Principles of Secure Network Configuration: Towards a formal basis for Self-Configuration

Foley, S. and Fitzgerald, William M. and Bistarelli, S. and O'Sullivan, B. and O'Foghlu, M. (2006) Principles of Secure Network Configuration: Towards a formal basis for Self-Configuration. In: Proceedings of IPOM 2006, 6th IEEE International Workshop on IP Operations and Management. IEEE.


Download (153kB) | Preview


Abstract. The challenge for autonomic network management is the provision of future network management systems that have the characteristics of self-management, self-configuration, self-protection and self-healing, in accordance with the high level objectives of the enterprise or human end-user. This paper proposes an abstract model for network configuration that is intended to help understand fundamental underlying issues in self-configuration. We describe the cascade problem in self-configuring networks: when individual network components that are securely configured are connected together (in an apparently secure manner), a configuration cascade can occur resulting in a mis-configured network. This has implications for the design of self-configuring systems and we discuss how a soft constraint-based framework can provide a solution.

Item Type: Book Section
Additional Information: LNCS 4268
Departments or Groups: Telecommunications Software and Systems Group
Divisions: School of Science
Depositing User: Admin SSL
Date Deposited: 20 Oct 2007 14:37
Last Modified: 22 Aug 2016 10:25

Actions (login required)

View Item View Item