Skip to main content

Security Considerations and Models for Service Creation in Premium IP Networks

  • Conference paper
  • First Online:
Information Assurance in Computer Networks (MMM-ACNS 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2052))

Abstract

Service creation for premium IP networks facilitates customized and configured network services dynamically at run time by establishing recursive group communication (event notification) channels between involved service components residing in various network entities. Security, as a feature of danger discovery appears in our service creation design as additional benefit. Same principles of group communication guide us to identify danger patterns in distributed system behaviour and to propagate these patterns to relevant entities for event correlation and reaction.

Research outlined in this paper is partially funded by the IST project CADENUS IST-1999-11017 “Creation and Deployment of End-User Services in Premium IP Networks” http:// www.cadenus.org/

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baker, F.: Internet Directions. Keynote presentation at QofIS’2000, available at URL http://www.fokus.gmd.de/events/qofis2000/html/programme.html

  2. Regli, William C. National Institute of Standards and Technology, IEEE Internet Computing 1997 January–February 1997 (Vol. 1,No. 1)

    Google Scholar 

  3. Modaressi, A.R., Mohan, S.: Control and Management in Next-Generation Networks: Challenges and Opportunities. IEEE Communications Magazine (October, 2000) 94–102

    Google Scholar 

  4. Smirnov, M.: QoS ad hoc interworking: dynamic adaptation of differentiated services boundaries. Lecture Notes in Computer Science, Springer, vol. 1938. 186–195

    Google Scholar 

  5. Romano, S.P., Esposito, M., Ventre, G., Cortese, G.: Service Level Agreements for Premium IP Networks. Work in progress, Internet draft, draft-cadenus-sla-00.txt, (November, 2000) available at URL http://www.cadenus.org/papers/

  6. Smirnov, M.: Service Creation in SLA Networks. Work in progress, Internet draft, draftcadenus-slan-screation-00.txt, November, 2000, available at URL http://www.cadenus.org/papers/

  7. Kuthan, J., Rosenberg, J.: Middlebox Communication: Framework and Requirements. IETF work in progress, Internet Draft draft-kuthan-midcom-framework-00.txt, November 2000, available with relevant resources at URL http://www.fokus.gmd.de/research/cc/glone/employees/jiri.kuthan/private/fcp/

  8. Clark, D.D., Blumenthal, M.S.: “Rethinking the design of the Internet: The end to end arguments vs. the brave new world“ — workshop ”The Policy implications of End to end”, Stanford University, December, 2000, available at URL http://www.law.stanford.edu/e2e/papers.html

  9. Ousterhout, J.K., Levy, J.Y., Welch, B.B.: The Safe Tcl Security Model. Sun Microsystems, Technical Report TR-97-60 (March, 1977) 19

    Google Scholar 

  10. Sifakis, J.: Use of Petri Nets for Performance Evaluation. Acta Cybernetica, Vol. 4,No 2. (1978) 185–202

    MathSciNet  Google Scholar 

  11. Smirnov, M.: IGMP Performance Model. GMD FOKUS, 1996, Technical Report TRF-96-03-01, 22 pp., available from URL http://www.fokus.gmd.de/glone/publ/trf-96-03-01.pdf

  12. Gold, R.: “SONATA: Self-Organizing and Adaptive Active Networking”, Stockholm Active Networks Day, 28th August 2000, Available at URL http://www.fokus.gmd.de/glone/employees/richard.gold/private/publications.html

  13. Matzinger, P.: A quotation from the interview given to C. Dreifus, N.Y. Times, available at URL http://www.nytimes.com/library/national/science/061698sci-immune-theory.html

  14. Dunkin, M.A.: A Maverick Researcher Bucks the Establishment. Available at URL http://www.arthritis.org/ReadArthritisToday/1999_archives/1999_03_04polly.asp

  15. Smirnov, M., Sanneck, H., Witaszek, D.: Programmable Group Communication Services over IP Multicast. Proceedings of the IEEE Conference on High Performance Switching and Routing, June 2000, Heidelberg, IEEE, 281–290

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Smirnov, M. (2001). Security Considerations and Models for Service Creation in Premium IP Networks. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds) Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture Notes in Computer Science, vol 2052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45116-1_8

Download citation

  • DOI: https://doi.org/10.1007/3-540-45116-1_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42103-0

  • Online ISBN: 978-3-540-45116-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics