Management Patterns for Network Resilience: Design and Verification of Policy Configurations View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014-05-14

AUTHORS

Alberto Schaeffer-Filho , Paul Smith , Andreas Mauthe , David Hutchison

ABSTRACT

Computer and communication networks are becoming increasingly critical in supporting business, leisure and daily life in general. Thus, there is a compelling need for resilience to be a key property of networks. The approach we present in this paper is intended to enable the specification of management patterns that describe the dynamic intrusion tolerant behaviour of resilient networks. A management pattern describes a policy-based collaboration between a set of resilience mechanisms used to address a specific type of challenge. Much of the existing work on security patterns has focused only on the static defence aspect of a network. However, dynamic behaviour adds a great deal of complexity to network management, thus making the specification of patterns for this activity very desirable. More... »

PAGES

85-95

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-04447-7_7

DOI

http://dx.doi.org/10.1007/978-3-319-04447-7_7

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1039747978


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Brazil", 
          "id": "http://www.grid.ac/institutes/grid.8532.c", 
          "name": [
            "Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Brazil"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Schaeffer-Filho", 
        "givenName": "Alberto", 
        "id": "sg:person.016661106103.79", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016661106103.79"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Safety and Security Department, AIT Austrian Institute of Technology, Seibersdorf, Austria", 
          "id": "http://www.grid.ac/institutes/grid.4332.6", 
          "name": [
            "Safety and Security Department, AIT Austrian Institute of Technology, Seibersdorf, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Smith", 
        "givenName": "Paul", 
        "id": "sg:person.015112647531.58", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112647531.58"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computing and Communications, Lancaster University, Lancaster, United Kingdom", 
          "id": "http://www.grid.ac/institutes/grid.9835.7", 
          "name": [
            "School of Computing and Communications, Lancaster University, Lancaster, United Kingdom"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mauthe", 
        "givenName": "Andreas", 
        "id": "sg:person.014014117643.53", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014014117643.53"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computing and Communications, Lancaster University, Lancaster, United Kingdom", 
          "id": "http://www.grid.ac/institutes/grid.9835.7", 
          "name": [
            "School of Computing and Communications, Lancaster University, Lancaster, United Kingdom"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hutchison", 
        "givenName": "David", 
        "id": "sg:person.012636622347.55", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012636622347.55"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014-05-14", 
    "datePublishedReg": "2014-05-14", 
    "description": "Computer and communication networks are becoming increasingly critical in supporting business, leisure and daily life in general. Thus, there is a compelling need for resilience to be a key property of networks. The approach we present in this paper is intended to enable the specification of management patterns that describe the dynamic intrusion tolerant behaviour of resilient networks. A management pattern describes a policy-based collaboration between a set of resilience mechanisms used to address a specific type of challenge. Much of the existing work on security patterns has focused only on the static defence aspect of a network. However, dynamic behaviour adds a great deal of complexity to network management, thus making the specification of patterns for this activity very desirable.", 
    "editor": [
      {
        "familyName": "Blackwell", 
        "givenName": "Clive", 
        "type": "Person"
      }, 
      {
        "familyName": "Zhu", 
        "givenName": "Hong", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-04447-7_7", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-04446-0", 
        "978-3-319-04447-7"
      ], 
      "name": "Cyberpatterns", 
      "type": "Book"
    }, 
    "keywords": [
      "specification of patterns", 
      "network management", 
      "security patterns", 
      "communication networks", 
      "policy configurations", 
      "resilient networks", 
      "network resilience", 
      "network", 
      "management patterns", 
      "resilience mechanisms", 
      "defense aspects", 
      "specification", 
      "daily life", 
      "tolerant behavior", 
      "key properties", 
      "computer", 
      "resilience", 
      "verification", 
      "compelling need", 
      "complexity", 
      "great deal", 
      "business", 
      "leisure", 
      "set", 
      "specific types", 
      "dynamic behavior", 
      "collaboration", 
      "challenges", 
      "design", 
      "work", 
      "need", 
      "life", 
      "management", 
      "deal", 
      "aspects", 
      "patterns", 
      "configuration", 
      "behavior", 
      "paper", 
      "approach", 
      "types", 
      "mechanism", 
      "activity", 
      "properties"
    ], 
    "name": "Management Patterns for Network Resilience: Design and Verification of Policy Configurations", 
    "pagination": "85-95", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1039747978"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-04447-7_7"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-04447-7_7", 
      "https://app.dimensions.ai/details/publication/pub.1039747978"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-06-01T22:27", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/chapter/chapter_115.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-04447-7_7"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-04447-7_7'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-04447-7_7'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-04447-7_7'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-04447-7_7'


 

This table displays all metadata directly associated to this object as RDF triples.

