Principles of Secure Network Configuration: Towards a Formal Basis for Self-Configuration. Foley, S. N., Fitzgerald, W., Bistarelli, S., O'Sullivan, B., & O FOGHLU, M. 2006.
doi  abstract   bibtex   
The challenge for autonomic network management is the provision of future network management systems that have the characteristics of self-management, self-configuration, self-protection and self-healing, in accordance with the high level objectives of the enterprise or human end-user. This paper proposes an abstract model for network configuration that is intended to help understand fundamental underlying issues in self-configuration. We describe the cascade problem in self-configuring networks: when individual network components that are securely configured are connected together (in an apparently secure manner), a configuration cascade can occur resulting in a mis-configured network. This has implications for the design of self-configuring systems and we discuss how a soft constraint-based framework can provide a solution.
@conference{
	11391_144359,
	author = {Foley, SIMON N. and Fitzgerald, William and Bistarelli, Stefano and O'Sullivan, Barry and O FOGHLU, Micheal},
	title = {Principles of Secure Network Configuration: Towards a Formal Basis for Self-Configuration},
	year = {2006},
	publisher = {SPRINGER-VERLAG},
	journal = {LECTURE NOTES IN COMPUTER SCIENCE},
	volume = {4268},
	booktitle = {AUTONOMIC PRINCIPLES OF IP OPERATIONS AND MANAGEMENT, PROCEEDINGS},
	abstract = {The challenge for autonomic network management is the provision of future network management systems that have the characteristics of self-management, self-configuration, self-protection and self-healing, in accordance with the high level objectives of the enterprise or human end-user. This paper proposes an abstract model for network configuration that is intended to help understand fundamental underlying issues in self-configuration. We describe the cascade problem in self-configuring networks: when individual network components that are securely configured are connected together (in an apparently secure manner), a configuration cascade can occur resulting in a mis-configured network. This has implications for the design of self-configuring systems and we discuss how a soft constraint-based framework can provide a solution.},
	doi = {10.1007/11908852},	
	pages = {168--180}
}

Downloads: 0