<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1815-5928</journal-id>
<journal-title><![CDATA[Ingeniería Electrónica, Automática y Comunicaciones]]></journal-title>
<abbrev-journal-title><![CDATA[EAC]]></abbrev-journal-title>
<issn>1815-5928</issn>
<publisher>
<publisher-name><![CDATA[Universidad Tecnológica de La Habana José Antonio Echeverría, Cujae]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1815-59282018000300077</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Empleo de modelos de información en arquitectura modificada para gestión de redes y servicios basada en políticas]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Peña Casanova]]></surname>
<given-names><![CDATA[Mónica]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Anías Calderón]]></surname>
<given-names><![CDATA[Caridad]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Tecnológica de La Habana CUJAE  ]]></institution>
<addr-line><![CDATA[ La Habana]]></addr-line>
<country>Cuba</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad de las Ciencias Informáticas  ]]></institution>
<addr-line><![CDATA[ La Habana]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<volume>39</volume>
<numero>3</numero>
<fpage>77</fpage>
<lpage>88</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S1815-59282018000300077&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S1815-59282018000300077&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S1815-59282018000300077&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN Las infraestructuras de redes y servicios se han convertido en un activo estratégico para las organizaciones. En la medida que estas han crecido en tamaño, complejidad y heterogeneidad, también ha crecido la necesidad gestionarlas de manera integrada para que sus características se puedan representar de manera estructurada y estandarizada. Existen varios modelos de gestión que se han estandarizado, cada uno con su propio protocolo de comunicaciones y definición de información de gestión, utilizándose en ámbitos diferentes, de ahí que persiste el dilema de la integración de los modelos de gestión con vistas a tener un control holístico de la red y sus servicios; una vía para lograrlo es la integración de los modelos de información. Esta integración, unida a la automatización de la ejecución de políticas de las tecnologías de la información sobre las infraestructuras de redes y servicios, permitirá un comportamiento autonómico en estas. Múltiples propuestas han surgido para lograr la integración de modelos de información pertenecientes a modelos de gestión estandarizados, sin embargo, las mismas no garantiza que se puedan ejecutar las políticas de la organización en las infraestructuras. En el presente trabajo, a partir del análisis de un conjunto de modelos de información para la gestión integrada de redes, se seleccionaron dos para emplearlos en la arquitectura de gestión basada en políticas del IETF, además se introducen modificaciones a la misma para contribuir a la solución de conflictos entre políticas. En la parte final, se ejemplifica la propuesta realizada en contextos actuales de gestión SDN, SDN/NFV.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT Network and service infrastructures have become a strategic asset for organizations. As these have grown in size, complexity and heterogeneity, the need to manage it in an integrated manner has also grown so that its characteristics can be represented in a structured and standardized manner. There are several management models that have been standardized, each with its own communications protocol and definition of management information, used in different areas, hence the dilemma of the integration of management models in order to control holistic network and its services, one way to achieve this is the integration of information models. This integration, with the automation of the implementation of information technology policies on network and service infrastructures, will allow autonomous behavior in these. Multiple proposals have emerged to achieve the integration of information models belonging to standardized management models, however, they do not guarantee that the organization's policies can be executed in infrastructures. In the present work, the IETF's policy-based management architecture is detailed using two information models, which have been selected for their capacity to integrate and implement IT policies in the network and service infrastructures. In the final part, the proposal is exemplified in current management contexts SDN, SDN / NFV.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[gestión de redes basada en políticas]]></kwd>
<kwd lng="es"><![CDATA[modelos de información]]></kwd>
<kwd lng="es"><![CDATA[gestión integrada de redes y servicios]]></kwd>
<kwd lng="en"><![CDATA[Policy based network management]]></kwd>
<kwd lng="en"><![CDATA[Information model]]></kwd>
<kwd lng="en"><![CDATA[data model]]></kwd>
<kwd lng="en"><![CDATA[integrated network and Service management]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pras]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Schoenwaelder]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[RFC 3444 ¨On the Difference between Information Models and Data Models¨]]></source>
<year>2003</year>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moreira]]></surname>
<given-names><![CDATA[RS]]></given-names>
</name>
<name>
<surname><![CDATA[Morla]]></surname>
<given-names><![CDATA[RS]]></given-names>
</name>
<name>
<surname><![CDATA[Moreira]]></surname>
<given-names><![CDATA[LPC]]></given-names>
</name>
<name>
<surname><![CDATA[Soares]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A behavioral reflective architecture for managing the integration of personal ubicomp systems automatic SNMP-based discovery and management of behavior context in smart-spaces]]></article-title>
<source><![CDATA[Pers Ubiquitous Comput. 1 de abril de]]></source>
<year>2016</year>
<volume>20</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>229-43</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jiang]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Cao]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Research on Improved Physical Topology Discovery Based on SNMP]]></source>
<year>2017</year>
<conf-name><![CDATA[ 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>219-22</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wac]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Cummings]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Dey]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[E2eUberIM end-to-end service management framework for anything-as-a-service]]></article-title>
<source><![CDATA[IEEE Commun Mag. marzo de]]></source>
<year>2016</year>
