Secure Monitoring of Service Level Agreements
|
|
|
- Aubrie Mosley
- 10 years ago
- Views:
Transcription
1 Secure Monitoring of Service Level Agreements K.P. Clark, M.E. Warnier, F.M.T. Brazier Faculty of Technology, Policy and Management Delft University of Technology Delft, The Netherlands {k.p.clark, m.e.warnier, T.B. Quillinan D-CIS Lab Thales Netherlands Delft, The Netherlands Abstract Service Level Agreements (SLA) are commonly used to define terms and conditions of service provisioning. WS-Agreement 1 is an SLA specification that addresses the need of both producers and consumers of services to specify and negotiate terms and conditions of access to these services. This specification has gained wide acceptance in both the Grid computing and Web Services communities. WS-Agreement includes support for both negotiating and specifying penalties that arise from violation of these terms and conditions. It does not, however, include support for monitoring these agreements to determine if any such violations have occurred and, if so, determining which parties are responsible. This paper proposes a framework and design for secure and reliable monitoring of WS-Agreement specified SLAs. Modifications to WS-Agreement are necessary for effective monitoring. These modifications are outlined, along with an implementation of the framework in the AgentScape middleware system. Keywords-sla, ws-agreement, distributed monitoring, reliability I. INTRODUCTION Service Level Agreements (SLA) define the terms and conditions of service provisioning. The Web Service Agreement [1] (WS-Agreement) provides a protocol for negotiating; a language for specifying terms and conditions, and an advertising protocol for services. While the ability to specify penalties and rewards is included in WS-Agreement, the standard does not, as yet, specify how these agreements should be monitored to ensure that the terms and conditions are not violated [2]. When a consumer and provider agree on a service for a specific price, the minimal requirements of this service can be specified as part of an SLA. For instance, an SLA can state that bandwidth must be greater than 1MB, or average up-time must be greater than 99%. If a provider is unable to meet these requirements, a consumer may impose penalties, such as reducing or cancelling payment or reporting the violation to a reputation authority. One method to determine if, when, and by whom, an agreement is violated, is to employ reliable monitoring. Monitoring of active agreements, and the audit trail it provides, can be used to establish whether or not the agreement is violated. Furthermore, the responsible 1 SLA specification by the Open Grid Forum: party can be impartially established and a determination reached whether or not sanctions are justified. One approach to reliable monitoring makes use of a Trusted Third Party (TTP). This TTP can (1) monitor active SLAs by performing measurements at specified intervals and comparing them to threshold values stored in the SLA; (2) record communication between consumer and provider, and (3) take action when a violation is detected, such as notifying the relevant parties, withholding payment or terminating the service. This paper proposes an SLA monitoring framework that provides reliable data that is accurate and secure. The principles outlined in this framework are incorporated in a monitor design using the WS-Agreement specification. This design has been implemented in the AgentScape middleware to illustrate the potential of this approach. Agent- Scape has an established mechanism for SLA negotiation and serves as the TTP. The main contributions of this paper are (1) the generic framework and design for secure and reliable monitoring of SLAs for violations; (2) a method for specifying violation policies, and (3) an implementation of this framework in the AgentScape middleware with which the feasibility of a decentralised approach is shown. The remainder of this paper is structured as follows: Section II briefly introduces SLAs and the Web Service Negotiation. Different aspects of monitoring SLAs are examined in Section III. Section IV describes the design of our monitor, including security and reliability considerations. A comparison of centralised and decentralised variants of the monitoring framework, implemented in AgentScape, is presented in Section V. Section VI discusses related research and, finally, Section VII discusses the results and depicts areas for future research. II. BACKGROUND Service Level Agreements (SLAs) represent the main tool for specifying transactions between those providing and those seeking resources. Currently, there are several specifications that describe, not only the structure of an SLA document, but also the processes of advertising and
2 negotiating this document. One of these specifications is WS-Agreement [1]. A. Service Level Agreements Service Level Agreements (SLA) are agreements between multiple parties to specify terms of service. They involve at least one service provider and at least one service consumer and specify the services to be provided. Additionally, these documents specify Quality of Service (QoS) guarantees; payments for compliance, or penalties for violation of the agreement. QoS attributes can be expressed as a set of (name, value) pairs where name refers to a Service Level Objective (SLO) and value represents the requested level of service. An SLO specifies the particular object to be measured, how measurements are performed and any actions that take place after measurement. Traditionally, SLAs are written and signed between legal entities, representing each of the parties involved. In recent years, much attention has been given to automating this negotiation process [3], [4]. Several specifications have been proposed for this purpose, including WS-Agreement [1] and Web Service Level Agreement (WSLA) [5]. B. Web Service Negotiation The WS-Agreement specification [1] defines a language with which to express agreements, a protocol to advertise available services and a protocol to support negotiation and confirmation of SLAs between resource providers and consumers. This specification defines XML documents that describe the agreement parties and terms. Agreement templates are used to advertise available services and list additional constraints, such as the maximum or minimum QoS levels. The negotiation