Principles of secure network configuration: Towards a formal basis for self-configuration

Foley, S. N. and Fitzgerald, William M. and Bistarelli, S. and O'Sullivan, B. and Ó Foghlú, Mícheál (2006) Principles of secure network configuration: Towards a formal basis for self-configuration. In: Autonomic Principles Of Ip Operations And Management, Proceedings. Lecture Notes In Computer Science, 4268 . Springer-Verlag Berlin, Berlin, pp. 168-180.

[img] PDF
IPOM2006.pdf
Restricted to Repository staff only

Download (214kB)

Abstract

The challenge for autonomic network management is the provision of future network management systems that have the characteristics of self-management, self-configuration, self-protection and self-healing, in accordance with the high level objectives of the enterprise or human end-user. This paper proposes an abstract model for network configuration that is intended to help understand fundamental underlying issues in self-configuration. We describe the cascade problem in self-configuring networks: when individual network components that are securely configured are connected together (in an apparently secure manner), a configuration cascade can occur resulting in a mis-configured network. This has implications for the design of self-configuring systems and we discuss how a soft constraint-based framework can provide a solution.

Item Type: Book Section
Additional Information: ISI Document Delivery No.: BFL04 English Article <Go to ISI>://000242563100015
Departments or Groups: Telecommunications Software and Systems Group
Divisions: *NONE OF THESE*
Date Deposited: 17 Nov 2007 13:30
Last Modified: 22 Aug 2016 10:25
URI: http://repository.wit.ie/id/eprint/34

Actions (login required)

View Item View Item