12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops最新文献

筛选
英文 中文
Towards adopting a tooldriven, integrated and automated change management process for virtual machine provisioning 朝着采用工具驱动的、集成的和自动化的变更管理流程来提供虚拟机
M. Hauser
{"title":"Towards adopting a tooldriven, integrated and automated change management process for virtual machine provisioning","authors":"M. Hauser","doi":"10.1109/INM.2011.5990509","DOIUrl":"https://doi.org/10.1109/INM.2011.5990509","url":null,"abstract":"Integrating legacy applications and establishing automated process flows often is a main requirement while establishing an effective IT service management (ITSM) system on historically grown and functionally separated organizations. The Leibniz Supercomputing Centre (LRZ, Leibniz-Rechenzentrum) as the main IT service provider for all universities in the area of Munich (Bavaria, Germany) handles IT services for more than 100,000 academic customers. Therefore the LRZ launched an ITSM project and aims to become one of the first ISO/IEC 20000 certified academic IT service providers. As a first pilot service for establishing a change management process, the ITSM working group at the LRZ chose the provisioning of virtual machines. On one hand the attention was turned on implementing an ISO/IEC 20000 compliant process model as well as the integration of legacy tools and applications. Another important requirement is the automation of the process, as the number of hosted virtual machines continual grows. This paper gives a hint on structuring legacy workflows and shows a way to describe them sufficiently. It is shown how to apply concepts on legacy applications and describes some challenges in implementing such an integrated and automated ITSM process.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124875613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extension for information card systems to achieve User-Controlled Automated Identity Delegation 扩展信息卡系统,实现用户控制的自动身份授权
Thorsten Höllrigl, H. Kühner, J. Dinger, H. Hartenstein
{"title":"Extension for information card systems to achieve User-Controlled Automated Identity Delegation","authors":"Thorsten Höllrigl, H. Kühner, J. Dinger, H. Hartenstein","doi":"10.1109/INM.2011.5990580","DOIUrl":"https://doi.org/10.1109/INM.2011.5990580","url":null,"abstract":"The growing number of IT services in distributed systems is directly related to the security and privacy of personal data. User-centric federated identity management (FIM) attends to the privacy issue by enabling users to approve each data dissemination between the providers of identity-related information, so-called identity providers (IdPs), and the consumers of this information, the service providers (SPs). Furthermore, user-centric FIM tries to improve security and usability by providing users with a consistent digital-identity experience using so-called information cards (InfoCards). The InfoCard-based approach can help to improve usability, privacy and security, however, the approach is limited to front-channel communication and requires that each data exchange is manually approved by the user. A back-channel communication might be required in scenarios, in which an IdP wants to notify SPs about e.g. a deactivation of a user. In [3] we proposed an approach, named User-Controlled Automated Identity Delegation, that allows a back-channel communication by automating user approval based on delegation. In this paper we demonstrate the practicality of the approach in a real-world scenario by providing a performance evaluation conducted on a prototypical implementation.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115464256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
COPD24: From Future Internet technologies to health telemonitoring and teletreatment application COPD24:从未来互联网技术到健康远程监测和远程治疗的应用
K. Wac, D. Hausheer
{"title":"COPD24: From Future Internet technologies to health telemonitoring and teletreatment application","authors":"K. Wac, D. Hausheer","doi":"10.1109/INM.2011.5990491","DOIUrl":"https://doi.org/10.1109/INM.2011.5990491","url":null,"abstract":"The emergence of high bandwidth public wireless networks and miniaturized personal mobile devices gives rise to new mobile healthcare services. To this end, the COPD24 system provides highly customizable vital signs tele-monitoring and tele-treatment for Chronic Obtrusive Pulmonary Disease (COPD) patients based on a body area network (BAN) and a mobile health care (m-health) service platform utilizing next generation public wireless networks. The developed system allows the incorporation of diverse medical sensors via wireless connections, and the live transmission of the measured vital signs to healthcare providers as well as real-time feedback to the patient. The system also incorporates environmental state sensors, e.g., air quality sensors deployed in access points of Future Internet (FI) infrastructure, enabling to derive high-granularity, up to date information about the state of the air the patient is in and thus enabling him to make an informed choice on how to manage his health. In this paper we present the COPD system case study, and we derive its design implications for m-health and FI technologies.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"681 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123050948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Conflict analysis during authoring of management policies for federations 在为联邦编写管理策略期间进行冲突分析