<volume>54</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>54-60</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kontoudis]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Fouliras]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey of the distributed network management models and architectures Assessment and challenges]]></article-title>
<source><![CDATA[Int J Comput Netw Commun Ications IJCNC]]></source>
<year>2014</year>
<volume>6</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>161</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McGibney]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[AE]]></given-names>
</name>
<name>
<surname><![CDATA[Rea]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Managing wireless sensor networks within IoT ecosystems]]></source>
<year>2015</year>
<conf-name><![CDATA[ 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>339-44</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Strassner]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Diab]]></surname>
<given-names><![CDATA[WW]]></given-names>
</name>
</person-group>
<source><![CDATA[A semantic interoperability architecture for Internet of Things data sharing and computing]]></source>
<year>2016</year>
<conf-name><![CDATA[ 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>609-14</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Orrala]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Rosario]]></surname>
<given-names><![CDATA[ED]]></given-names>
</name>
</person-group>
<source><![CDATA[Implementación de monitoreo de red utilizando los Protocolos icmp y snmp]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[DW]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[H-D]]></given-names>
</name>
<name>
<surname><![CDATA[Silva de]]></surname>
<given-names><![CDATA[CW]]></given-names>
</name>
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[J-W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Service-provider intelligent humanoid robot using TCP/IP and CORBA]]></article-title>
<source><![CDATA[Int J Control Autom Syst. 1 de abril de]]></source>
<year>2016</year>
<volume>14</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>608-15</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guang-jun]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng-qiu]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Research on SLA information model based on SID]]></article-title>
<source><![CDATA[2015 10th International Conference on Computer Science Education (ICCSE)]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Cambridge, UK ]]></publisher-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Estrada-Solano]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Ordonez]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Granville]]></surname>
<given-names><![CDATA[LZ]]></given-names>
</name>
<name>
<surname><![CDATA[Caicedo Rendon]]></surname>
<given-names><![CDATA[OM]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A framework for SDN integrated management based on a CIM model and a vertical management plane]]></article-title>
<source><![CDATA[Comput Commun. 1 de abril de]]></source>
<year>2017</year>
<volume>102</volume>
<page-range>150-64</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pavlou]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[A novel approach for mapping the OSI-SM/TMN model to ODP/OMG CORBA]]></source>
<year>1999</year>
<conf-name><![CDATA[ Integrated Network Management VI Distributed Management for the Networked Millennium Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management (Cat No99EX302)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>67-82</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Choi]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Strassner]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[JW-K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards a Context-Aware Information Model for Provisioning and Managing Virtual Resources and Services]]></article-title>
<source><![CDATA[Modelling Autonomic Communication Environments]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Springer ]]></publisher-loc>
<publisher-name><![CDATA[Berlin, Heidelberg]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lui]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Xie]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Strassner]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Karagiannis]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Klyus]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Bi]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[RFC 8338 Policy-Based Management Framework for the Simplified Use of Policy Abstractions (SUPA)]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Calo]]></surname>
<given-names><![CDATA[SB]]></given-names>
</name>
<name>
<surname><![CDATA[Verma]]></surname>
<given-names><![CDATA[DC]]></given-names>
</name>
<name>
<surname><![CDATA[Bertino]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Distributed Intelligence: Trends in the Management of Complex Systems]]></article-title>
<source><![CDATA[Proceedings of the 22Nd ACM on Symposium on Access Control Models and Technologies]]></source>
<year>2017</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boutaba]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Aib]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Policy-based Management A Historical Perspective]]></article-title>
<source><![CDATA[J Netw Syst Manag. 1 de diciembre de]]></source>
<year>2007</year>
<volume>15</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>447-80</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Davy]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Jennings]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Strassner]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The policy continuum-Policy authoring and conflict analysis]]></article-title>
<source><![CDATA[Comput Commun. 15 de agosto de]]></source>
<year>2008</year>
<volume>31</volume>
<numero>13</numero>
<issue>13</issue>
<page-range>2981-95</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Riekstin]]></surname>
<given-names><![CDATA[AC]]></given-names>
</name>
<name>
<surname><![CDATA[Januário]]></surname>
<given-names><![CDATA[GC]]></given-names>
</name>
<name>
<surname><![CDATA[Rodrigues]]></surname>
<given-names><![CDATA[BB]]></given-names>
</name>
<name>
<surname><![CDATA[Nascimento]]></surname>
<given-names><![CDATA[VT]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Survey of Policy Refinement Methods as a Support for Sustainable Networks IEEE Commun Surv Tutor]]></article-title>
<collab>Carvalho TCM d B.Meirosu C</collab>
<source><![CDATA[Firstquarter de]]></source>
<year>2016</year>
<volume>18</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>222-35</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="">
