[AIMS2008]

2nd International Conference on

Autonomous Infrastructure, Management and Security

Resilient Networks and Services

1st-3rd July 2008, Jacobs University Bremen, Germany

Technical Program

The following table shows the planned overall schedule of the AIMS 2008 event. Further details will be available once the papers have been selected.

Tuesday Wednesday Thursday
09:00 Welcome
09:15 Keynote
10:45 Coffee Break
11:00 Session #1
12:00 Lunch Break
14:00 Session #2
15:30 Coffee Break
16:00 Tutorial #1/#2
17:30 End of Day 1
19:00 Excursion
09:00 Session #3
10:30 Coffee Break
10:45 Tutorial #3/#4
12:15 Lunch Break
14:00 PhD Tutorial
14:40 PhD Session #1
15:40 Coffee Break
16:00 PhD Session #2
17:40 Poster Session
18:00 End of Day 2
18:30 Social Event
09:00 Session #4
10:30 Coffee Break
10:45 Session #5
11:45 Closing
12:00 Lunch Break
14:00 Tutorial #5/#6
15:30 End of Day 3

On Monday before the AIMS 2008 conference, there will be an EMANICS internal meeting. On Thursday/Friday after the AIMS 2008 conference, there will be an EMANICS workshop on the topic "Vision and Management of the Future Internet".


Keynote

  • Robust Network Operations: Adaptation and Control
    Simon Leinen, SWITCH, Switzerland
  • In his keynote, Simon Leinen, who is working at the Swiss Education and Research Network (SWITCH), will talk about their particular (and sometimes peculiar) network engineering and management practices, including things that didn't work so well, and about management tools that they would find useful. more >>


Session #1: Network Traffic Engineering and Analysis

Chair: Aiko Pras, University of Twente, The Netherlands

  • RLTE: Reinforcement Learning for Traffic-Engineering
    Erik Einhorn, Andreas Mitschele-Thiel (Germany)
  • SNMP Trace Analysis Definitions
    Gijs van den Broek, Juergen Schoenwaelder, Aiko Pras, Matus Harvan (The Netherlands, Germany, Switzerland)

Session #2: Autonomy, Incentives and Trust

Chair: Burkhard Stiller, University of Zurich, Switzerland

  • A Role-based Infrastructure for the Management of Dynamic Communities
    Alberto Schaeffer-Filho, Emil Lupu, Morris Sloman, Sye-Loong Keoh, Jorge Lobo, Seraphin Calo (U.K., U.S.A.)
  • PSH: A Private and Shared History-based Incentive Mechanism
    Thomas Bocek, Wang Kun, Fabio Victora Hecht, David Hausheer, Burkhard Stiller (Switzerland, China)
  • Cooperation under Scarcity: The Sharer's Dilemma
    Michael Rogers, Saleem Bhatti (U.K.)

Session #3: Overlays and Virtualization

Chair: Thomas Fuhrmann, University of Karlsruhe, Germany

  • A Distributed Certification System for Structured P2P Networks
    Francois Lesueur, Ludovic Me, Valerie Viet Triem Tong (France)
  • N2N: A Layer Two Peer-to-Peer VPN
    Luca Deri, Richard Andrews (Italy, Australia)
  • Secure Sharing of an ICT Infrastructure Through Vinci
    Fabrizio Baiardi, Daniele Sgandurra (Italy)

Session #4: Load Balancing and Fault Recovery

Chair: Alva Couch, Tufts University, USA

  • Statistical Behaviors of Distributed Transition Planning
    Ning Wu, Alva Couch (U.S.A.)
  • Service Load Balancing with Autonomic Servers: Reversing the Decision Making Process
    Remi Badonnel, Mark Burgess (France, Norway)
  • An Architecture for Supporting Network Fault Recovery Management
    Feng Liu, Antonis M. Hadjiantonis, Ha Manh Tran, Mina Amin (Germany, U.K.)

Session #5: Convergent Behavior

Chair: James Won-ki Hong, POSTECH, Korea

  • Dynamic Consistency Analysis for Convergent Operators
    Alva Couch, Marc Chiarini (U.S.A.)
  • A Theory of Closure Operators
    Alva Couch, Marc Chiarini (U.S.A.)

Tutorial #1 (Tuesday 16:00-17:30)

  • Next Generation Network: Networking Virtualization
    Prof. Omar Cherkaoui, University of Quebec at Montreal, Canada
  • This tutorial provides an introduction to the discipline of networking virtualization (NV). Previously, Network Virtualization has consisted in deploying network services (VLAN, VPN, etc). One of the emerging concepts is the OS level of virtualization which consists in injecting multiple instances of routers on the same network infrastructure. Network Virtualization is one of the main concepts on which the next generation network will be based. Many large research projects (GENI, VINI, VIOLIN) are built on network virtualization. more >>

Tutorial #2 (Tuesday 16:00-17:30)

  • Traffic Measurement: Methods, Challenges and Experience
    Prof. James Won-ki Hong, POSTECH, Korea
  • The high dynamics of the Internet traffic is making it more difficult to measure, analyze and understand. However, there is an increased need for having a good understanding of the Internet traffic for various applications. This tutorial will provide various methods used in measuring Internet and enterprise network traffic. An overview of the related research activities and research challenges in traffic measurement and analysis will also be provided. I will then present the R&D experience on traffic measurement and analysis by POSTECH over the past 10 years. more >>

