Secure Monitoring of Service Level Agreements

被引:5
作者
Clark, K. P. [1 ]
Warnier, M. E. [1 ]
Brazier, F. M. T. [1 ]
Quillinan, T. B. [2 ]
机构
[1] Delft Univ Technol, Fac Technol Policy & Management, Delft, Netherlands
[2] D CIS Lab, Delft, Netherlands
来源
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS | 2010年
关键词
sla; ws-agreement; distributed monitoring; reliability;
D O I
10.1109/ARES.2010.33
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Service Level Agreements (SLA) are commonly used to define terms and conditions of service provisioning. WS-Agreement1 is an SLA specification that addresses the need of both producers and consumers of services to specify and negotiate terms and conditions of access to these services. This specification has gained wide acceptance in both the Grid computing and Web Services communities. WS-Agreement includes support for both negotiating and specifying penalties that arise from violation of these terms and conditions. It does not, however, include support for monitoring these agreements to determine if any such violations have occurred and, if so, determining which parties are responsible. This paper proposes a framework and design for secure and reliable monitoring of WS-Agreement specified SLAs. Modifications to WS-Agreement are necessary for effective monitoring. These modifications are outlined, along with an implementation of the framework in the AgentScape middleware system.
引用
收藏
页码:454 / 461
页数:8
相关论文
共 23 条
[1]  
Aiello M, 2005, LECT NOTES COMPUT SC, V3826, P424
[2]  
Andrieux A., 2004, GLOBAL GRID FORUM GR
[3]  
Di Modica G, 2007, P IEEE I C SERV COMP, P248
[4]  
Frankova G., 2006, J SOFTWARE, V1
[5]  
Gymnopoulos L, 2003, LECT NOTES COMPUT SC, V2776, P100
[6]   A survey of trust and reputation systems for online service provision [J].
Josang, Audun ;
Ismail, Roslan ;
Boyd, Colin .
DECISION SUPPORT SYSTEMS, 2007, 43 (02) :618-644
[7]   The WSLA Framework: Specifying and Monitoring Service Level Agreements for Web Services [J].
Keller, Alexander ;
Ludwig, Heiko .
Journal of Network and Systems Management, 2003, 11 (01) :57-81
[8]  
KHADER D, 2009, WORKSH SERV LEV AGR
[9]  
Latham D.C., 1986, Department of Defense Trusted Computer System Evaluation Criteria
[10]  
LAU F, 2000, 2000 IEEE INT C SYST, V3