Vitalian A. Danciu

Learn More
Management disciplines beyond systems and network management require higher-order, enriched management information. To address this requirement, we outline a generic architecture that uses a specification language for the composition of management data to provide an integrated means of management information aggregation. The monitoring of resources is a(More)
—The need for collaborative service provisioning across different providers' domains is being addressed by Circles of Trust (CoT), whose members adhere to the same policies and expose the same interfaces for collaboration. Today's CoT specifications require a high initial effort on behalf of enrolling members, thus obviating quick or even ad hoc setup of(More)
Process-oriented IT management has gained more and more significance due to the need to specify and control IT infrastructures and services. An indicator for this circumstance is the success of the IT Infrastructure Library and the enhanced Telecom Operations Map. A process-oriented view allows administrators to specify management tasks and to decompose(More)
— Providers, operators and customers understand that the concept of an IT service offers a beneficial abstraction from actual IT operations, effectively encapsulating the provisioning of the service. Yet, IT services are in fact provided by installations composed of very large numbers of managed elements. Hence, management of a service implies the(More)
Many services provided over the Internet, like voice over IP and video on demand, increase the demand for assurances concerning the quality of the underlying network. A score of techniques for assurance of quality of service (QoS) have been devised for use within administrative domains. However, when paths cross the border of autonomous systems, assurance(More)
— The advent of host virtualization has increased the number of management attribute classes and instances. At the same time an additional degree of heterogeneity has been introduced , due to different hypervisor products coupled with multiple guest operating systems. These changes obviate provisionary methods of harmonising management information. We(More)
—In this paper we analyse the suitability of computing clouds, i.e. large-scale virtualized infrastructures for high-performance applications that are normally executed on spe-cialised clusters or supercomputers. We classify such applications according to their requirements on different system components and present measurements of virtualization software(More)
1 Motivation The explosive proliferation of systems virtualisation supports a more adaptive delivery of IT services. In the area of security management, however, virtu-alisation carries beneficial as well as detrimental implications. Fig. 1 shows the sources of requirements on security management: they originate either from technical sources, in a bottom-up(More)