<source><![CDATA[Context-aware dynamic policy selection for load balancing behavior]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Westerinen]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Schnizlein]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Strassner]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Scherling]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Quinn]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Herzog]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[RFC 3198 Terminology for Policy-Based Management]]></source>
<year>2001</year>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Benítez]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Damián]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Larco]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Danilo]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Propuesta de modelo de gestión de infraestructura de red, basado en las mejores prácticas de gestión de ti y los modelos estándar de gestión de red - caso de estudio EP Petroecuador]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Quito, Ecuador ]]></publisher-loc>
<publisher-name><![CDATA[Escuela Politécnica Nacional]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guerrero]]></surname>
<given-names><![CDATA[JI]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Personal]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Luque]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[León]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Heterogeneous data source integration for smart grid ecosystems based on metadata mining]]></article-title>
<source><![CDATA[Expert Syst Appl.]]></source>
<year>2017</year>
<volume>79</volume>
<page-range>254-68</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matteoda]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Arquitectura de servicios de gestión de políticas empleando protocolo COPS]]></source>
<year>2015</year>
<publisher-name><![CDATA[Facultad de Informática]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Graham]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Qinzheng]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Neville]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Distributed Network Management using CORBA/TMN]]></article-title>
<source><![CDATA[CITR Tech J]]></source>
<year>1996</year>
<volume>2</volume>
<numero>23</numero>
<issue>23</issue>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silega]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Noguera]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Macias]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ontology-based Transformation from CIM to PIM]]></article-title>
<source><![CDATA[IEEE Lat Am Trans. septiembre de]]></source>
<year>2016</year>
<volume>14</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>4156-65</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Giraldo]]></surname>
<given-names><![CDATA[FD]]></given-names>
</name>
<name>
<surname><![CDATA[España]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Giraldo]]></surname>
<given-names><![CDATA[WJ]]></given-names>
</name>
<name>
<surname><![CDATA[Pastor]]></surname>
<given-names><![CDATA[Ó]]></given-names>
</name>
<name>
<surname><![CDATA[Giraldo]]></surname>
<given-names><![CDATA[FD]]></given-names>
</name>
<name>
<surname><![CDATA[España]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modelling languages quality evaluation by taxonomic analysis a preliminary proposal]]></article-title>
<source><![CDATA[Rev Ing Univ Medellín. julio de]]></source>
<year>2016</year>
<volume>15</volume>
<numero>29</numero>
<issue>29</issue>
<page-range>159-72</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moore]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[RFC 3460 Policy Core Information Model (PCIM) Extensions]]></source>
<year>2003</year>
</nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Odagiri]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Shimizu]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Ishii]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Takizawa]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain]]></article-title>
<source><![CDATA[Advances on Broad-Band Wireless Computing, Communication and Applications]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Springer ]]></publisher-loc>
<publisher-name><![CDATA[Cham]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="">
<source><![CDATA[DASH | DMTF]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="">
<collab>EBSCOhost</collab>
<source><![CDATA[125427548 | AN ANALYSIS OF CONTEXT-AWARE DATA MODELS FOR SMART CITIES: TOWARDS FIWARE AND ETSI CIM EMERGING DATA MODEL]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kourai]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Oozono]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Virtual AMT for Unified Management of Physical and Virtual Desktops]]></article-title>
<source><![CDATA[2015 IEEE 39th Annual Computer Software and Applications Conference.]]></source>
<year>2015</year>
<page-range>928-37</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="">
<source><![CDATA[Standards and Technology | DMTF]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="">
<source><![CDATA[Swordfish Scalable Storage Management API | SNIA]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dotta]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Gerardo]]></surname>
<given-names><![CDATA[Á]]></given-names>
</name>
</person-group>
<source><![CDATA[Extensión de las mejores prácticas de los modelos propuestos por el Telemanagement Forum y mejores prácticas propuestas por ITIL para ser aplicados fuera del ámbito de las Telecomunicaciones]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Latifi]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Nasiri]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Mohsenzadeh]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[ENRICHED ETOM FRAMEWORK IN SERVICE DELIVER OPERATION THROUGH ALIGNMENT WITH SOME OF COBIT5 STRATEGIC OBJECTIVES]]></article-title>
<source><![CDATA[Int J Digit Inf Wirel Commun IJDIWC]]></source>
<year>2014</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>35-42</page-range></nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Filiposka]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Lapacz]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Balcerkiewicz]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Wein]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Sobieski]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Transforming silos to next-generation services]]></source>
<year>2017</year>
<conf-name><![CDATA[ 17th International Conference on Smart Technologies]]></conf-name>
<conf-loc> </conf-loc>