protocol is defined by the following steps, as depicted in Figure 1. Figure 1. WS-Agreement protocol and SLA specification. Initially, when a consumer (Agreement Initiator) requests an indication of services available from a provider (Agreement Responder), the provider produces an overview of available services (Templates). Based on this information, the consumer proposes an SLA (Offer). The provider decides whether or not to accept the proposed SLA. If accepted, service provisioning begins (Lease). Figure 1 also illustrates the conceptual overview of the SLA document as specified by WS-Agreement. This document has three main components: Name, Context and Terms. The Name provides a human-readable identifier. The Context contains information concerning the parties involved, the duration of the agreement and information about the original template used. The Terms specifies the functional and non-functional requirements of the agreement in Service Description Terms (SDT) and Guarantee Terms (GT). An SDT identifies the specific services covered by the SLA, for example, the number of processors or amount of bandwidth. A GT specifies the levels (QoS) of those services, for example, availability or response time. A GT also contains additional information regarding the importance of a certain SLO, the reward of compliance or the penalty of violation. WS-Agreement is an active standards proposal. Since the publication of the original WS-Agreement specification several extensions have been proposed. These include the ability to anticipate violations and renegotiate agreements at run-time [6], finalise the agreement using a two-phase commit [7] and support multiple rounds of negotiation and dynamic re-negotiation due to the changing needs of the consumer or abilities of the provider [8]. III. MONITORING FRAMEWORK Monitoring is needed to determine if an agreement is being honoured or not. Once established, appropriate violations can be enforced. The general principles of monitoring SLAs are discussed below. A. Monitoring Service Level Agreements Monitoring an agreement involves periodically testing whether the agreement terms have been met by all relevant parties. Depending on the agreement terms, this either requires testing a specific variable, such as network latency, or logging communication between consumer and provider. Monitoring intervals are specified appropriately, such as daily or hourly, depending on the duration of the agreement and the nature of the agreement terms. Monitoring must also support both simple and complex evaluation formulae. For instance, some requirements can be verified by measuring a single variable, such as Host is reachable. However, other requirements can only be verified once a set of measurements have been performed and their results processed, such as Average host uptime is greater than 99%. A monitoring mechanism must be secure against malicious parties, potentially including the parties with whom agreements have been reached. Security mechanisms are necessary to ensure that measurements are accurate and stored data is not tampered with. Such mechanisms should include a secure logging mechanism [9] to accurately record the record of communications and measurements. Protection of this data is needed as stored data also serves as an audit
3 trail to detect violations offline, after service provisioning has ended. Furthermore, trust and objectivity considerations determine the placement of a monitoring module. Rana et. al. distinguishes three possible locations for monitoring [2]: Trusted Third Party (TTP): an independent module that can monitor (and log) all communication between consumers and service providers. Once the SLA is successfully completed, both parties receive a signed certificate from the TTP that can be used for non-repudiation and/or reputation building of the service provider. However, a TTP cannot measure the internal state of either a consumer or provider. Trusted Module at service provider: functionally equivalent to a TTP but with access to the internal state of the service provider. However, a provider may not reveal all of the internal state or may report incorrect information to the monitor. A module at this location can show that a provider attempted to avoid violations and dealt with them responsibly when they occurred. Trusted Module on the consumer site: functionally equivalent to a TTP but it can be difficult to distinguish between provider delay and network delay. A module at this location is not particularly useful for measurements, but rather only for establishing the trust level for certain providers. B. Auditing and Conflict Resolution In some cases, conflicts arise that cannot be resolved automatically. For example, a service provider contests its liability for failing to meet an SLO. The SLO is known to be violated; however, the cause of the violation is beyond the control of the provider (e.g. force majeure or a Distributed Denial of Service (DDoS) attack [10]). To resolve such cases, it is necessary to record messages and measurements for later processing and also determine which messages to store and the duration of storage. For example, audit logs should be stored until all parties acknowledge that the SLA has been successfully completed. It is also necessary to determine how violations are recorded. Violations can either be stored in the TTP, added explicitly to the SLA document [3] or included in usage records [11]. SLA status updates can also be pushed to parties at intervals or published to a secure site to allow parties on-demand access. C. Penalising Violations When a violation occurs, often a penalty is incurred. Penalties can be as simple as terminating the current agreement and finding a different provider, or more complex reputation or monetary based penalties [12]. These penalties are commonly used for service provisioning [13]. In these systems, reputation is a community-wide metric of an entity s trustworthiness. This metric increases if the entity completes transactions without violating the agreement. Conversely, the metric decreases if a term is violated. Reputation based penalties utilise the notion that consumers prefer providers with a higher reputation and try to avoid providers with a lower reputation. In contrast, monetary based penalties operate on the assumption that consumers pay less for poor service and more for better