Principles of Secure Network Configuration: Towards a Formal Basis for Self-Configuration (Contributo in atti di convegno)

Type
Label
  • Principles of Secure Network Configuration: Towards a Formal Basis for Self-Configuration (Contributo in atti di convegno) (literal)
Anno
  • 2006-01-01T00:00:00+01:00 (literal)
Alternative label
  • [1] Bistarelli S., [2] Foley S. N., [2] O'Sullivan B., [3] Fitzgerald W., [3] O Foghl´u M. (2006)
    Principles of Secure Network Configuration: Towards a Formal Basis for Self-Configuration
    in 6th IEEE International Workshop on IP Operations and Management, Dublino (Irlanda), 22-25 Oct 2006
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • [1] Bistarelli S., [2] Foley S. N., [2] O'Sullivan B., [3] Fitzgerald W., [3] O Foghl´u M. (literal)
Pagina inizio
  • 168 (literal)
Pagina fine
  • 180 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#volumeInCollana
  • 4268 (literal)
Note
  • ISI Web of Science (WOS) (literal)
  • Scopu (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • [1] CNR-IIT, Pisa, Italy; [2] Department of Computer Science, University College Cork, Ireland; [3] Waterford Institute of Technology, Ireland (literal)
Titolo
  • Principles of Secure Network Configuration: Towards a Formal Basis for Self-Configuration (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
  • 3-540-47701-2 (literal)
Abstract
  • The challenge for autonomic network management is the provision of future network management systems that have the charac- teristics of self-management, self-configuration, self-protection and self- healing, in accordance with the high level objectives of the enterprise or human end-user. This paper proposes an abstract model for network configuration that is intended to help understand fundamental under- lying issues in self-configuration. We describe the cascade problem in self-configuring networks: when individual network components that are securely configured are connected together (in an apparently secure man- ner), a configuration cascade can occur resulting in a mis-configured net- work. This has implications for the design of self-configuring systems and we discuss how a soft constraint-based framework can provide a solution. (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Editore di
Insieme di parole chiave di
data.CNR.it