Autonomic Computing: Freedom or Threat?
نویسندگان
چکیده
No longer is the question whether autonomic computing will gain general acceptance but when. Experts like Alva Couch expect autonomic computing to be widely used within 10 years [1]. When it does become mainstream, how will autonomics change system administration and corporations, and will the change be for better or worse? The answer depends on how well we anticipate the limitations of what autonomic systems are suited to do, whether we can collectively address the vulnerabilities of autonomic approaches as we draw upon the advantages, and whether administrators, companies, partners, and users are prepared for the transition. This article presents some design considerations to address the first two issues and some suggested survival techniques for the third.
منابع مشابه
An Autonomic Service Oriented Architecture in Computational Engineering Framework
Service Oriented Architecture (SOA) technology enables composition of large and complex computational units out of the available atomic services. Implementation of SOA brings about challenges which include service discovery, service interaction, service composition, robustness, quality of service, security, etc. These challenges are mainly due to the dynamic nature of SOA. SOAmay often need to ...
متن کاملAn Autonomic Service Oriented Architecture in Computational Engineering Framework
Service Oriented Architecture (SOA) technology enables composition of large and complex computational units out of the available atomic services. Implementation of SOA brings about challenges which include service discovery, service interaction, service composition, robustness, quality of service, security, etc. These challenges are mainly due to the dynamic nature of SOA. SOAmay often need to ...
متن کاملUsing Stochastic Situation Calculus to Formalise Danger Signals for Autonomic Computing
In order to maintain and promote a robust and dependable system it is required that agents, representing system services, are allowed some autonomy in their operations. It is also required that the system be as open as possible, without compromising security, to allow the introduction of novel procedures and performance improving changes or additions. This paper uses concepts from Artificial Im...
متن کاملManagement of security policy configuration using a Semantic Threat Graph approach
Managing the configuration of heterogeneous enterprise security mechanisms is a complex task. The effectiveness of a configuration may be constrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management based approach, whereby knowledge about the effe...
متن کاملImmuno-inspired autonomic system for cyber defense
The biological immune system is an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its arti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007