Autonomic and Trusted Computing Paradigms

  • Xiaolin Li
  • Hui Kang
  • Patrick Harrington
  • Johnson Thomas
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4158)


The emerging autonomic computing technology has been hailed by world-wide researchers and professionals in academia and industry. Besides four key capabilities, well known as self-CHOP, we propose an additional self-regulating capability to explicitly emphasize the policy-driven self-manageability and dynamic policy derivation and enactment. Essentially, these five capabilities, coined as Self-CHROP, define an autonomic system along with other minor properties. Trusted computing targets guaranteed secured systems. Self-protection alone does not ensure the trustworthiness in autonomic systems. The new trend is to integrate both towards trusted autonomic computing systems. This paper presents a comprehensive survey of the autonomic and trusted computing paradigms and a preliminary conceptual architecture towards trustworthy autonomic grid computing.


Autonomic System Trust Platform Module Malicious Code Autonomic Computing Trust Computing Group 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ganek, A.G., Corbi, T.A.: The dawning of the autonomic computing era. IBM Systems Journal 42 (2003)Google Scholar
  2. 2.
    Hariri, S., et al.: The Autonomic Computing Paradigm. Cluster Computing: The Journal of Networks, Software Tools, and Application, vol. 8. Kluwer Academic Publishers, Dordrecht (2006)CrossRefGoogle Scholar
  3. 3.
    Kephart, J.O., Chess, D.M.: The vision of autonomic computing. IEEE Computer 36, 41–50 (2003)Google Scholar
  4. 4.
    Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure, 2nd edn. Morgan Kaufmann, San Francisco (2004)Google Scholar
  5. 5.
    Parashar, M., Browne, J.C.: Conceptual and implementation models for the grid. Proceedings of the IEEE, Special Issue on Grid Computing 93, 653–668 (2005)Google Scholar
  6. 6.
    Horn, P.: Autonomic computing: Ibm’s perspective on the state of information technology. Technical report, IBM Corporation (2001)Google Scholar
  7. 7.
    Parashar, M., Hariri, S.: Autonomic computing: An overview. In: Banâtre, J.-P., Fradet, P., Giavitto, J.-L., Michel, O. (eds.) UPP 2004. LNCS, vol. 3566, pp. 257–269. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Salehie, M., Tahvildari, L.: Autonomic computing: Emerging trends and open problems. In: Workshop on the Design and Evolution of Autonomic Application Software, St. Louis, Missouri (2005)Google Scholar
  9. 9.
    (Ibm research, policy technologies)
  10. 10.
    Ashby, W.R.: Design for a Brain. Chapman and Hall Ltd, Boca Raton (1960)MATHGoogle Scholar
  11. 11.
    Jann, J., Browning, L.M., Burugula, R.S.: Dynamic reconfiguration: Basic building blocks for autonomic computing on ibm pseries servers. IBM Systems Journal 42 (2003)Google Scholar
  12. 12.
    Liu, H., Parashar, M., Hariri, S.: A component-based programming framework for autonomic applications. In: The 1st IEEE International Conference on Autonomic Computing (ICAC 2004), New York (2004)Google Scholar
  13. 13.
    Parashar, M., et al.: Automate: Enabling autonomic grid applications. Cluster Computing: The Journal of Networks, Software Tools, and Applications, Special Issue on Autonomic Computing 9 (2003)Google Scholar
  14. 14.
    Hau, J., Lee, W., Newhouse, S.: Autonomic service adaptation using ontological annotation. In: The 4th Int. Workshop on Grid Computing (Grid 2003), Phoenix, AZ (2003)Google Scholar
  15. 15.
    Booth, D., Hass, H., McCabe, F., Newcomer, E., Champion, M., Ferris, C., Orchard, D.: Web services architecture, Amorphous Computing,
  16. 16.
    Foster, I., Iamnitchi, A.: On death, taxes, and the convergence of peer-to-peer and grid computing. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, Springer, Heidelberg (2003)CrossRefGoogle Scholar
  17. 17.
    Kaufman, J., Lehman, T.: Optimalgrid: The almaden smartgrid project autonomous optimization of distributed computing on the grid. Newsletter of IEEE Task Force on Cluster Computing 4 (2003)Google Scholar
  18. 18.