J. Barron, S. Davy, B. Jennings
{"title":"Conflict analysis during authoring of management policies for federations","authors":"J. Barron, S. Davy, B. Jennings","doi":"10.1109/INM.2011.5990579","DOIUrl":"https://doi.org/10.1109/INM.2011.5990579","url":null,"abstract":"We outline a policy conflict analysis process for the analysis of newly specified federation-level policies against previously deployed local/federation policies. The process is generic in the sense that it can be employed by each domain participating in a federation to help maintain the consistency of their local system with that of the federation. The conflict analysis process utilises an information model and associated ontology for representing both the static and dynamic application-specific aspects of the local operating environment and the federation to aid in the detection of potential inconsistencies. It employs two algorithms, one for the selection of previously deployed policies related to the federation-level policy and the other for analysing the returned policies against the federation-level policy. The selection algorithm reduces the number of deployed policies required to be retrieved for analysis against any newly specified federation-level policy, while the conflict analysis algorithm detects inconsistencies relating to the conditional element of a policy rule. We discuss a concrete example in the form of a federated XMPP communication scenario.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On the design of Virtual machine Intrusion detection system 虚拟机入侵检测系统的设计
U. Tupakula, V. Varadharajan
{"title":"On the design of Virtual machine Intrusion detection system","authors":"U. Tupakula, V. Varadharajan","doi":"10.1109/INM.2011.5990655","DOIUrl":"https://doi.org/10.1109/INM.2011.5990655","url":null,"abstract":"In this paper we propose comprehensive security architecture called VICTOR to deal with different types of attacks on virtual machines. Our model takes into account the specific characteristics of operating system and applications running in each virtual machine (VM) at a fine granular level to deal with the attacks. Our architecture has several components such as entity validation, intrusion detection engine and dynamic analyzer. The entity validation component is used in the detection of attack traffic with spoofed source address, secure logging, and capturing information of the operating system and applications running in the virtual machines. The intrusion detection engine component is used for detection of known attacks and suspicious behaviour by monitoring the incoming and outgoing traffic of virtual machines. The dynamic analyzer is used for detection and validation of suspicious processes, detection of zero day attacks and fine granular isolation of malicious process or application that is generating the attack traffic.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125202561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Incorporating virtualization awareness in service monitoring systems 在服务监控系统中整合虚拟化意识
M. D. Carvalho, L. Granville
{"title":"Incorporating virtualization awareness in service monitoring systems","authors":"M. D. Carvalho, L. Granville","doi":"10.1109/INM.2011.5990704","DOIUrl":"https://doi.org/10.1109/INM.2011.5990704","url":null,"abstract":"Traditional service monitoring systems (e.g., Nagios and Cacti) have been conceived to monitor services hosted in physical computers. With the recent popularization of server virtualization platforms (e.g., Xen and VMware), monitored services can migrate from a physical computer to another, invalidating the original monitoring logic. In this paper, we investigate which strategies should be used to modify traditional service monitoring systems so that they can still provide accurate status information even for monitored services that are constantly moving on top of a set of servers with virtualization support.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126094040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Taking advantage of the diversity in wireless access networks: On the simulation of a user centric approach 利用无线接入网的多样性:以用户为中心方法的仿真研究
E. H. Cherkaoui, N. Agoulmine, Thinh P. Q. Nguyen, L. Toni, J. Fontaine
{"title":"Taking advantage of the diversity in wireless access networks: On the simulation of a user centric approach","authors":"E. H. Cherkaoui, N. Agoulmine, Thinh P. Q. Nguyen, L. Toni, J. Fontaine","doi":"10.1109/INM.2011.5990516","DOIUrl":"https://doi.org/10.1109/INM.2011.5990516","url":null,"abstract":"“Always Best Connected” or simply ABC concept has been introduced to express the possibility for mobile users to experience with smartphone/computer a continuity of service at any place any time. In this context, the aim of the fourth generation of wireless networks is to not only support high speed connection but also implement ABC taking benefit of the numerous underlying wireless technologies. For that, smart-phones should implement sophisticated access network selection mechanism to take benefit of this diversity. In our previous works, we have used the utility theory to propose several utility functions that measures the value of each access network vs. the preferences of the end users and we have shown how these preferences can be used by the user terminal to select the most appropriate access network. In this paper, we extend that work with the implementation of the solution in a simulator of heterogeneous access networks and perform a set of simulations to highlight the value added of the proposed solution. The obtained results show similar results as those obtained analytically and confirm the validity of the approach for the end users and the operators.