Tutorial #3 (Wednesday 10:45-12:15)

  • ISO/IEC 20000: Striving for Resilient IT Services
    Thomas Schaaf, MNM Team, University of Munich, Germany
  • Today, IT-driven enterprises all around the world are gearing up for Service Management using diverse process frameworks like the IT Infrastructure Library (ITIL) - methods of good practice for service delivery that were developed by the British government from the early 1990s and have grown into a ubiquitous code of practice. Since the release of ISO/IEC 20000 in 2006, an international standard for IT Service Management is available. And for the first time, well-defined requirements and recommendations give guidance and advice in the field of managing of IT services. More and more organizations are striving for a third party certification as to ISO/IEC 20000 in order to give evidence on effective and efficient IT operations to their customers and stakeholders. more >>

Tutorial #4 (Wednesday 10:45-12:15)

  • Promise Theory - A Practical Introduction
    Prof. Mark Burgess, University College Oslo, Norway
  • Most models of computer systems describe information structures, algorithms or trace event chains in a low level manner. Promise theory, on the other hand, takes a higher level view that captures relationships between key system components. This tutorial offers an introduction to the main concepts of promises and how to use them to model system behaviour as steady state equilibrium behaviour. more >>

Tutorial #5 (Thursday 14:00-15:30)

  • High-speed Passive Packet Capture and Filtering
    Luca Deri, University of Pisa, Italy
  • The ntop project was started ten years ago with the goal of developing an open-source application for passive traffic monitoring. The first released application, named ntop, was designed for passive LAN traffic analysis and accessible through a web interface for immediate user access. Over time ntop has been adapted to WAN traffic monitoring and today it can be effectively used for passive packet capture and analysis, as well as collector for popular protocols such as NetFlow/IPFIX and sFlow. more >>

Tutorial #6 (Thursday 14:00-15:30)

  • Grid Resource Management
    Prof. Joern Altmann, International University, Germany
  • Although Grid computing has been a topic of research for many years, a truly commercial, sustainable Grid does not exist yet. One of the reason is the kind of Grid resource management being used. The aim of this tutorial is to address this issue by analyzing the current state of the art in Grid architectures and proposing a new architecture, which is based on an economic-enhanced Grid resource management. more >>


PhD Tutorial (Wednesday 14:00-14:40)

  • Where to Publish?
    Aiko Pras, University of Twente, The Netherlands

    In this short tutorial we stress the importance of publishing your research results at the right venues. First we identify the workshops, conferences, magazines and journals in the area of network and systems management. We will discuss the quality of some of our conferences and journals, as perceived by experts in our field, as well as people outside our area. For this we present some acceptance rates, acceptance procedures, conference and journal rankings, as well as impact factors. Although some Ph.D. students may believe that a main goal is to publish as many papers as possible, this tutorial will stress that there are other important metrics, such as the number of citations, that are used to judge the quality of your research. We will discuss one metric that is currently popular, called the H-factor, and explain how to measure your own H-factor, using for example the Web of Science (instead of Google's scholar). The tutorial concludes with explaining the importance of publishing in journals indexed in Thomson's Science Citation Index (SCI), or alternatives like Scopus. It also explains CPP, JCS and FCS factors.


PhD Session #1 (Wednesday 14:40-15:40)

  • Entwined Influences of Users' Behaviour and QoS: A Multi-model Approach
    Julien Siebert, Vincent Chevrier, Laurent Ciarletta (France)
  • Business-driven Management of Policies in DiffServ Networks
    Antonio Astorga, Javier Rubio-Loyola (Spain)
  • Token-based Payment in Dynamic SAML-based Federations
    David J. Lutz, Burkhard Stiller (Germany, Switzerland)

PhD Session #2 (Wednesday 16:00-17:40)

  • Conceptual Integration of Flow-based and Packet-based Network Intrusion Detection
    Gregor Schaffrath, Burkhard Stiller (Switzerland)
  • Towards Resilient Community Wireless Mesh Networks
    Sara Bury, Nicholas J. P. Race (U.K.)
  • Resource Management of Disruption Tolerant Networks
    Iyad Tumar, Juergen Schoenwaelder (Germany)
  • Design of an IP Flow Record Query Language
    Vladislav Marinov, Juergen Schoenwaelder (Germany)
  • Enabling Next Generation Peer-to-peer Services
    Fabio Victora Hecht, Burkhard Stiller (Switzerland)

Posters

  • An Overview of Sampling on Traffic Characterization
    Tiago Fioreze, Anna Sperotto, Ramin Sadre, Aiko Pras (The Netherlands)
  • Session Resumption for the Secure Shell Protocol
    Mihai Cretu, Elchin Asgarov, Juergen Schoenwaelder (Germany)
  • Crawling Bug Tracking Systems
    Georgi Chulkov, Ha Manh Tran, Juergen Schoenwaelder (Germany)
  • A New Approach for Managing Traffic of Overlay Applications of the SmoothIT Project
    Juan Pedro Fernandez-Palacios Gimenez, Maria Angeles Callejo Rodriguez, Hasan Hasan, Tobias Hossfeld, Dirk Staehle, Zoran Despotovic, Wolfgang Kellerer, Burkhard Stiller (Spain, Germany, Switzerland)

The eight PhD workshop papers will be presented as posters in addition to the 4 poster papers listed above.

Sponsored by the EC IST-EMANICS Network of Excellence (#26854)