首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Computing multiple diagnoses in large devices using Bayesian networks 利用贝叶斯网络计算大型设备中的多重诊断
V. Delcroix, M. Maalej, S. Piechowiak
We propose a method of diagnosis that tackles multiple diagnoses of reliable devices with large numbers of components. We use prior component failure probability and compute posterior probabilities of diagnoses. Bayesian networks allow to take into account the structure of the device but also knowledge about good and bad working order of each individual components and their reliability. The general reliability of such systems means that no list of breakdown scenarios can be exploited to guide the diagnosis. We exploit a list of observed values that reveal a failure of the system in order to find the states of the system that best explain these observations. The large number of components and the possibility of multiple failures mean that lots of sets of failing components can explain the observations. In order to rank them, we propose an algorithm to compute the best diagnoses and an approximation of their posterior probabilities.
我们提出了一种诊断方法,该方法可以处理具有大量组件的可靠设备的多重诊断。我们使用先验部件失效概率和计算诊断的后验概率。贝叶斯网络不仅考虑到设备的结构,而且还考虑到每个单独组件的良好和不良工作状态及其可靠性。这种系统的一般可靠性意味着不能利用故障场景列表来指导诊断。我们利用一系列揭示系统故障的观测值,以找到最能解释这些观测值的系统状态。大量的组件和多重故障的可能性意味着大量失效组件集可以解释观测结果。为了对它们进行排序,我们提出了一种算法来计算最佳诊断和它们的后验概率的近似值。
{"title":"Computing multiple diagnoses in large devices using Bayesian networks","authors":"V. Delcroix, M. Maalej, S. Piechowiak","doi":"10.1109/ARES.2006.43","DOIUrl":"https://doi.org/10.1109/ARES.2006.43","url":null,"abstract":"We propose a method of diagnosis that tackles multiple diagnoses of reliable devices with large numbers of components. We use prior component failure probability and compute posterior probabilities of diagnoses. Bayesian networks allow to take into account the structure of the device but also knowledge about good and bad working order of each individual components and their reliability. The general reliability of such systems means that no list of breakdown scenarios can be exploited to guide the diagnosis. We exploit a list of observed values that reveal a failure of the system in order to find the states of the system that best explain these observations. The large number of components and the possibility of multiple failures mean that lots of sets of failing components can explain the observations. In order to rank them, we propose an algorithm to compute the best diagnoses and an approximation of their posterior probabilities.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123040929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Making Web services dependable 使Web服务可靠
L. Moser, P. Melliar-Smith, Wenbing Zhao
Web services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web services are dependable, and can satisfy their clients' requests when the clients need them is a real challenge because, typically, a business activity involves multiple Web services and a Web service involves multiple components, each of which must be dependable. In this paper, we describe fault tolerance techniques, including replication, checkpointing, and message logging, in addition to reliable messaging and transaction management for which Web services specifications exist. We discuss how those techniques can be applied to the components of the Web services involved in the business activities to render them dependable.
Web服务为通过Internet在企业内部和企业之间集成和自动化软件应用程序提供了巨大的希望。然而,确保Web服务是可靠的,并且能够在客户需要它们时满足客户的请求是一项真正的挑战,因为通常,业务活动涉及多个Web服务,而Web服务涉及多个组件,每个组件都必须是可靠的。在本文中,我们描述了容错技术,包括复制、检查点和消息日志,以及存在Web服务规范的可靠消息传递和事务管理。我们将讨论如何将这些技术应用于业务活动中涉及的Web服务组件,以使其可靠。
{"title":"Making Web services dependable","authors":"L. Moser, P. Melliar-Smith, Wenbing Zhao","doi":"10.1109/ARES.2006.79","DOIUrl":"https://doi.org/10.1109/ARES.2006.79","url":null,"abstract":"Web services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web services are dependable, and can satisfy their clients' requests when the clients need them is a real challenge because, typically, a business activity involves multiple Web services and a Web service involves multiple components, each of which must be dependable. In this paper, we describe fault tolerance techniques, including replication, checkpointing, and message logging, in addition to reliable messaging and transaction management for which Web services specifications exist. We discuss how those techniques can be applied to the components of the Web services involved in the business activities to render them dependable.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124730007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A practical framework for dynamically immunizing software security vulnerabilities 动态免疫软件安全漏洞的实用框架
Zhiqiang Lin, Bing Mao, Li Xie
Many security attacks are caused by software vulnerabilities such as buffer overflow. How to eliminate or mitigate these vulnerabilities, in particular with unstoppable software, is a great challenge for security researchers and practitioners. In this paper, we propose a practical framework to immunize software security vulnerabilities on the fly. We achieve the vulnerability immunization by using a security antibody, which can be implemented independently from the protected software and is used to defend against vulnerability exploitation attacks. And we employ in-core patching technique to attach the antibody quietly into running process, and hence we neither need to re-compile nor re-execute the protected software. The effectiveness of our framework depends on the effectiveness of the antibody that is implemented by redirecting flaw functions into secure ones. As a proof of concept, we have built a prototype and applied it to prevent the software from buffer overflow attacks. Preliminary experimental results show that our framework is practical and efficient for the dynamical immunization of software security vulnerabilities.
