Security Considerations and Models for Service Creation in Premium IP Networks

  • Michael Smirnov
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2052)


Service creation for premium IP networks facilitates customized and configured network services dynamically at run time by establishing recursive group communication (event notification) channels between involved service components residing in various network entities. Security, as a feature of danger discovery appears in our service creation design as additional benefit. Same principles of group communication guide us to identify danger patterns in distributed system behaviour and to propagate these patterns to relevant entities for event correlation and reaction.


Service Level Agreement Server Member Event Notification Service Group Protocol Expression 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Baker, F.: Internet Directions. Keynote presentation at QofIS’2000, available at URL
  2. 2.
    Regli, William C. National Institute of Standards and Technology, IEEE Internet Computing 1997 January–February 1997 (Vol. 1,No. 1)Google Scholar
  3. 3.
    Modaressi, A.R., Mohan, S.: Control and Management in Next-Generation Networks: Challenges and Opportunities. IEEE Communications Magazine (October, 2000) 94–102Google Scholar
  4. 4.
    Smirnov, M.: QoS ad hoc interworking: dynamic adaptation of differentiated services boundaries. Lecture Notes in Computer Science, Springer, vol. 1938. 186–195Google Scholar
  5. 5.
    Romano, S.P., Esposito, M., Ventre, G., Cortese, G.: Service Level Agreements for Premium IP Networks. Work in progress, Internet draft, draft-cadenus-sla-00.txt, (November, 2000) available at URL
  6. 6.
    Smirnov, M.: Service Creation in SLA Networks. Work in progress, Internet draft, draftcadenus-slan-screation-00.txt, November, 2000, available at URL
  7. 7.
    Kuthan, J., Rosenberg, J.: Middlebox Communication: Framework and Requirements. IETF work in progress, Internet Draft draft-kuthan-midcom-framework-00.txt, November 2000, available with relevant resources at URL
  8. 8.
    Clark, D.D., Blumenthal, M.S.: “Rethinking the design of the Internet: The end to end arguments vs. the brave new world“ — workshop ”The Policy implications of End to end”, Stanford University, December, 2000, available at URL
  9. 9.
    Ousterhout, J.K., Levy, J.Y., Welch, B.B.: The Safe Tcl Security Model. Sun Microsystems, Technical Report TR-97-60 (March, 1977) 19Google Scholar
  10. 10.
    Sifakis, J.: Use of Petri Nets for Performance Evaluation. Acta Cybernetica, Vol. 4,No 2. (1978) 185–202MathSciNetGoogle Scholar
  11. 11.
    Smirnov, M.: IGMP Performance Model. GMD FOKUS, 1996, Technical Report TRF-96-03-01, 22 pp., available from URL
  12. 12.
    Gold, R.: “SONATA: Self-Organizing and Adaptive Active Networking”, Stockholm Active Networks Day, 28th August 2000, Available at URL
  13. 13.
    Matzinger, P.: A quotation from the interview given to C. Dreifus, N.Y. Times, available at URL
  14. 14.
    Dunkin, M.A.: A Maverick Researcher Bucks the Establishment. Available at URL
  15. 15.
    Smirnov, M., Sanneck, H., Witaszek, D.: Programmable Group Communication Services over IP Multicast. Proceedings of the IEEE Conference on High Performance Switching and Routing, June 2000, Heidelberg, IEEE, 281–290Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Michael Smirnov
    • 1
  1. 1.GMD FOKUSGlobal Networking, Kaiserin-Augusta-AlleeBerlinGermany

Personalised recommendations