    Liu, H., Bhat, V., Parashar, M., Klasky, S.: An autonomic service architecture for self-managing grid applications. In: The 6th IEEE/ACM International Workshop on Grid Computing (Grid 2005), Seattle, WA (2005)Google Scholar
  19. 19.
    Pattnaik, P., Ekanadham, K., Jann, J.: Autonomic Computing and Grid, 2003 edn. Grid Computing: Making the Global Infrastructure a Reality. Wiley, Chichester (2003)Google Scholar
  20. 20.
    Adams, B., Brettf, P., Iyer, S., Milojicic, D., Rafaeli, S., Talwar, V.: Scalable management: Techonologies for management of large-scale, distributed systems. In: The Second International Conference on Autonomic Computing (ICAC 2005) (2005)Google Scholar
  21. 21.
    Gurguis, S., Zeid, A.: Towards autonomic web services: Achieving self-healing using web services. In: 2005 Workshop on Design and Evolution of Autonomic Application Software, St. Louis, Missouri (2005)Google Scholar
  22. 22.
    Web services description language (wsdl),
  23. 23.
    Web ontology language (owl),
  24. 24.
    Recovery-oriented computing (roc) project,
  25. 25.
    Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 2nd edn. Prentice-Hall, Englewood Cliffs (2003)Google Scholar
  26. 26.
    Serugendo, G.D.M., Karageorgos, A., Rana, O.F., Zambonelli, F.: Engineering self-organising systems. In: Di Marzo Serugendo, G., Karageorgos, A., Rana, O.F., Zambonelli, F. (eds.) ESOA 2003. LNCS (LNAI), vol. 2977, Springer, Heidelberg (2004)Google Scholar
  27. 27.
    Balthrop, J., Forrest, S., Newman, M.E.J., Williamson, M.M.: Technological networks and the spread of computer virues. Science 304, 527–529 (2004)CrossRefGoogle Scholar
  28. 28.
    Oppliger, R., Ryze, R.: Does trusted computing remedy computer security problems? Security & Privacy Magazine, IEEE 3, 16–19 (2005)CrossRefGoogle Scholar
  29. 29.
    Balfe, S., Lakhani, A.D., Paterson, K.G.: Trusted computing: Providing security for peer-to-peer networks. In: Peer-to-Peer Computing. Fifth IEEE International Conference, pp. 117–127 (2004)Google Scholar
  30. 30.
    Park, J.S., Jayaprakash, G.: Component integrity check and recovery against malicious codes. In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) (to apppear, 2006)Google Scholar
  31. 31.
  32. 32.
  33. 33.
  34. 34.
    Dong, X., Hariri, S., Xue, L., Chen, H., Zhang, M., Pavuluri, S., Rao, S.: Autonomia: an autonomic computing environment. In: IEEE International Conference on Performance, Computing, and Communications (IPCC 2003) (2003)Google Scholar
  35. 35.
  36. 36.
  37. 37.
    Lohman, G.M., Lightstone, S.S.: Smart: Making db2 (more) autonomic. In: 28th International Conference on Very Large Data Bases (VLDB 2002), Hong Kong, China (2002)Google Scholar
  38. 38.
    Chess, D.M., Palmer, C.C., White, S.R.: Security in an autonomic computing environment. IBM Systems Journal 42 (2003)Google Scholar
  39. 39.
    Arbaugh, B.: Improving the tcpa specification. Computer 35, 77–79 (2002)CrossRefGoogle Scholar
  40. 40.
    Kelly, R.: A survey of trusted computing specifications and related technologies. Technical report, SANS Institute (2003)Google Scholar
  41. 41.
    Reid, J., Nieto, M.G., Dawson, E., Okamoto, E.: Privacy and trusted computing. In: Proceedings of 14th International Workshop on Database and Expert Systems Applications, 2003, pp. 383–388 (2003)Google Scholar
  42. 42.
    Cahill, V., et al.: Using trust for secure collaboration in uncertain environments. In: IEEE Pervasive Computing Mobile and Ubiquitous Computing, vol. 2, pp. 52–61 (2003)Google Scholar
  43. 43.
    Oppenheimer, D.L., Martonosi, M.R.: Performance signatures: A mechanism for intrusion detection. In: Proceedings of the 1997 IEEE Information Survivability Workshop, San Diego, CA (1997)Google Scholar
  44. 44.
    Part, S.J., Sandhu, R.S.: Binding identities and attributes using digitally signed certificates. In: Proceedings of 16th Annual Conference on Computer Security Application (2000)Google Scholar
  45. 45.
    Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The physiology of the grid,
  46. 46.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Xiaolin Li
    • 1
  • Hui Kang
    • 1
  • Patrick Harrington
    • 1
  • Johnson Thomas
    • 1
  1. 1.Computer Science DepartmentOklahoma State UniversityStillwaterUSA

Personalised recommendations