Nothing Special   »   [go: up one dir, main page]

skip to main content
article

A control theory perspective on configuration management and Cfengine

Published: 01 April 2006 Publication History

Abstract

Cfengine is an autonomous agent for the configuration of Unix-like operating systems. It works by implementing a hybrid feedback loop, with both disrcete and continuous elements.

References

[1]
{1} M. Burgess, "Evaluation of cfengine's immunity model of system maintenance," Proceedings of the 2nd international system administration and networking conference (SANE2000), 2000.
[2]
{2} M. Burgess, "Cfengine's immunity model of evolving configuration management," Science of Computer Programming, vol. 51, pp. 197, 2004.
[3]
{3} M. Burgess, "Computer immunology," Proceedings of the Twelth Systems Administration Conference (LISA XII) (USENIX Association: Berkeley, CA), p. 283, 1998.
[4]
{4} P.D'haeseleer, S. Forrest, and P. Helman., "An immunological approach to change detection: algorithms, analysis, and implications," In Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy (1996).
[5]
{5} A. Somayaji, S. Hofmeyr, and S. Forrest., "Principles of a computer immune system," New Security Paradigms Workshop, ACM, vol. September 1997, pp. 75-82.
[6]
{6} J.L. Hellerstein, Y. Diao, S. Parekh, and D.M. Tilbury, Feedback Control of Computing Systems, IEEE Press/Wiley Interscience, 2004.
[7]
{7} M. Burgess, "System administration as communication over a noisy channel," Proceedings of the 3nd international system administration and networking conference (SANE2002), p. 36, 2002.
[8]
{8} C.E. Shannon and W. Weaver, The mathematical theory of communication , University of Illinois Press, Urbana, 1949.
[9]
{9} M. Burgess, "On the theory of system administration," Science of Computer Programming, vol. 49, pp. 1, 2003.
[10]
{10} M. Burgess, "Probabilistic anomaly detection in distributed computer networks," Science of Computer Programming, p. (To appear), 2005.
[11]
{11} H. Lewis and C. Papadimitriou, Elements of the Theory of Computation, Second edition, Prentice Hall, New York, 1997.
[12]
{12} M. Burgess, Analytical Network and System Administration -- Managing Human-Computer Systems, J. Wiley & Sons, Chichester, 2004.
[13]
{13} N. Damiannnou, A.K. Bandara, M. Sloman, and E.C. Lupu, Handbook of Network and System Administration, chapter A Survey of Policy Specification Approaches, Elsevier, 2007 (to appear).
[14]
{14} H.L. Lee and S. Nahmias, Logistics of Production and Inventory , vol. 4 of Handbooks in Operations Research and Management Science, chapter Single Product, Single Location Models, Elsevier, 1993.
[15]
{15} A. Couch and Y. Sun, "On the algebraic structure of convergence," LNCS, Proc. 14th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, Heidelberg, Germany, pp. 28-40, 2003.
[16]
{16} A. Couch and Y. Sun, "On observed reproducibility in network configuration management," Science of Computer Programming , vol. 53, pp. 215-253, 2004.
[17]
{17} M. Burgess, "Two dimensional time-series for anomaly detection and regulation in adaptive systems," IFIP/IEEE 13th International Workshop on Distributed Systems: Operations and Management (DSOM 2002), vol. LNCS 2506, pp. 169, 2002.
[18]
{18} G.R. Grimmett and D.R. Stirzaker, Probability and random processes (3rd edition), Oxford scientific publications, Oxford, 2001.
[19]
{19} M. Burgess, H. Haugerud, T. Reitan, and S. Straumsnes, "Measuring host normality," ACM Transactions on Computing Systems , vol. 20, pp. 125-160, 2001.

Cited By

View all
  • (2015)Configuration Management and Infrastructure Monitoring Using CFEngine and Icinga for Real-time Heterogeneous Data Taking EnvironmentJournal of Physics: Conference Series10.1088/1742-6596/664/5/052020664:5(052020)Online publication date: 23-Dec-2015
  • (2006)Forecasting Unstable Policy EnforcementProceedings of the International Conference on Systems and Networks Communication10.1109/ICSNC.2006.40Online publication date: 29-Oct-2006

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGBED Review
ACM SIGBED Review  Volume 3, Issue 2
April 2006
28 pages
EISSN:1551-3688
DOI:10.1145/1143489
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 2006
Published in SIGBED Volume 3, Issue 2

Check for updates

Author Tags

  1. configuration management
  2. control theory

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Configuration Management and Infrastructure Monitoring Using CFEngine and Icinga for Real-time Heterogeneous Data Taking EnvironmentJournal of Physics: Conference Series10.1088/1742-6596/664/5/052020664:5(052020)Online publication date: 23-Dec-2015
  • (2006)Forecasting Unstable Policy EnforcementProceedings of the International Conference on Systems and Networks Communication10.1109/ICSNC.2006.40Online publication date: 29-Oct-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media