<page-range>745-50</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nenadic]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Kobal]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Palata]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[About the telco cloud management architectures]]></source>
<year>2016</year>
<conf-name><![CDATA[ 2016 39th International Convention on Information and Communication Technology]]></conf-name>
<conf-loc> </conf-loc>
<page-range>545-52</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[van der Ham]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Ghijsen]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Grosso]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[de Laat]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Trends in Computer Network Modeling Towards the Future Internet]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Strassner]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[DEN-ng: achieving business-driven network management]]></source>
<year>2012</year>
<conf-name><![CDATA[ Network Operations and Management Symposium, 2002]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kontoudis]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Fouliras]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Host-Based Virtual Networks Management in Cloud Datacenters]]></article-title>
<source><![CDATA[Comput Inform. 6 de julio de]]></source>
<year>2017</year>
<volume>36</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>541-65</page-range></nlm-citation>
</ref>
<ref id="B41">
<label>41</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Strassner]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[DEN-ng: achieving business-driven network management]]></source>
<year>2002</year>
<publisher-loc><![CDATA[En ]]></publisher-loc>
<publisher-name><![CDATA[Network Operations and Management Symposium]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<label>42</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Strassner JS]]></surname>
<given-names><![CDATA[van der Meer S]]></given-names>
</name>
<name>
<surname><![CDATA[Donnelly]]></surname>
<given-names><![CDATA[Foghlú MÓ]]></given-names>
</name>
</person-group>
<source><![CDATA[The Design of a New Context-Aware Policy Model for Autonomic Networking]]></source>
<year>2008</year>
<conf-name><![CDATA[ International Conference on Autonomic Computing]]></conf-name>
<conf-loc>Chicago </conf-loc>
<page-range>119-28</page-range></nlm-citation>
</ref>
<ref id="B43">
<label>43</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Handigol]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Heller]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Jeyakumar]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Mazières]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[McKeown]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks]]></article-title>
<source><![CDATA[Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation]]></source>
<year>2014</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[USENIX Association]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<label>44</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wundsam]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Levin]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Seetharaman]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Feldmann]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[OFRewind:Enabling Record and Replay Troubleshooting for Networks]]></article-title>
<source><![CDATA[Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference]]></source>
<year>2011</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[USENIX Association]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<label>45</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Al-Shaer]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Haj]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[FlowChecker:Configuration Analysis and Verification of Federated Openflow Infrastructures]]></article-title>
<source><![CDATA[Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration]]></source>
<year>2010</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<label>46</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mijumbi]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Serrat]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Gorricho]]></surname>
<given-names><![CDATA[J-L]]></given-names>
</name>
<name>
<surname><![CDATA[Latre]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Charalambides]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Lopez]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Management and orchestration challenges in network functions virtualization]]></article-title>
<source><![CDATA[IEEE Commun Mag]]></source>
<year>2016</year>
<volume>54</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>98-105</page-range></nlm-citation>
</ref>
<ref id="B47">
<label>47</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boucadair]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Jacquenet]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[RFC 7149 Software-Defined Networking: A Perspective from within a Service Provider Environment]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B48">
<label>48</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Miyamoto]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Miyazawa]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Hayashi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Sustainable implementation-level workflow for automating NFV operation]]></source>
<year>2017</year>
<conf-name><![CDATA[ 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>793-6</page-range></nlm-citation>
</ref>
<ref id="B49">
<label>49</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Emiliano]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Antunes]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Automatic network configuration in virtualized environment using GNS3]]></source>
<year>2015</year>
<conf-name><![CDATA[ 2015 10th International Conference on Computer Science Education (ICCSE)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>25-30</page-range></nlm-citation>
</ref>
<ref id="B50">
<label>50</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pinheiro]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Chaves]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Cerqueira]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Abelem]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[CIM-SDN:A Common Information Model extension for Software-Defined Networking]]></article-title>
<source><![CDATA[Globecom Workshops (GC Wkshps), 2013 IEEE]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Estados Unidos ]]></publisher-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
