Planning Dependability of Virtualised Networks

Virtualisation technologies widely affect best practice for dependability of services and networks, and suggest novel approaches for dependable configurations. Starting from an existing tool, that computes dependable configurations for traditional information systems, we analyse how to change its configuration strategies when moving to virtual environments.

[1]  V. Tosic,et al.  The Common Information Model (CIM) standard - an analysis of features and open issues , 1999, 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services. TELSIKS'99 (Cat. No.99EX365).

[2]  Hao Zhou,et al.  Transport Layer Security (TLS) Session Resumption without Server-Side State , 2008, RFC.

[3]  Eric Rescorla,et al.  SSLACC: A Clustered SSL Accelerator , 2002, USENIX Security Symposium.

[4]  Farnam Jahanian,et al.  Empirical Exploitation of Live Virtual Machine Migration , 2007 .

[5]  Maurice Israël,et al.  Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[6]  Alan L. Cox,et al.  Optimizing network virtualization in Xen , 2006 .

[7]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[8]  Marco Domenico Aime,et al.  Policy-Driven System Configuration for Dependability , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.