service. Both of these mechanisms require additional infrastructure and security measures [13]. A reputation based system requires a persistent record of all transactions, both successful and violated. A monetary based system requires a secure means of payment, whether in currency or credit, that has actual value to the users of the system. Both of these approaches require a means of guaranteeing that identities are unique, persistent and legitimate. For instance, underlying authentication mechanisms can verify that users are indeed whom they claim to be. Deposits with a jointly agreed TTP can be used in a monetary based system to implement penalties if needed. In the event of violation, the deposit can be used to effectuate penalty payment. The exact penalty terms can be separately negotiated during SLA negotiation or follow known policies, such as the following [2]: All-or-nothing provisioning: provisioning of a service must meet all SLOs. ALL of the SLO constraints MUST be met to satisfy the SLA; Partial provisioning: provisioning of a service must meet some SLOs. SOME of the SLO constraints MUST be met to satisfy the SLA; Weighted Partial provisioning: provision of a service meets SLOs that have a weighting GREATER THAN a [user specified] threshold. IV. MONITOR DESIGN This section outlines the design of the monitor following the guiding principles discussed above. This includes a description of the components of the monitor and the specification of a monitoring policy. A. Monitor Overview The two main conceptual components of the monitoring framework are Monitor Sensors and a Monitor Processes. Monitor Sensors are positioned at strategic locations to measure services. These sensors must have direct access to local variables of host machines of a provider, as well as a direct connection to any consumers and all communication in between. Sensors are passive in the regard that they should not take action or affect the local system until receiving a request from a Monitor Process. When a request is received, a sensor becomes active, performs a measurement, returns the results and then becomes inactive again. The bulk of monitoring logic is stored in a separate Monitor Process. The responsibilities of the Monitor Process are: (1) identify which SLAs require monitoring; (2) request measurements from Monitor Sensors; (3) check results for
4 Figure 2. Monitor deployment violations, and (4) take appropriate action when a violation is detected. The design of the Monitor Sensor and Monitor Process is illustrated in Figure 2. Each Monitor Sensor provides an interface for communication with a Monitor Process and a local library of measurement formulae. A Monitor Sensor listens for measurement requests, loads measurement formulae from a local library, performs the measurement and returns the results. A Monitor Process has an interface component and four engines: a Management Engine, a Measurement Engine, a Violation Engine and an Output Engine. An interface component receives new SLAs, sends measurement requests and receives results. A single Management Engine module coordinates and stores the SLAs, measurement results and recorded violations. This module creates a new Measurement Engine for each active SLA. The Measurement Engine receives the SLA information and begins performing measurements and testing results for violations based on the negotiated violation policy. If a violation is detected, the Violation Engine is notified. This module can take action as specified by a violation policy, such as contacting the Output Engine to inform one or more parties. When an active SLA is received, a Monitor Process checks if any of the clauses require monitoring and, where appropriate, begins monitoring these items by communicating with sensors. These measurements can include static facts, such as the presence or absence of a required item (for example, a boolean value, such as host is reachable ). These measurements can also include dynamic items that require aggregated data to calculate the average, minimum, maximum or complex functions (for example, that return a real number, such as average uptime is 99.9% ). If a violation is detected during active monitoring, action is taken, as specified by the SLA. When the SLA ends, the results are stored, along with the communications log, in encrypted form for possible later auditing or conflict resolution. Additional mechanisms are available to secure this data, such as append-only storage [14]. B. Policy Specification The current WS-Agreement specification [1] contains a BusinessValueList by which the value of a certain SLO can be expressed. This can declare its value explicitly or imply its value through a penalty or reward type. For instance, a penalty or reward type may hold a monetary value that indicates the importance of the SLO. Although this enables a basic mechanism for punishing poor performance and rewarding good performance, this paper proposes the use of a richer and more flexible method to specify violation policies. As opposed to adding more terms to the WS- Agreement standard, this paper proposes adding a separate SDT to specify these policies. This includes the ability to choose a violation policy, such as those mentioned above, as well as the number of acceptable violations and the actions that should be taken. A portion of this extension is shown in Figure 3. The value of ViolationPolicy specifies the violation policy and can be none, allornothing, partial or weighted. The value of ViolationCount specifies how many violations are detected before action is taken. This must be a positive integer. The value of ViolationAction specifies the action to be taken when a violation is detected and can be none, notify, penalise or cancel. This allows for no action, notification of the parties, penalty enforcement (as specified by existing penalty clause) or cancellation of the service. C. Security and Reliability To provide reliable measurements, the monitoring process must be secure against malicious users that attempt to violate agreements or interfere with the provision of services to
