Skip to main content

Autonomic and Trusted Computing Paradigms

  • Conference paper
Autonomic and Trusted Computing (ATC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4158))

Included in the following conference series:

Abstract

The emerging autonomic computing technology has been hailed by world-wide researchers and professionals in academia and industry. Besides four key capabilities, well known as self-CHOP, we propose an additional self-regulating capability to explicitly emphasize the policy-driven self-manageability and dynamic policy derivation and enactment. Essentially, these five capabilities, coined as Self-CHROP, define an autonomic system along with other minor properties. Trusted computing targets guaranteed secured systems. Self-protection alone does not ensure the trustworthiness in autonomic systems. The new trend is to integrate both towards trusted autonomic computing systems. This paper presents a comprehensive survey of the autonomic and trusted computing paradigms and a preliminary conceptual architecture towards trustworthy autonomic grid computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ganek, A.G., Corbi, T.A.: The dawning of the autonomic computing era. IBM Systems Journal 42 (2003)

    Google Scholar 

  2. Hariri, S., et al.: The Autonomic Computing Paradigm. Cluster Computing: The Journal of Networks, Software Tools, and Application, vol. 8. Kluwer Academic Publishers, Dordrecht (2006)

    Book  Google Scholar 

  3. Kephart, J.O., Chess, D.M.: The vision of autonomic computing. IEEE Computer 36, 41–50 (2003)

    Google Scholar 

  4. Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure, 2nd edn. Morgan Kaufmann, San Francisco (2004)

    Google Scholar 

  5. Parashar, M., Browne, J.C.: Conceptual and implementation models for the grid. Proceedings of the IEEE, Special Issue on Grid Computing 93, 653–668 (2005)

    Google Scholar 

  6. Horn, P.: Autonomic computing: Ibm’s perspective on the state of information technology. Technical report, IBM Corporation (2001)

    Google Scholar 

  7. Parashar, M., Hariri, S.: Autonomic computing: An overview. In: Banâtre, J.-P., Fradet, P., Giavitto, J.-L., Michel, O. (eds.) UPP 2004. LNCS, vol. 3566, pp. 257–269. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Salehie, M., Tahvildari, L.: Autonomic computing: Emerging trends and open problems. In: Workshop on the Design and Evolution of Autonomic Application Software, St. Louis, Missouri (2005)

    Google Scholar 

  9. (Ibm research, policy technologies) http://www.research.ibm.com/policytechnologies/

  10. Ashby, W.R.: Design for a Brain. Chapman and Hall Ltd, Boca Raton (1960)

    MATH  Google Scholar 

  11. Jann, J., Browning, L.M., Burugula, R.S.: Dynamic reconfiguration: Basic building blocks for autonomic computing on ibm pseries servers. IBM Systems Journal 42 (2003)

    Google Scholar 

  12. Liu, H., Parashar, M., Hariri, S.: A component-based programming framework for autonomic applications. In: The 1st IEEE International Conference on Autonomic Computing (ICAC 2004), New York (2004)

    Google Scholar 

  13. Parashar, M., et al.: Automate: Enabling autonomic grid applications. Cluster Computing: The Journal of Networks, Software Tools, and Applications, Special Issue on Autonomic Computing 9 (2003)

    Google Scholar 

  14. Hau, J., Lee, W., Newhouse, S.: Autonomic service adaptation using ontological annotation. In: The 4th Int. Workshop on Grid Computing (Grid 2003), Phoenix, AZ (2003)

    Google Scholar 

  15. Booth, D., Hass, H., McCabe, F., Newcomer, E., Champion, M., Ferris, C., Orchard, D.: Web services architecture, Amorphous Computing, http://www.w3.org/TR/ws-arch/

  16. Foster, I., Iamnitchi, A.: On death, taxes, and the convergence of peer-to-peer and grid computing. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Kaufman, J., Lehman, T.: Optimalgrid: The almaden smartgrid project autonomous optimization of distributed computing on the grid. Newsletter of IEEE Task Force on Cluster Computing 4 (2003)

    Google Scholar 

  18. Liu, H., Bhat, V., Parashar, M., Klasky, S.: An autonomic service architecture for self-managing grid applications. In: The 6th IEEE/ACM International Workshop on Grid Computing (Grid 2005), Seattle, WA (2005)

    Google Scholar 

  19. Pattnaik, P., Ekanadham, K., Jann, J.: Autonomic Computing and Grid, 2003 edn. Grid Computing: Making the Global Infrastructure a Reality. Wiley, Chichester (2003)

    Google Scholar 

  20. Adams, B., Brettf, P., Iyer, S., Milojicic, D., Rafaeli, S., Talwar, V.: Scalable management: Techonologies for management of large-scale, distributed systems. In: The Second International Conference on Autonomic Computing (ICAC 2005) (2005)

    Google Scholar 

  21. Gurguis, S., Zeid, A.: Towards autonomic web services: Achieving self-healing using web services. In: 2005 Workshop on Design and Evolution of Autonomic Application Software, St. Louis, Missouri (2005)

    Google Scholar 

  22. Web services description language (wsdl), http://www.w3.org/TR/wsdl

  23. Web ontology language (owl), http://www.w3.org/TR/owl-features/

  24. Recovery-oriented computing (roc) project, http://roc.cs.berkeley.edu/

  25. Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 2nd edn. Prentice-Hall, Englewood Cliffs (2003)

    Google Scholar 

  26. Serugendo, G.D.M., Karageorgos, A., Rana, O.F., Zambonelli, F.: Engineering self-organising systems. In: Di Marzo Serugendo, G., Karageorgos, A., Rana, O.F., Zambonelli, F. (eds.) ESOA 2003. LNCS (LNAI), vol. 2977, Springer, Heidelberg (2004)

    Google Scholar 

  27. Balthrop, J., Forrest, S., Newman, M.E.J., Williamson, M.M.: Technological networks and the spread of computer virues. Science 304, 527–529 (2004)

    Article  Google Scholar 

  28. Oppliger, R., Ryze, R.: Does trusted computing remedy computer security problems? Security & Privacy Magazine, IEEE 3, 16–19 (2005)

    Article  Google Scholar 

  29. Balfe, S., Lakhani, A.D., Paterson, K.G.: Trusted computing: Providing security for peer-to-peer networks. In: Peer-to-Peer Computing. Fifth IEEE International Conference, pp. 117–127 (2004)

    Google Scholar 

  30. Park, J.S., Jayaprakash, G.: Component integrity check and recovery against malicious codes. In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) (to apppear, 2006)

    Google Scholar 

  31. Amorphous computing, http://www.swiss.csail.mit.edu/projects/amorphous/

  32. Anthill, http://www.cs.unibo.it/projects/anthill/

  33. Autoadmin, http://research.microsoft.com/dmx/autoadmin/default.asp

  34. Dong, X., Hariri, S., Xue, L., Chen, H., Zhang, M., Pavuluri, S., Rao, S.: Autonomia: an autonomic computing environment. In: IEEE International Conference on Performance, Computing, and Communications (IPCC 2003) (2003)

    Google Scholar 

  35. Kinestheticsextreme, http://www.psl.cs.columbia.edu/kx/index.html

  36. Oceanstore, http://oceanstore.cs.berkeley.edu/

  37. Lohman, G.M., Lightstone, S.S.: Smart: Making db2 (more) autonomic. In: 28th International Conference on Very Large Data Bases (VLDB 2002), Hong Kong, China (2002)

    Google Scholar 

  38. Chess, D.M., Palmer, C.C., White, S.R.: Security in an autonomic computing environment. IBM Systems Journal 42 (2003)

    Google Scholar 

  39. Arbaugh, B.: Improving the tcpa specification. Computer 35, 77–79 (2002)

    Article  Google Scholar 

  40. Kelly, R.: A survey of trusted computing specifications and related technologies. Technical report, SANS Institute (2003)

    Google Scholar 

  41. Reid, J., Nieto, M.G., Dawson, E., Okamoto, E.: Privacy and trusted computing. In: Proceedings of 14th International Workshop on Database and Expert Systems Applications, 2003, pp. 383–388 (2003)

    Google Scholar 

  42. Cahill, V., et al.: Using trust for secure collaboration in uncertain environments. In: IEEE Pervasive Computing Mobile and Ubiquitous Computing, vol. 2, pp. 52–61 (2003)

    Google Scholar 

  43. Oppenheimer, D.L., Martonosi, M.R.: Performance signatures: A mechanism for intrusion detection. In: Proceedings of the 1997 IEEE Information Survivability Workshop, San Diego, CA (1997)

    Google Scholar 

  44. Part, S.J., Sandhu, R.S.: Binding identities and attributes using digitally signed certificates. In: Proceedings of 16th Annual Conference on Computer Security Application (2000)

    Google Scholar 

  45. Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The physiology of the grid, http://www.globus.org/alliance/publications/papers/ogsa.pdf

  46. The ws-resource framework, http://www.globus.org/wsrf/specs/ws-wsrf.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, X., Kang, H., Harrington, P., Thomas, J. (2006). Autonomic and Trusted Computing Paradigms. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds) Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science, vol 4158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11839569_14

Download citation

  • DOI: https://doi.org/10.1007/11839569_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38619-3

  • Online ISBN: 978-3-540-38622-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics