The Evolving Philosophers Problem: Dynamic Change Management
IEEE Transactions on Software Engineering
Principles of a computer immune system
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Swarm intelligence: from natural to artificial systems
Swarm intelligence: from natural to artificial systems
Principles of Network and System Administration
Principles of Network and System Administration
Two Dimensional Time-Series for Anomaly Detection and Regulation in Adaptive Systems
DSOM '02 Proceedings of the 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Management Technologies for E-Commerce and E-Business Applications
Optimizing Quality of Service Using Fuzzy Control
DSOM '02 Proceedings of the 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Management Technologies for E-Commerce and E-Business Applications
LISA '98 Proceedings of the 12th Conference on Systems Administration
Maintaining Node Consistency in the Face of Dynamic Change
ICCDS '96 Proceedings of the 3rd International Conference on Configurable Distributed Systems
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
On the theory of system administration
Science of Computer Programming
It's Elementary, Dear Watson: Applying Logic Programming To Convergent System Management Processes
LISA '99 Proceedings of the 13th USENIX conference on System administration
The Maelstrom: Network Service Debugging via "Ineffective Procedures"
LISA '01 Proceedings of the 15th USENIX conference on System administration
Why Order Matters: Turing Equivalence in Automated Systems Administration
LISA '02 Proceedings of the 16th USENIX conference on System administration
Automated response using system-call delays
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
A control theory perspective on configuration management and Cfengine
ACM SIGBED Review
A risk analysis of disk backup or repository maintenance
Science of Computer Programming
Modeling Change Without Breaking Promises
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
Dynamics of Resource Closure Operators
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
Knowledge Management and Promises
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
Management without (Detailed) Models
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Combining Learned and Highly-Reactive Management
MACE '09 Proceedings of the 4th IEEE International Workshop on Modelling Autonomic Communications Environments
Testable system administration
Communications of the ACM
Testable System Administration
Queue - System Administration
An approach to understanding policy based on autonomy and voluntary cooperation
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Hi-index | 0.02 |
The immunity model, as used in the GNU cfengine project, is a distributed framework for performing policy conformant system administration, used on hundreds of thousands of Unix-like and Windows systems. This paper describes the idealized approach to policy-guided maintenance, that is approximated by cfengine, building on the notion of 'convergent' operations, i.e. those that reach stable equilibrium. Agents gravitate towards a policy-determined configurations, through the repeated application of unintelligent 'anti-body' operations or discrete, coded counter-measures. The distributed agents turn passive discovery of state into active strategy for 'curing' systems of policy transgressions.