Predictable configuration management in a randomized scheduling framework

Mark Burgess, Frode Eika Sandnes

Research output: Chapter in Book/Report/Conference proceedingConference contributionProfessional

Abstract

Configuration management is an essential part of system administration and component based software configuration. Autonomous configuration is becoming more important with the emergence of agent technology and heterogeneous nomadic environments. One important issue in configuration management is security, as the services provided by a system is often publicly available. This article addresses security in configuration management systems and proposes strategies for increasing security by randomized scheduling of actions constrained by a set of precedence relations. The special class of time-triggered policies is security-enhanced by adding randomized time-offsets and granularity reductions. These strategies makes it more difficult for malicious parties to detect and exploit configuration patterns resulting in a reduced quality of service and ultimately a damaged system.
Original languageEnglish
Title of host publicationOperations & Management
Subtitle of host publication12th International Workshop on Distributed Systems, DSOM 2001, Nancy, France, October 15-17, 2001: Proceedings
EditorsOlivier Festor, Aiko Pras
Place of PublicationRocquencourt
PublisherINRIA
Pages293-304
Number of pages12
ISBN (Print)9782726111901
DOIs
Publication statusPublished - 2001
Externally publishedYes
Event12th IEEE/IFIP International Workshop on Distributed Systems, DSOM 2001: Internet Services: Management Beyond the Element - Nancy, France
Duration: 15 Oct 200117 Oct 2001
Conference number: 12
https://www.simpleweb.org/ifip/Conferences/DSOM/2001/DSOM2001/index-2.html

Conference

Conference12th IEEE/IFIP International Workshop on Distributed Systems, DSOM 2001
Abbreviated titleDSOM
CountryFrance
CityNancy
Period15/10/0117/10/01
Internet address

Fingerprint

Dive into the research topics of 'Predictable configuration management in a randomized scheduling framework'. Together they form a unique fingerprint.

Cite this