Integrated management of network and security devices in IT infrastructures
暂无分享,去创建一个
[1] Wouter Joosen,et al. High-level system configuration , 2008 .
[2] Wouter Joosen,et al. A Survey of System Configuration Tools , 2010, LISA.
[3] David A. Maltz,et al. Unraveling the Complexity of Network Management , 2009, NSDI.
[4] Avishai Wool,et al. Firmato: A novel firewall management toolkit , 2004, TOCS.
[5] Sanjai Narain,et al. Network Configuration Management via Model Finding , 2005, LISA.
[6] David A. Patterson,et al. A Simple Way to Estimate the Cost of Downtime , 2002, LISA.
[7] Paul Anderson,et al. Configuration Tools: Working Together , 2005, LISA.
[8] Archana Ganapathi,et al. Why Do Internet Services Fail, and What Can Be Done About It? , 2002, USENIX Symposium on Internet Technologies and Systems.
[9] David A. Patterson,et al. Studying and using failure data from large-scale internet services , 2002, EW 10.
[10] Wouter Joosen,et al. PoDIM: A Language for High-Level Configuration Management , 2007, LISA.
[11] Eser Kandogan,et al. Usable autonomic computing systems: The system administrators' perspective , 2005, Adv. Eng. Informatics.
[12] Albert G. Greenberg,et al. Configuration management at massive scale: system design and experience , 2007, IEEE Journal on Selected Areas in Communications.
[13] Chen-Nee Chuah,et al. FIREMAN: a toolkit for firewall modeling and analysis , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).