很多安全攻击都是由软件漏洞引起的,比如缓冲区溢出。如何消除或减轻这些漏洞,特别是不可阻挡的软件,是安全研究人员和从业人员面临的巨大挑战。在本文中,我们提出了一个实用的框架来动态免疫软件安全漏洞。我们通过使用安全抗体来实现漏洞免疫,该安全抗体可以独立于被保护的软件实现,用于防御漏洞利用攻击。我们采用核内补丁技术,将抗体悄无声息地附着到运行过程中,不需要重新编译和重新执行受保护的软件。我们的框架的有效性取决于抗体的有效性,该抗体是通过将缺陷功能重定向到安全功能来实现的。作为概念验证,我们建立了一个原型,并应用它来防止软件受到缓冲区溢出攻击。初步实验结果表明,该框架对于软件安全漏洞的动态免疫是实用有效的。
{"title":"A practical framework for dynamically immunizing software security vulnerabilities","authors":"Zhiqiang Lin, Bing Mao, Li Xie","doi":"10.1109/ARES.2006.11","DOIUrl":"https://doi.org/10.1109/ARES.2006.11","url":null,"abstract":"Many security attacks are caused by software vulnerabilities such as buffer overflow. How to eliminate or mitigate these vulnerabilities, in particular with unstoppable software, is a great challenge for security researchers and practitioners. In this paper, we propose a practical framework to immunize software security vulnerabilities on the fly. We achieve the vulnerability immunization by using a security antibody, which can be implemented independently from the protected software and is used to defend against vulnerability exploitation attacks. And we employ in-core patching technique to attach the antibody quietly into running process, and hence we neither need to re-compile nor re-execute the protected software. The effectiveness of our framework depends on the effectiveness of the antibody that is implemented by redirecting flaw functions into secure ones. As a proof of concept, we have built a prototype and applied it to prevent the software from buffer overflow attacks. Preliminary experimental results show that our framework is practical and efficient for the dynamical immunization of software security vulnerabilities.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"479 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126166015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A framework of survivability model for wireless sensor network 一种无线传感器网络生存能力模型框架
Dong Seong Kim, K. Shazzad, Jong Sou Park
Wireless sensor network (WSN) should be capable of fulfilling its mission, in a timely manner, in the middle of intrusion, attacks, accidents and failures in hostile environment. However, current security mechanisms for WSN are able to satisfy confidentiality, integrity, and authentication properties using cipher algorithms, key management schemes, and so on, but they are not enough to meet above requirements. Therefore, we propose a framework of survivability model for WSN. Our model adopts software rejuvenation methodology, which is applicable in security field and also less expensive. We model and analyze each cluster of a hierarchical cluster based WSN as a stochastic process based on semi-Markov process (SMP) and discrete-time Markov chain (DTMC). The model analysis indicates the feasibility of our approach.
无线传感器网络(WSN)应该能够在入侵、攻击、事故和故障的恶劣环境中及时完成其任务。然而,目前的WSN安全机制能够通过密码算法、密钥管理方案等满足机密性、完整性和认证特性,但还不足以满足上述需求。为此,我们提出了一种无线传感器网络的生存性模型框架。我们的模型采用软件年轻化方法,适用于安全领域,而且成本较低。我们将分层聚类WSN的每个聚类作为基于半马尔可夫过程(SMP)和离散马尔可夫链(DTMC)的随机过程进行建模和分析。模型分析表明了该方法的可行性。
{"title":"A framework of survivability model for wireless sensor network","authors":"Dong Seong Kim, K. Shazzad, Jong Sou Park","doi":"10.1109/ARES.2006.6","DOIUrl":"https://doi.org/10.1109/ARES.2006.6","url":null,"abstract":"Wireless sensor network (WSN) should be capable of fulfilling its mission, in a timely manner, in the middle of intrusion, attacks, accidents and failures in hostile environment. However, current security mechanisms for WSN are able to satisfy confidentiality, integrity, and authentication properties using cipher algorithms, key management schemes, and so on, but they are not enough to meet above requirements. Therefore, we propose a framework of survivability model for WSN. Our model adopts software rejuvenation methodology, which is applicable in security field and also less expensive. We model and analyze each cluster of a hierarchical cluster based WSN as a stochastic process based on semi-Markov process (SMP) and discrete-time Markov chain (DTMC). The model analysis indicates the feasibility of our approach.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115195929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Towards an integrated conceptual model of security and dependability 迈向安全性和可靠性的综合概念模型
E. Jonsson
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer system. There exist a large number of models of security and dependability with various definitions and terminology. This position paper suggests a high-level conceptual model that is aimed to give a novel approach to the area. The model defines security and dependability characteristics in terms of a system's interaction with its environment via the system boundaries and attempts to clarify the relation between malicious environmental influence, e.g. attacks, and the service delivered by the system. The model is intended to help reasoning about security and dependability and to provide an overall means for finding and applying fundamental defense mechanisms. Since the model is high-level and conceptual it must be interpreted into each specific sub-area of security/dependability to be practically useful.