5 <ServiceDescriptionTerm ServiceName="SLAMon"> <Policies xsi:type="policies"> <ViolationPolicy/> <ViolationCount/> <ViolationAction/> </Policies> </ServiceDescriptionTerm> Figure 3. Monitoring policy attributes others. Thus, the data collected from monitoring should be protected from deletion or modification by unauthorised users. Additionally, audit logs should be used, when necessary, to distinguish violations caused by parties of the agreement from those caused by other factors or users external to the agreement. Furthermore, monitoring should rely as little as possible on data provided by parties and should attempt to rely as much as possible on measurements of independently accessible variables. The monitor should also be reliable and robust to system failure and overload. Distribution of the monitoring process can usually support both of these requirements. A distributed monitor can remove the risk of a single point of failure. Furthermore, distribution of the monitoring process can remove possible performance bottlenecks and allow for greater scaling. The monitoring process should be self-healing in two ways. Firstly, workload should be automatically balanced across monitors, preventing any single monitor from becoming overloaded. Secondly, monitors should automatically recover from failures and these failures should not affect the accuracy or integrity of the data that has already been collected. V. MONITORING IN AGENTSCAPE AgentScape has been used for implementation and experimentation. The AgentScape middleware [15] platform supports SLA negotiation using the WS-Agreement specification [16]. Moreover, the AgentScape architecture fulfills the requirements for Trusted Computing Base [17], including clearly defined and enforceable security policies, role-based access controls, identification and authentication mechanisms and audit trails [18]. These features make it possible to serve as the TTP. This section introduces the AgentScape middleware and describes how the monitoring framework for WS-Agreement is implemented in AgentScape. This includes an experimental comparison of a centralised and decentralised variant to illustrate some of the benefits of a distributed approach. A. AgentScape Middleware AgentScape [15] is a distributed platform for heterogeneous mobile agents designed to be open, scalable, secure and fault-tolerant, the structure of which is depicted in Figure 4. An AgentScape Location is an administrative domain that groups one or more host machines together. Each AgentScape Location has a Location Manager that regulates access to a location and its resources. These resources may include middleware services such as Agent Servers for different programming languages (for example, Java, C, Jason) or an anonymity service. Each host machine has a Host Manager that regulates access to a host and its resources. A Web Service Gateway provides access to external web services. A group of independent AgentScape Locations that are aware of, and accessible to one another, may be referred to as an AgentScape World. This awareness is facilitated by an external Lookup Service that is responsible for providing listings of known locations and, optionally, their services. Figure 4. AgentScape architecture An SLA framework implemented in AgentScape [16] allows agents to negotiate access to a site (that is, a location), the right to migrate to a site and access resources. In practice, agents negotiate leases using the WS-Agreement specification with the Location Managers. After checking an agent s credentials, a Location Manager takes note of an agent s requests and proposes combinations of services in an SLA, as described above. Agents can choose to accept a proposal or not. A Location Manager is, in fact, a mediator, that not only interacts with agents, it also interacts with its own hosts to determine which services it can provide. When an agreement is reached, the SLA is stored by the Location Manager, and an agent is provided access to a location and the services specified in the lease for the period of time depicted. AgentScape is well-suited to distributed environments and is self-healing in the presence of failures. Mechanisms are in place to automatically recover crashed agents without losing data. Data persistence is achieved by storing data in the agent s container stored on the hard disk [19]. This framework has been used for service negotiation applications for both the energy domain as well as the Grid resource management domains [16]. B. Design Implementation AgentScape currently supports negotiation and creation of SLAs using the WS-Agreement specification [16] as described above. The SLA framework in AgentScape has been extended to support monitoring and penalty enforcement. A
6 trusted monitoring module has been implemented to measure the provided services and ensure that the GTs in the SLA are fulfilled by both parties. The SLA document has been extended, similar to those described in [20]: the item to be measured, time constraints, and the method to be used for measurement as described in Example 1 below are included. Example 1 An SLA specifies that measureditem is network latency, measuredat is every 10 seconds, evalfunc is average latency is less than 50 milliseconds and evalaction is to warn customer if over limit three times in a row. Thus, the customer is alerted if average latency is consistently higher than 50 milliseconds. As average user do not necessarily have trusted hardware modules, our implementation makes use of a TTP to achieve secure and reliable monitoring. The AgentScape middleware is the TTP. The middleware is impartial to the process and has no stake in the outcome of a consumer or provider. Therefore, when a host manager declares that it has a certain service to provide, or when it declares that a violation has occurred based on evidence, these are valid and honest actions. Additionally, this approach assumes that all work is performed locally for both consumer and provider. The AgentScape SLA framework requires that consumer agents migrate to the host of the provider to use that provider s services. Therefore, measurements performed by either the provider, consumer or a TTP should be identical. The monitoring process has been implemented as an AgentScape Agent. This allows existing mechanisms to be used for secure communication, access controls and persistent storage of data. Agents are automatically restarted with their current data if they die unintentionally or even if the middleware is restarted. Data persistence is achieved by routinely writing crucial information, such as the state of the SLA, to the agent container. C. Centralised and