Advertisement

Configuration Management

  • Dinesh Chandra Verma
Chapter

A computer system consists of many components including hardware devices such as servers, routers, switches, and firewalls and software systems such as the operating system and applications. Each such component allows the operator to change its settings to customize its behavior.

Keywords

Configuration Parameter Configuration File Configuration Management High Level Abstraction Configuration Information 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    R. Shomaly, A model based approach to network, service and customer management systems: Object oriented technology, BT Technology Journal, 11(3): 123–130, November 1993.Google Scholar
  2. 2.
    T. Eilam et al., Managing the configuration complexity of distributed applications in internet data centers, IEEE Communications Magazine, March 2006.Google Scholar
  3. 3.
    J. Strassner, Policy-based Network Management: Solutions for Next Generation, Morgan Kaufmann, August 2003.Google Scholar
  4. 4.
    S. Jajodia et al., A unified framework for enforcing multiple access control policies. In: Proceedings of the ACM International SIGMOD Conference on Management of Data, May 1997.Google Scholar
  5. 5.
    D. Agrawal, K-W. Lee, and J. Lobo, Policy-based management of networked computing systems. IEEE Communications, 43(10):69–75, 2005.CrossRefGoogle Scholar
  6. 6.
    UK Office of Government Commerce, The Introduction to the ITIL Service LifeCycle Book, August 2007.Google Scholar
  7. 7.
    R. Talpade, and J. Singh, Compliance assessment of IP networks: A necessity today, Information Systems Control Journal, 4: 51–53, April 2007.Google Scholar
  8. 8.
    D. Agrawal et al., Policy based validation of SAN configuration, Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, June 2004.Google Scholar
  9. 9.
    Y. Li et al., Modeling and Verifying Configuration in Service Deployment, IEEE International Conference on Services Computing, Chicago, IL, September 2006.Google Scholar
  10. 10.
    W. De Pauw and J. Vlissides, Visualizing object-oriented programs with Jinsight, Lecture Notes in Computer Science, In: Lecture Notes on Computer Science, ECOOP’98 Workshop Reader, July 1998.Google Scholar
  11. 11.
    O. Crameri et al., Staged deployment in mirage, an integrated software upgrade testing and distribution system. ACM SIGOPS Operating System Review, 41(6): 221–236, December 2007.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.IBM T.J. Watson Research CenterYorktown HeightsUSA

Personalised recommendations