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123698005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A framework for migrating production snapshots of composite applications to virtualized environments 用于将组合应用程序的生产快照迁移到虚拟化环境的框架
Manish Sethi, Narendran Sachindran, Manoj Soni, Manish Gupta, P. Gupta
{"title":"A framework for migrating production snapshots of composite applications to virtualized environments","authors":"Manish Sethi, Narendran Sachindran, Manoj Soni, Manish Gupta, P. Gupta","doi":"10.1109/INM.2011.5990562","DOIUrl":"https://doi.org/10.1109/INM.2011.5990562","url":null,"abstract":"Migrating production applications from physical datacenters to a virtualized environment is becoming essential to reduce operational costs. In order to avoid direct access to production systems, migration from disk snapshots is preferable. Model based migration approaches are not suitable for this purpose since they need to perform configuration discovery on production systems. Recent approaches that rely upon an isolated network require special setup and are limited to handling network configurations only. In this paper we present a framework for instantiating an application from disk snapshots in a virtualized environment. Our approach comprises of formally specifying the knowledge about product configurations and compiling the knowledge into a plan. The plan is capable of discovering application configurations in an inconsistent configuration setup. A key feature of our framework is that knowledge is specified once per product and re-used across applications that use the product. We have implemented a prototype of our approach and evaluated it on a real world application. The evaluation demonstrates the feasibility of our approach for migration using disk snapshots.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116341420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flow signatures of popular applications 流行应用程序的流签名
Vladislav Perelman, N. Melnikov, J. Schönwälder
{"title":"Flow signatures of popular applications","authors":"Vladislav Perelman, N. Melnikov, J. Schönwälder","doi":"10.1109/INM.2011.5990668","DOIUrl":"https://doi.org/10.1109/INM.2011.5990668","url":null,"abstract":"Network flow data is widely used to analyze the protocol mix forwarded by a router or to identify anomalies that may be caused by hardware and software failures, configuration errors, or intrusion attempts. The goal of our research is to find application signatures in network flow traces that can be used to pinpoint certain applications, such as specific web browsers, mail clients, or media-players. Our starting point is the hypothesis that popular applications generate application specific flow signatures. In order to verify our hypothesis, we recorded traffic traces of several applications and we subsequently analyzed the traces to identify flow signatures of these applications. The flow signatures were formalized as queries of a stream-based flow query language. The queries have been executed on several flow traces in order to evaluate our approach.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121186009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cost-efficient deployment of a wireless sensor network under dynamic spectrum sharing 动态频谱共享下无线传感器网络的经济高效部署
Jae-Young Seol, Seong-Lyun Kim
{"title":"Cost-efficient deployment of a wireless sensor network under dynamic spectrum sharing","authors":"Jae-Young Seol, Seong-Lyun Kim","doi":"10.1109/INM.2011.5990555","DOIUrl":"https://doi.org/10.1109/INM.2011.5990555","url":null,"abstract":"In this paper, we consider a way to deploy a wireless sensor network under the dynamic spectrum sharing. The dynamic spectrum sharing technique can help a sensor network overcome the shortage of radio resources because of getting crowded unlicensed ISM bands commonly used by it. For the purpose of this, we analyze the aggregate interference to a primary network from the sensor network as a secondary network. Base on the analysis, we propose a cost-efficient deployment algorithm. The proposed algorithm consists of the power control framework to avoid harmful interference and the inhomogeneous deployment strategy to guarantee k-coverage and k-connectivity with the least number of additional sensor nodes reducing the deployment cost. Through the numerical analysis to verify the performance of the proposed algorithm, we show the power control framework makes it possible that the sensor network is deployed with a primary network even under more restricted conditions, and the inhomogeneous deployment strategy saves the number of additional sensor nodes needed to cover a given sensing area by about 20%.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信