Decentralised Monitoring Two versions of the Monitor Agent have been designed and implemented: one centralised and one decentralised. The centralised variant utilises a Monitor Agent on only one Location for an entire AgentScape World. The decentralised variant utilises a Monitor Agent on each Location. These two variants are contrasted in Figure 5. In this illustration, three Locations form a single AgentScape World. In the centralised variant, only the Monitor Agent at Location A communicates directly with all Monitor Sensors at Locations where monitoring is needed. In the decentralised variant, a Monitor Agent is located at each Location and communicates only with Monitor Sensors at the same Location. The centralised variant simplifies the management of leases by storing all information in a single place. In the Figure 5. Centralised and decentralised monitor variants decentralised version, each host only stores information regarding local leases and the load of monitoring responsibility is more evenly balanced across the system. If a monitor fails, all other monitors continue to operate normally. New SLA requests are sent to these monitors. Monitors are automatically respawned by the middleware once a failure is detected. Active SLAs and monitoring data are recovered from the persistent container file and monitoring continues. Both variants have costs that cannot be known without experimentation. D. Experiments Experimentation tests a monitor s ability to detect violations following the specified policy (e.g. those introduced in Section III-C). These experiments use a web service external to AgentScape as the monitored service, and network latency and network traffic as the monitored items. Both provider and consumer violations are detected. When network latency to this web service is greater than the maximum agreed value, as specified by the SLA, this condition is interpreted by the monitor as a violation for which the provider is responsible. When network traffic is greater than the maximum agreed value, this is interpreted as a violation for which the consumer is responsible. In both cases, the violation is recorded and the parties are notified. Further experimentation measures the overhead generated by the monitoring framework to judge the feasibility of such a framework in a real-world setting. This experiment compares the centralised and decentralised versions of the monitor. The centralised version uses only one monitor per AgentScape World, thus several Locations share the same monitor. The decentralised version uses one monitor per Location. One AgentScape World is created with five Locations. Each Location runs on a separate physical host machine. Measurements of the number of threads used and the amount of memory being consumed are taken as agents are added and evenly distributed across the Locations. The comparison of the centralised and decentralised versions is depicted in Figure 6. As these results show, the decentralised version of the monitor utilises slightly more threads than the centralised version. The number of threads for both monitor versions increases at approximately the same rate as more consumer agents are added. The results also show that despite initially
7 Figure 6. Comparison of centralised and decentralised monitor. (a) shows the number of threads used as the number of agents increases. (b) shows the amount of memory consumed as the number of agents increases. using less memory, the centralised monitor memory consumption increases sharply as agents are added. In contrast, the decentralised version experiences near linear growth as load increases. The experiments reveal information about the scalability of both the centralised and decentralised monitor. The decentralised version requires more resources in a predictable way, as load increases. However, the centralised version requires substantially more memory as the number of agents increase, until a hard limit is reached. After this point, adding more agents causes the system to become unresponsive. The decentralised version does not exhibit this characteristic and easily handles twice the load of the centralised version. In summary, a centralised and a decentralised SLA monitoring framework has been implemented in AgentScape to judge the feasibility of such a framework in a real-world setting. These variants differ in the complexity of information management. The centralised variant with centralised lease management, suffers from performance problems when the number of agents increases. In contrast, the decentralised version utilises a more complex distributed lease management system and scales in a predictable and stable way. VI. RELATED WORK The field of monitoring agreements is an active area of research. A number of alternative approaches to this problem are available, including the WSLA framework from IBM [5] and Grid-oriented approaches [3], [20]. These projects offer insights to the considerations and design of monitoring frameworks. The Web Service Level Agreement (WSLA) framework [5] is a framework for specifying and monitoring agreements. This specification provides a very rich language for specifying monitoring requirements; however, one important drawback is that it does not support the multiple violation policies discussed in this paper. Furthermore, this specification does not appear to be widely used or actively developed. In contrast, the WS-Agreement specification, used in this framework, is currently being used and developed by an active community [8], [6], [21], [22]. This offers a greater chance of incorporation of the extensions recommended in this paper. Two Grid-oriented approaches [3], [20] also include support for monitoring SLA clauses. Although these approaches provide methods for automated measurements and violation capture for distributed environments, both appear to rely on the assumption of a trusted environment, namely that of a commercial Grid. This assumes that internal resources are protected from external attack and that users are not able to attack the system to prevent detection of their own violations or to cause the violation of other innocent users. Furthermore, these grid-oriented approaches use dedicated machines for monitoring and logging. While these approaches may be well-suited to a controlled environment, this will not scale to open environments, such as the Internet. In contrast, the