This Article 
 Bibliographic References 
 Add to: 
Automatic (Re)Configuration of IT Systems for Dependability
April-June 2011 (vol. 4 no. 2)
pp. 110-124
Marco Domenico Aime, Politecnico di Torino, Torino
Antonio Lioy, Politecnico di Torino, Torino
Paolo C. Pomi, Politecnico di Torino, Torino
This paper proposes an approach for automatic, service-driven configuration of networked IT systems focused on achieving a specific set of dependability properties. An automatic process starts from a service-level model to generate dependable configurations for the managed IT infrastructure. The process uses an ontology to model the services and their dependability requirements, the IT infrastructure, the available dependability mechanisms, and their configuration. Configurations are computed by model transformation rules which implement various dependability strategies with different degrees of requirements' satisfaction. Alternative configurations are generated to allow reconfiguring the system taking into account incidents or other operational conditions. A sample system hosting services based on web technologies is used as a proof-of-concept to illustrate application and extent of our approach.

[1] ISO Standard, ISO 27005—Security Techniques—Information Security Risk Management, ISO, 2005.
[2] M. Sloman, "Policy Driven Management for Distributed Systems," Network and Systems Management, vol. 2, no. 4, pp. 333-360, 1994.
[3] H.-G. Hegering, S. Abeck, and R. Wies, "A Corporate Operation Framework for Network Service Management," IEEE Comm. Magazine, vol. 34, no. 1, pp. 62-68, Jan. 1996.
[4] J. Strassner, Policy-Based Network Management: Solutions for the Next Generation. Morgan Kaufmann, 2003.
[5] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Trans. Dependable Secure Computing, vol. 1, no. 1, pp. 11-33, Jan.-Mar. 2004.
[6] A.K. Bandara, E.C. Lupu, J. Moffett, and A. Russo, "A Goal-Based Approach to Policy Refinement," Proc. Fifth IEEE Int'l Workshop Policies for Distributed Systems and Networks, pp. 229-239, June 2004.
[7] ISO Standard, ISO 27001—Security Techniques—Information Security Risk Management Systems—Requirements, ISO, 2005.
[8] F.L. Crespo, M.A.A. Gómez, J. Candau, and J.A. Mañas, "MAGERIT—Version 2, Methodology for Information Systems Risk Analysis and Management, Book I—The Method," Ministerio de Administraciones Públicas, June 2006.
[9] BS 7799-1, Information Technology—Code of Practice for Information Security Management, British Standards Inst., 2000.
[10] W. Stallings, Cryptography and Network Security, fourth ed., Prentice Hall, Nov. 2005.
[11] A. Avizienis and J.P.J. Kelly, "Fault Tolerance by Design Diversity: Concepts and Experiments," Computer, vol. 17, no. 8, pp. 67-80, Aug. 1984.
[12] V. Cardellini, E. Casalicchio, M. Colajanni, and P.S. Yu, "The State of the Art in Locally Distributed Web-Server Systems," ACM Computing Surveys, vol. 34, no. 2, pp. 263-311, 2002.
[13] M. Howard and S. Lipner, The Security Development Lifecycle. Microsoft, May 2006.
[14] K. Sullivan, J.C. Knight, X. Du, and S. Geist, "Information Survivability Control Systems," Proc. Int'l Conf. Software Eng. (ICSE '99), pp. 184-192, May 1999.
[15] G. Stoneburner, "Underlying Technical Models for Information Technology Security," NIST Special Publication 800-33, Dec. 2001.
[16] R.J. Anderson, Security Engineering—A Guide to Building Dependable Distributed Systems. Wiley, 2001.
[17] C. Johnson, S. Quinn, K. Scarfone, and D. Waltermire, "The Technical Specification for the Security Content Automation Protocol (SCAP)," NIST Special Publication 800-126 (Draft), July 2009.
[18] J. Juerjens, Secure Systems Development with UML. Springer, 2003.
[19] OMG, "UML Profile for Modeling QoS and FT Characteristics and Mechanisms, v1.1," technical report, Apr. 2008.
[20] J.P. de Albuquerque, H. Krumm, and P.L. de Geus, "Policy Modeling and Refinement for Network Security Systems," Proc. Sixth IEEE Int'l Workshop Policies for Distributed Systems and Networks, pp. 24-33, June 2005.
[21] J.A. Mañas, "PILAR—Risk Analysis and Management Tool," http:/, 2009.
[22] SSF Research Network, "SSF Network Models (SSFNet)," http:/, 2011.
[23] X. Ou, S. Govindavajhala, and A.W. Appel, "MulVAL: A Logic-Based Network Security Analyzer," Proc. 14th USENIX Security Symp., pp. 113-128, 2005.
[24] B. Motik, B. Parsia, and P. Patel-Schneider, "Owl 2 Web Ontology Language—Structural Specification and Functional-Style Syntax," W3C Candidate Recommendation, June 2009.
[25] A. Barker, C.D. Walton, and D. Robertson, "Choreographing Web Services," IEEE Trans. Service Computing, vol. 2, no. 2, pp. 152-166, Apr.-June 2009.
[26] N. Kavantzas, D. Burdett, G. Ritzinger, T. Fletcher, Y. Lafon, and C. Barreto, Web Services Choreography Description Language, W3C Candidate Recommendation, Nov. 2005.
[27] D. Jordan and J. Evdemon, "Web Services Business Process Execution Language Version 2.0," OASIS Standard, Apr. 2007.
[28] S. Harris, CISSP Exam Guide, third ed., pp. 415-586. McGraw-Hill, 2005.
[29] The DMTF Technical Committee, "The Common Information Model (CIM),", 2008.
[30] POSITIF Consortium, "The POSITIF System Description Language (P-SDL)," http:/, 2007.
[31] E.C. Bailey, Maximum RPM, Red Hat,, 2000.
[32] Nat'l Inst. of Standards and Technologies, "National Vulnerability Database," http:/, 2009.
[33] T. Weis, A. Ulbrich, and K. Geihs, "Model Metamorphosis," IEEE Software, vol. 20, no. 5, pp. 46-51, Sept.-Oct. 2003.
[34] D. Nicol, W. Sanders, and K. Trivedi, "Model-Based Evaluation: From Dependability to Security," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 1, pp. 48-65, Jan.-Mar. 2004.
[35] B. Moore, E. Ellesson, J. Strassner, and A. Westerinen, Policy Core Information Model—Version 1, IETF RFC 3060, Feb. 2001.
[36] A. Keller, A. Brown, and J. Hellerstein, "A Configuration Complexity Model and Its Application to a Change Management System," IEEE Trans. Network and Service Management, vol. 4, no. 1, pp. 13-27, June 2007.
[37] C. Haley, R. Laney, J. Moffett, and B. Nuseibeh, "Security Requirements Engineering: A Framework for Representation and Analysis," IEEE Trans. Software Eng., vol. 34, no. 1, pp. 133-153, Jan./Feb. 2008.
[38] S. Fenz and A. Ekelhart, "Formalizing Information Security Knowledge," Proc. Fourth Int'l Symp. Information, Computer, and Comm. Security (ASIACCS '09), pp. 183-194, 2009.
[39] T. Eilam, M. Kalantar, A. Konstantinou, G. Pacifici, J. Pershing, and A. Agrawal, "Managing the Configuration Complexity of Distributed Applications in Internet Data Centers," IEEE Comm. Magazine, vol. 44, no. 3, pp. 166-177, Mar. 2006.
[40] F. Satoh, Y. Nakamura, N.K. Mukhi, M. Tatsubori, and K. Ono, "Methodology and Tools for End-to-End SOA Security Configurations," Proc. IEEE Congress on Services—Part I, pp. 307-314, 2008.
[41] P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, "Requirements Engineering Meets Trust Management—Model, Methodology, and Reasoning," Proc. Second Int'l Conf. Trust Management (iTrust '04), pp. 176-190, 2004.
[42] E.A. Strunk and J. Knight, "Dependability through Assured Reconfiguration in Embedded System Software," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 3, pp. 172-187, July-Sept. 2006.

Index Terms:
Security enablement in services systems, infrastructure management in services, security and privacy protection.
Marco Domenico Aime, Antonio Lioy, Paolo C. Pomi, "Automatic (Re)Configuration of IT Systems for Dependability," IEEE Transactions on Services Computing, vol. 4, no. 2, pp. 110-124, April-June 2011, doi:10.1109/TSC.2010.31
Usage of this product signifies your acceptance of the Terms of Use.