-------- Original-Nachricht -------- Betreff: CFP: SECON 2011 WNCM Workshop Datum: Mon, 14 Mar 2011 02:44:58 -0700 Von: Satyajayant Misra misra@cs.nmsu.edu An: Satyajayant Misra misra@cs.nmsu.edu CC: Bhaskar Krishnamachari bkrishna@usc.edu, Krishna Kant krishna.kant@intel.com, "Alva L. Couch" couch@cs.tufts.edu, "Steven Y. Ko" stevko@buffalo.edu
========================================================= Apologies if you received multiple copies =========================================================
SECON 2011 Workshop on Network Configuration Management (WNCM)
Chairs: Alva Couch (Tufts University, USA) Steve Ko (SUNY at Buffalo, USA)
The SECON workshop on Network Configuration Management brings together academic and industry researchers around the common goal of creating predictable, reliable, robust, and secure computer networks and services, in the presence of ongoing changes in requirements, hardware, and physical infrastructure. While configuration management is an implicit part of managing any kind of network, it is often left as an unnamed part of the greater task of "network management," even though statistically, an overwhelming percentage of operational issues are due to misconfiguration. In avoiding misconfiguration errors and the ensuing downtime, there is great utility in managing, manipulating, and analyzing a holistic network configuration that is the union of the configurations of its components.
The workshop has two overall missions:
a) To explore the current state of the art of "network configuration management", including strategies for describing, depicting, manipulating, verifying, and deploying configurations, along with approaches to safety, security, change management, safe reconfiguration, and related topics.
b) To seek synergy with other forms of "configuration management", including "service configuration management". Effective cloud computing, e.g., requires careful coordination between service configuration and network configuration management.
The goals of the workshop include educating the research community on the current grand challenges of network configuration management, exposing recent advances in network and service configuration management, and plotting the future of the field and next research steps.
Topics of interest to the workshop include: - all forms of network configuration management, including management of network devices, security devices (firewalls, VPN, IPSec), and authentication and authorization servers for network users. - configuration-based techniques for guaranteeing network consistency, connectivity, safety, security, reliability, robustness, and performance expectations. - languages and protocols for specifying and manipulating network configurations and network security requirements. - interfaces between network configuration management and other forms of configuration management, including system and service configuration management. - strategies for federating, delegating, and sharing configuration management responsibilities. - strategies for coping with multiple, overlapping configuration repositories. - critical analysis of current configuration management standards and practices. - safe, secure, reliable, and robust configuration deployment mechanisms. - model-based and measurement-driven analysis of network configurations. - configuration challenges for new networking paradigms including programmable network devices (e.g., via OpenFlow). - misconfiguration detection, avoidance, and remediation. - approaches to network inventory and auditing, regulatory compliance, change management, transition planning, and safe reconfiguration. - dynamic reconfiguration strategies for media delivery. - domain-specific configuration management strategies, e.g., for cloud computing, ad-hoc and sensor networks, and ubiquitous computing. - autonomic and self-* approaches to network configuration, including intelligent agent, swarm-based, bio-inspired, and convergence approaches.
The workshop will consist of selected presentations by attendees, as well as a keynote talk and a panel discussion of the grand challenges of the field.
Attendance at the workshop is by invitation only. To attend the workshop, please submit a white paper describing a current problem of network configuration management and your approach to that problem. Each white paper is limited to three pages in length, and must include (i) a brief (1/2 page or less) description about the author's background and experience in configuration management, and (ii) an important problem that the author believes that the research community as a whole should be aware of and/or approaches that show preliminary promises. All invitees will be asked to submit camera ready versions of their white papers for publication in the SECON proceedings. Selected authors of white papers will be invited to present their results at the workshop.
All white papers should be submitted through EDAS (http://edas.info/) and follow the formatting guideline for the SECON conference, which can be found at http://www.ieee-secon.org/submission.html
Paper Deadline: March 31, 2011 Notification date: April 22 Camera-ready date: May 2 With best regards, -Jay
-- Satyajayant Misra Assistant Professor Computer Science Department New Mexico State University Homepage: http://www.cs.nmsu.edu/~misra
------------------------------------------------------------------------