approach described in this paper does not assume a trusted network, but rather expects malicious users to attack the system. Furthermore, this approach pursues fully distributing the load of users and the risk of failure across multiple hosts, providing scalability and reliability. VII. DISCUSSION While negotiation of SLAs have been examined in detail [16], monitoring and determining how to address violations of these agreements have not received the same level of attention. This paper presents a framework for monitoring SLAs that is secure and reliable even in the presence of malicious users, failures and heavy load. Furthermore, the proposed framework has a broad definition of violation and what penalties should be enforced. This monitoring framework has been implemented in AgentScape. The AgentScape middleware has established security mechanisms and thus serves as a trusted third party. A centralised and a decentralised version of the monitoring framework have been implemented and compared. Future work in this area will include incorporating trusted hardware modules, when available, and making use of reac-
8 tive monitoring mechanisms [23] to lower overhead costs. While the results of experimentation with the monitoring framework has indicated the suitabilty of a decentalised approach for monitoring SLAs under heavy load, further experimentation is required to investigate more security and reliability issues, such as active attacks against monitors. While the current implementation provides a working basis, more work is also required to standardise penalties and proof of violations. Acknowledgements This work is a result of support provided by the NLnet Foundation ( and the ALIVE project (FP7-IST ). REFERENCES [1] A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig, J. Pruyne, J. Rofrano, S. Tuecke, and M. Xu. Web Services Agreement Specification (WS-Agreement). In Global Grid Forum GRAAP-WG, Draft, August, [2] O. Rana, M. Warnier, T. B. Quillinan, and F. M. T. Brazier. Monitoring and Reputation Mechanisms for Service Level Agreements. In Proceedings of the 5th International Workshop on Grid Economics and Business Models (GenCon), Las Palmas, Gran Canaria, Spain., August Springer Verlag. [3] J. Padget, K. Djemame, and P. Dew. Grid-Based SLA Management. Lecture Notes in Computer Science, 3470:1076, [4] A. Ludwig, P. Braun, R. Kowalczyk, and B. Franczyk. A Framework for Automated Negotiation of Service Level Agreements in Services Grids. Lecture Notes in Computer Science, 3812:89, [5] A. Keller and H. Ludwig. The WSLA Framework: Specifying and Monitoring Service Level Agreements for Web Services. Journal of Network and Systems Management, 11(1):57 81, [6] M. Aiello, G. Frankova, and D. Malfatti. What s in an Agreement? An Analysis and an Extension of WS-Agreement. Lecture Notes in Computer Science, 3826:424, [7] A. Pichot, P. Wieder, O. Waldrich, and W. Ziegler. Dynamic SLA-negotiation based on WS-Agreement. Technical Report TR-0082, Institute on Resource Management and Scheduling, CoreGRID - Network of Excellence, June [8] W. Ziegler, P. Wieder, and D. Battre. Extending WS- Agreement for dynamic negotiation of Service Level Agreements. Technical Report TR-0172, Institute on Resource Management and Scheduling, CoreGRID - Network of Excellence, August [9] L. Gymnopoulos, S. Dritsas, S. Gritzalis, and C. Lambrinoudakis. GRID security review. Lecture Notes in Computer Science, pages , [10] F. Lau, SH Rubin, MH Smith, and L. Trajkovic. Distributed denial of service attacks. In 2000 IEEE International Conference on Systems, Man, and Cybernetics, volume 3, [11] R. Mach, R. Lepro-Metz, S. Jackson, and L. McGinnis. Usage Record Format Recommendation. In Draft Rec-UR-Usage, Global Grid Forum, Usage Record WG, [12] TB Quillinan, BC Clayton, and SN Foley. GridAdmin: Decentralising grid administration using trust management. In Parallel and Distributed Computing, Third International Symposium on/algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks, Third International Workshop on, pages , [13] A. Jøsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2): , [14] Y. Wang and Y. Zheng. Fast and Secure Append-Only Storage with Infinite Capacity. In Second IEEE International Security in Storage Workshop, pages IEEE Computer Society, [15] B.J. Overeinder and F.M.T. Brazier. Scalable Middleware Environment for Agent-Based Internet Applications. Lecture Notes in Computer Science, 3732:675, [16] D. G. A. Mobach. Agent-Based Mediated Service Negotiation. PhD thesis, Computer Science Department, Vrije Universiteit Amsterdam, May [17] D.C. Latham. Department of Defense Trusted Computer System Evaluation Criteria. Department of Defense, [18] T. B. Quillinan, M. Warnier, M. A. Oey, R. J. Timmer, and F. M. T. Brazier. Enforcing Security in the AgentScape Middleware. In Proceedings of the 1st International Workshop on Middleware Security (MidSec). ACM, December [19] G. van t Noordende, B. J. Overeinder, R. J. Timmer, F. M. T. Brazier, and A. S. Tanenbaum. Constructing secure mobile agent systems using the agent operating system. International Journal of Intelligent Information and Database Systems, 3(4), [20] A. Sahai, S. Graupner, V. Machiraju, and A. van Moorsel. Specifying and monitoring guarantees in commercial grids through SLA. In Cluster Computing and the Grid, Proceedings. CCGrid rd IEEE/ACM International Symposium on, pages , [21] G. Di Modica, V. Regalbuto, O. Tomarchio, and L. Vita. Enabling re-negotiations of SLA by extending the WS- Agreement specification. In IEEE International Conference on Services Computing, SCC 2007, pages , [22] G. Frankova, D. Malfatti, and M. Aiello. Semantics and Extensions of WS-Agreement. Journal of Software, 1(1), [23] D. Khader, J. Padget, and M. Warnier. Reactive monitoring of service level agreements. In Workshop on Service Level Agreements 2009, 2009.
A Hierarchical Self-X SLA for Cloud Computing
A Hierarchical Self-X SLA for Cloud Computing 1 Ahmad Mosallanejad, 2 Rodziah Atan, 3 Rusli Abdullah, 4 Masrah Azmi Murad *1,2,3,4 Faculty of Computer Science and Information Technology, UPM, Malaysia,
SLA Business Management Based on Key Performance Indicators
, July 4-6, 2012, London, U.K. SLA Business Management Based on Key Performance Indicators S. Al Aloussi Abstract-It is increasingly important that Service Level Agreements (SLAs) are taken into account