136 TRIPLES      23 PREDICATES      69 URIs      62 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-04447-7_7 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N7b890cd0d5c54e5db8d53676c914ae32
4 schema:datePublished 2014-05-14
5 schema:datePublishedReg 2014-05-14
6 schema:description Computer and communication networks are becoming increasingly critical in supporting business, leisure and daily life in general. Thus, there is a compelling need for resilience to be a key property of networks. The approach we present in this paper is intended to enable the specification of management patterns that describe the dynamic intrusion tolerant behaviour of resilient networks. A management pattern describes a policy-based collaboration between a set of resilience mechanisms used to address a specific type of challenge. Much of the existing work on security patterns has focused only on the static defence aspect of a network. However, dynamic behaviour adds a great deal of complexity to network management, thus making the specification of patterns for this activity very desirable.
7 schema:editor N7de876f772824b17b8bd63badf5cc177
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N3999deb38acf4c4c80a6ca1a1c75658f
12 schema:keywords activity
13 approach
14 aspects
15 behavior
16 business
17 challenges
18 collaboration
19 communication networks
20 compelling need
21 complexity
22 computer
23 configuration
24 daily life
25 deal
26 defense aspects
27 design
28 dynamic behavior
29 great deal
30 key properties
31 leisure
32 life
33 management
34 management patterns
35 mechanism
36 need
37 network
38 network management
39 network resilience
40 paper
41 patterns
42 policy configurations
43 properties
44 resilience
45 resilience mechanisms
46 resilient networks
47 security patterns
48 set
49 specific types
50 specification
51 specification of patterns
52 tolerant behavior
53 types
54 verification
55 work
56 schema:name Management Patterns for Network Resilience: Design and Verification of Policy Configurations
57 schema:pagination 85-95
58 schema:productId N021800c42023468880ff38169407494a
59 N125ab4e996134ccdaaef73765844ca2f
60 schema:publisher N2238160a17c5432694a9bc842686a774
61 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039747978
62 https://doi.org/10.1007/978-3-319-04447-7_7
63 schema:sdDatePublished 2022-06-01T22:27
64 schema:sdLicense https://scigraph.springernature.com/explorer/license/
65 schema:sdPublisher N8d8ab0292197495eb10851cc4a0c0eda
66 schema:url https://doi.org/10.1007/978-3-319-04447-7_7
67 sgo:license sg:explorer/license/
68 sgo:sdDataset chapters
69 rdf:type schema:Chapter
70 N021800c42023468880ff38169407494a schema:name doi
71 schema:value 10.1007/978-3-319-04447-7_7
72 rdf:type schema:PropertyValue
73 N125ab4e996134ccdaaef73765844ca2f schema:name dimensions_id
74 schema:value pub.1039747978
75 rdf:type schema:PropertyValue
76 N2238160a17c5432694a9bc842686a774 schema:name Springer Nature
77 rdf:type schema:Organisation
78 N332e1efdbe6440e4af956e24ffd39b76 rdf:first N669f203f756a4b7bac3b704f22958a21
79 rdf:rest rdf:nil
80 N37d30514e345421d88fc8ecc62e79b4b schema:familyName Blackwell
81 schema:givenName Clive
82 rdf:type schema:Person
83 N3999deb38acf4c4c80a6ca1a1c75658f schema:isbn 978-3-319-04446-0
84 978-3-319-04447-7
85 schema:name Cyberpatterns
86 rdf:type schema:Book
87 N669f203f756a4b7bac3b704f22958a21 schema:familyName Zhu
88 schema:givenName Hong
89 rdf:type schema:Person
90 N6cc3400b72b04fc69b104e909867b925 rdf:first sg:person.015112647531.58
91 rdf:rest Ne54e49eff52a4723bbc0b2e875ab4974
92 N7b890cd0d5c54e5db8d53676c914ae32 rdf:first sg:person.016661106103.79
93 rdf:rest N6cc3400b72b04fc69b104e909867b925
94 N7d1b1ab6b7f84471976e353a57116c20 rdf:first sg:person.012636622347.55
95 rdf:rest rdf:nil
96 N7de876f772824b17b8bd63badf5cc177 rdf:first N37d30514e345421d88fc8ecc62e79b4b
97 rdf:rest N332e1efdbe6440e4af956e24ffd39b76
98 N8d8ab0292197495eb10851cc4a0c0eda schema:name Springer Nature - SN SciGraph project
99 rdf:type schema:Organization
100 Ne54e49eff52a4723bbc0b2e875ab4974 rdf:first sg:person.014014117643.53
101 rdf:rest N7d1b1ab6b7f84471976e353a57116c20
102 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
103 schema:name Information and Computing Sciences
104 rdf:type schema:DefinedTerm
105 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
106 schema:name Information Systems
107 rdf:type schema:DefinedTerm
108 sg:person.012636622347.55 schema:affiliation grid-institutes:grid.9835.7
109 schema:familyName Hutchison
110 schema:givenName David
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012636622347.55
112 rdf:type schema:Person
113 sg:person.014014117643.53 schema:affiliation grid-institutes:grid.9835.7
114 schema:familyName Mauthe
115 schema:givenName Andreas
116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014014117643.53
117 rdf:type schema:Person
118 sg:person.015112647531.58 schema:affiliation grid-institutes:grid.4332.6
119 schema:familyName Smith
120 schema:givenName Paul
121 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112647531.58
122 rdf:type schema:Person
123 sg:person.016661106103.79 schema:affiliation grid-institutes:grid.8532.c
124 schema:familyName Schaeffer-Filho
125 schema:givenName Alberto
126 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016661106103.79
127 rdf:type schema:Person
128 grid-institutes:grid.4332.6 schema:alternateName Safety and Security Department, AIT Austrian Institute of Technology, Seibersdorf, Austria
129 schema:name Safety and Security Department, AIT Austrian Institute of Technology, Seibersdorf, Austria
130 rdf:type schema:Organization
131 grid-institutes:grid.8532.c schema:alternateName Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Brazil
132 schema:name Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Brazil
133 rdf:type schema:Organization
134 grid-institutes:grid.9835.7 schema:alternateName School of Computing and Communications, Lancaster University, Lancaster, United Kingdom
135 schema:name School of Computing and Communications, Lancaster University, Lancaster, United Kingdom
136 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...