2018c.adoc b/src/site-docs/adoc/fragments/reference-publications/noms-2018c.adoc
new file mode 100644
index 000000000..96803d828
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/noms-2018c.adoc
@@ -0,0 +1,51 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== An APEX Testbed (NOMS'18)
+
+[width="100%",cols="15%,90%"]
+|===
+
+h| Title
+e| A Testbed For Policy Driven Closed Loop Network Management
+
+h| Venue
+| IEEE NOMS, Taipei, April 2018
+
+h| Abstract
+| Due to the increase in the dynamicity, programmability, scope and complexity of modern networks there is a greatly increased requirement that network management systems control, orchestrate and manage networks in a much more automated and dynamic manner.
+This drive towards automation and dynamicity requires autonomic network management that continuously analyses network state and continually steers the network in accordance with changing high level goals and policies. As dynamicity increases, it is proving increasingly difficult to test and validate the analytics routines and policies that drive today\textquoteright s network management systems. With more automation, the potential for unanticipated network incidents increase, for example where multiple automation features interact and conflict.
+
+There is no substitute for seeing how a network management feature actually performs in a real network, ideally allowing iterative authoring/validation development cycles. However, due to the high stakes involved in degrading or disrupting network performance, this is not usually feasible until the very final testing and deployment stages. The next best option is a testbed that accurately represents a live network scenario to support authoring and validation development cycles in a low-risk environment.
+
+In this work we present our experiences of building a networking testbed that incorporates an emulated network, a production-grade network controller, an analytics function, and a policy execution environment. This allows users to develop policies for adaptive (closed loop) management of a realistic emulated network. We also present two scenarios where the testbed is used to emulate and mitigate against a temporary and prolonged failure occurring on a network.
+
+h| BibTeX
+a|
+[source,bibtex]
+----
+@inproceedings{noms/McNamaraMK18,
+ author = {Joseph McNamara and
+ John Keeney and
+ Liam Fallon and
+ Sven van der Meer and
+ Enda Fallon},
+ title = {A Testbed For Policy Driven Closed Loop Network Management},
+ booktitle = {2018 {IEEE/IFIP} Network Operations and Management Symposium,
+ {NOMS} 2018, Taipei, Taiwan, April 23-27, 2018},
+ year = {2018}
+}
+----
+
+|===
+
diff --git a/src/site-docs/adoc/fragments/reference-publications/policy-general.adoc b/src/site-docs/adoc/fragments/reference-publications/policy-general.adoc
new file mode 100644
index 000000000..c94784650
--- /dev/null
+++ b/src/site-docs/adoc/fragments/reference-publications/policy-general.adoc
@@ -0,0 +1,21 @@
+//
+// ============LICENSE_START=======================================================
+// Copyright (C) 2016-2018 Ericsson. All rights reserved.
+// ================================================================================
+// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
+// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
+//
+// SPDX-License-Identifier: CC-BY-4.0
+// ============LICENSE_END=========================================================
+//
+// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
+//
+
+== Policy in General
+
+The following publications discuss general policy aspects, such as
+
+* Policy as part of Autonomic Networks
+* Policy as part of a closed control loop, mainly COMPA
+* Policy and Semantics
+