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Automating Cloud Service Level Agreements using Semantic Technologies
In proceedings of CLaw Workshop, IEEE International Conference on Cloud Engineering (IC2E), March 2015 Automating Cloud Service Level Agreements using Semantic Technologies Karuna Pande Joshi and Claudia
!! # % % & () +,. / 0 / % / / 1 /!02/ %! 3 % / 2 4 (, 55 0 4 6!!7 0( 1 / ) ))5 5 0) +0) 40
!! # % % & () +,. / 0 / % / / 1 /!02/ %! 3 % / 2 4 (, 55 0 4 6!!7 0( 1 / ) ))5 5 0) +0) 40 8 Service Oriented Computing and Applications manuscript No. (will be inserted by the editor) Enabling Service
Monitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
Service Level Agreement in Cloud Computing
Service Level Agreement in Cloud Computing Pankesh Patel 1,2, Ajith Ranabahu 1, Amit Sheth 1 1 Knoesis Center, Wright State University, USA {ajith,amit}@knoesis.org 2 DA-IICT, Gandhinagar, INDIA pankesh
Towards a Service Level Management Framework for Service Value Networks
Towards a Service Level Management Framework for Service Value Networks Christof Momm, Frank Schulz SAP Research CEC Karlsruhe Vincenz-Priessnitz-Str. 1 76133 Karlsruhe {christof.momm frank.schulz}@sap.com
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
Defining and Monitoring Service Level Agreements for dynamic e-business
Defining and Monitoring Service Level Agreements for dynamic e-business Alexander Keller, [email protected] Heiko Ludwig, [email protected] LISA 02 11/07/2002 Philadelphia, PA, USA 2002 IBM Corporation
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
White Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
QoS Integration in Web Services
QoS Integration in Web Services M. Tian Freie Universität Berlin, Institut für Informatik Takustr. 9, D-14195 Berlin, Germany tian @inf.fu-berlin.de Abstract: With the growing popularity of Web services,
Multifaceted Resource Management for Dealing with Heterogeneous Workloads in Virtualized Data Centers
Multifaceted Resource Management for Dealing with Heterogeneous Workloads in Virtualized Data Centers Íñigo Goiri, J. Oriol Fitó, Ferran Julià, Ramón Nou, Josep Ll. Berral, Jordi Guitart and Jordi Torres
Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments
Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Branko Radojević *, Mario Žagar ** * Croatian Academic and Research Network (CARNet), Zagreb, Croatia ** Faculty of Electrical
Towards SLA-Driven API Gateways
Towards SLA-Driven API Gateways Antonio Gámez-Díaz, Pablo Fernández-Montes, and Antonio Ruiz-Cortés University of Sevilla {agamez2,pablofm,aruiz}@us.es Abstract. As APIs are becoming popular to build Service-Based
Thesis work and research project
Thesis work and research project Hélia Pouyllau, INRIA of Rennes, Campus Beaulieu 35042 Rennes, [email protected] July 16, 2007 1 Thesis work on Distributed algorithms for endto-end QoS contract
Monitoring Performances of Quality of Service in Cloud with System of Systems
Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,
Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators
Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators Branimir Wetzstein, Dimka Karastoyanova, Frank Leymann Institute of Architecture of Application Systems, University
Monitoring Microsoft Exchange to Improve Performance and Availability
Focus on Value Monitoring Microsoft Exchange to Improve Performance and Availability With increasing growth in email traffic, the number and size of attachments, spam, and other factors, organizations
Figure 1: Illustration of service management conceptual framework
Dagstuhl Seminar on Service-Oriented Computing Session Summary Service Management Asit Dan, IBM Participants of the Core Group Luciano Baresi, Politecnico di Milano Asit Dan, IBM (Session Lead) Martin
Monitoring QNAP NAS system
Monitoring QNAP NAS system eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Proposal for a Vehicle Tracking System (VTS)
Proposal for a Vehicle Tracking System (VTS) 2 Executive Summary Intelligent Instructions is an IT product development and consulting company. At Intelligent Instructions, we focus on the needs of the
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
Sentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11
Cloud Computing (IV) s and SPD Course 19-20/05/2011 Massimo Coppola IaaS! Objectives and Challenges! & management in s Adapted from two presentations! by Massimo Coppola (CNR) and Lorenzo Blasi (HP) Italy)!
Resource Utilization of Middleware Components in Embedded Systems
Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system
Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching
1 Project Proposal Data Storage / Retrieval with Access Control, Security and Pre- Presented By: Shashank Newadkar Aditya Dev Sarvesh Sharma Advisor: Prof. Ming-Hwa Wang COEN 241 - Cloud Computing Page
Network Infrastructure Services CS848 Project
Quality of Service Guarantees for Cloud Services CS848 Project presentation by Alexey Karyakin David R. Cheriton School of Computer Science University of Waterloo March 2010 Outline 1. Performance of cloud
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
Cloud based Conceptual Framework of Service Level Agreement for University
Cloud based Conceptual Framework of Service Level Agreement for University Krunal D. Trivedi Acharya Motibhai Patel Institute of Computer Studies, Ganpat University, Mehsana, Gujarat, INDIA N J. Patel,
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Information Broker Agents in Intelligent Websites
Information Broker Agents in Intelligent Websites Catholijn M. Jonker, Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence De Boelelaan 1081a, 1081 HV Amsterdam, The Netherlands
Service Level Agreement (SLA) in Utility Computing Systems
Service Level Agreement (SLA) in Utility Computing Systems Linlin Wu and Rajkumar Buyya Cloud Computing and Distributed Systems (CLOUDS) Laboratory Department of Computer Science and Software Engineering
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Recommendations for Performance Benchmarking
Recommendations for Performance Benchmarking Shikhar Puri Abstract Performance benchmarking of applications is increasingly becoming essential before deployment. This paper covers recommendations and best
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
High Availability for Citrix XenApp
WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...
Best Practices: Extending Enterprise Applications to Mobile Devices
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
Essential NCPI Management Requirements for Next Generation Data Centers
Essential NCPI Requirements for Next Generation Data Centers By Ted Ives White Paper #14 1 Executive Summary The management of physical infrastructure in data centers can no longer be considered independently
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions. Outline. Performance oriented design
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions Slide 1 Outline Principles for performance oriented design Performance testing Performance tuning General
Improve Business Productivity and User Experience with a SanDisk Powered SQL Server 2014 In-Memory OLTP Database
WHITE PAPER Improve Business Productivity and User Experience with a SanDisk Powered SQL Server 2014 In-Memory OLTP Database 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Executive
APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS
APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS USER EXPERIENCE MANAGEMENT SERVICE LEVEL OBJECTIVE REAL USER MONITORING SYNTHETIC USER MONITORING SERVICE TEST KEY PERFORMANCE INDICATOR PERFORMANCE
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
DRAFT. 1 Proposed System. 1.1 Abstract
Doctoral Thesis Proposal A language-level approach to distributed computation with weak synchronization and its application to cloud and edge computing environments. Christopher Meiklejohn Université catholique
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
7/15/2011. Monitoring and Managing VDI. Monitoring a VDI Deployment. Veeam Monitor. Veeam Monitor
Monitoring a VDI Deployment Monitoring and Managing VDI with Veeam Aseem Anwar S.E. Channel UKI Need for real-time performance metrics Detailed alerting and fault finding tools Identification of bottlenecks
How To Manage Cloud Service Provisioning And Maintenance
Managing Cloud Service Provisioning and SLA Enforcement via Holistic Monitoring Techniques Vincent C. Emeakaroha Matrikelnr: 0027525 [email protected] Supervisor: Univ.-Prof. Dr. Schahram Dustdar
ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
Efficient Data Management Support for Virtualized Service Providers
Efficient Data Management Support for Virtualized Service Providers Íñigo Goiri, Ferran Julià and Jordi Guitart Barcelona Supercomputing Center - Technical University of Catalonia Jordi Girona 31, 834
Key Performance Indicators for Cloud Computing SLAs
Key Performance Indicators for Cloud Computing SLAs Stefan Frey, Claudia Lüthje, Christoph Reich Furtwangen University Cloud Research Lab Furtwangen, Germany {stefan.frey, claudia.luethje, christoph.reich}@hs-furtwangen.de
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Business Commitments for Dynamic E-business Solution Management: Concept and Specification
Business Commitments for Dynamic E-business Solution Management: Concept and Specification Haifei Li, Jun-jang Jeng, and Henry Chang IBM Thomas J. Watson Research Center 1101 Kitchawan Road, Route 134
IBM G-Cloud Microsoft Windows Active Directory as a Service
IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business
Quality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
Performance Testing. Slow data transfer rate may be inherent in hardware but can also result from software-related problems, such as:
Performance Testing Definition: Performance Testing Performance testing is the process of determining the speed or effectiveness of a computer, network, software program or device. This process can involve
Using Oracle Real Application Clusters (RAC)
Using Oracle Real Application Clusters (RAC) DataDirect Connect for ODBC Introduction In today's e-business on-demand environment, more companies are turning to a Grid computing infrastructure for distributed
Who needs humans to run computers? Role of Big Data and Analytics in running Tomorrow s Computers illustrated with Today s Examples
15 April 2015, COST ACROSS Workshop, Würzburg Who needs humans to run computers? Role of Big Data and Analytics in running Tomorrow s Computers illustrated with Today s Examples Maris van Sprang, 2015
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing
International Journal of Computational Engineering Research Vol, 03 Issue, 10 XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing Kamlesh Lakhwani 1, Ruchika Saini 1 1 (Dept. of Computer
Cloud Customer Architecture for Web Application Hosting, Version 2.0
Cloud Customer Architecture for Web Application Hosting, Version 2.0 Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural
Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity
Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: [email protected] Web:
Optimizing Shared Resource Contention in HPC Clusters
Optimizing Shared Resource Contention in HPC Clusters Sergey Blagodurov Simon Fraser University Alexandra Fedorova Simon Fraser University Abstract Contention for shared resources in HPC clusters occurs
Dynamic Monitoring Interval to Economize SLA Evaluation in Cloud Computing Nor Shahida Mohd Jamail, Rodziah Atan, Rusli Abdullah, Mar Yah Said
Dynamic Monitoring to Economize SLA Evaluation in Cloud Computing Nor Shahida Mohd Jamail, Rodziah Atan, Rusli Abdullah, Mar Yah Said Abstract Service level agreement (SLA) is a contract between service
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria
Monitoring IBM HMC Server. eg Enterprise v6
Monitoring IBM HMC Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
WINDOWS SERVER MONITORING
WINDOWS SERVER Server uptime, all of the time CNS Windows Server Monitoring provides organizations with the ability to monitor the health and availability of their Windows server infrastructure. Through
Globule: a Platform for Self-Replicating Web Documents
Globule: a Platform for Self-Replicating Web Documents Guillaume Pierre Maarten van Steen Vrije Universiteit, Amsterdam Internal report IR-483 January 2001 Abstract Replicating Web documents at a worldwide
CHAPTER THREE, Network Services Management Framework
CHAPTER THREE, Acronyms and Terms 3-3 List of Figures 3-4 1 Introduction 3-5 2 Architecture 3-6 2.1 Entity Identification & Addressing 3-7 2.2 Management Domain Registration and Information Service 3-7
Cloud Federations in Contrail
Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,
Managed File Transfer in Enterprise Java Applications
Managed File Transfer in Enterprise Java Applications By David Sims Flux I: Why Should You Care About Managed File Transfer? In an SOA world, bulk data transfer occurs largely by way of file transfer.