现在人们普遍认为,安全性和可靠性在很大程度上代表了一个整体元概念的两个不同方面,反映了我们对计算机系统的信任。存在大量具有各种定义和术语的安全性和可靠性模型。本立场文件提出了一个高层次的概念模型,旨在为该领域提供一种新颖的方法。该模型根据系统通过系统边界与其环境的交互来定义安全性和可靠性特征,并试图澄清恶意环境影响(例如攻击)与系统提供的服务之间的关系。该模型旨在帮助对安全性和可靠性进行推理,并为发现和应用基本防御机制提供总体方法。由于该模型是高级的和概念性的,因此必须将其解释为安全性/可靠性的每个特定子领域,以便实际使用。
{"title":"Towards an integrated conceptual model of security and dependability","authors":"E. Jonsson","doi":"10.1109/ARES.2006.138","DOIUrl":"https://doi.org/10.1109/ARES.2006.138","url":null,"abstract":"It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer system. There exist a large number of models of security and dependability with various definitions and terminology. This position paper suggests a high-level conceptual model that is aimed to give a novel approach to the area. The model defines security and dependability characteristics in terms of a system's interaction with its environment via the system boundaries and attempts to clarify the relation between malicious environmental influence, e.g. attacks, and the service delivered by the system. The model is intended to help reasoning about security and dependability and to provide an overall means for finding and applying fundamental defense mechanisms. Since the model is high-level and conceptual it must be interpreted into each specific sub-area of security/dependability to be practically useful.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122842835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Guidelines for biometric recognition in wireless system for payment confirmation 无线支付确认系统生物识别指引
Leon Grabensek, Sasa Divjak
Biometric systems are widely used today in different interesting applications. Even though the hotel industry has some instances of biometric room access systems, hotel payment confirmation has yet to be implemented. To find how such a biometric system should be designed, we theoretically analyze different models of biometric systems. Fingerprint systems used alone and with gender filtering, face recognition or an identification element are discussed. The architecture of a biometric system for transaction confirmation in hotels is then proposed based on the analytical findings. We have found that a fingerprint system with an identification element is the most appropriate for hotel payment confirmation. Based on the given results a general design of a device for wireless biometric transaction confirmation is also proposed.
如今,生物识别系统被广泛应用于各种有趣的应用中。尽管酒店行业已经有了一些生物识别房间进入系统的例子,但酒店付款确认尚未实施。为了找到这样一个生物识别系统应该如何设计,我们从理论上分析了不同的生物识别系统模型。指纹系统单独使用和与性别过滤,人脸识别或识别元素进行了讨论。然后根据分析结果提出了酒店交易确认生物识别系统的架构。我们发现带有识别元素的指纹系统最适合用于酒店付款确认。在此基础上,提出了一种无线生物识别交易确认装置的总体设计。
{"title":"Guidelines for biometric recognition in wireless system for payment confirmation","authors":"Leon Grabensek, Sasa Divjak","doi":"10.1109/ARES.2006.70","DOIUrl":"https://doi.org/10.1109/ARES.2006.70","url":null,"abstract":"Biometric systems are widely used today in different interesting applications. Even though the hotel industry has some instances of biometric room access systems, hotel payment confirmation has yet to be implemented. To find how such a biometric system should be designed, we theoretically analyze different models of biometric systems. Fingerprint systems used alone and with gender filtering, face recognition or an identification element are discussed. The architecture of a biometric system for transaction confirmation in hotels is then proposed based on the analytical findings. We have found that a fingerprint system with an identification element is the most appropriate for hotel payment confirmation. Based on the given results a general design of a device for wireless biometric transaction confirmation is also proposed.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122865851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Inter-domains security management (IDSM) model for IP multimedia subsystem (IMS) IP多媒体子系统(IMS)的域间安全管理模型
M. Sher, T. Magedanz, W. T. Penzhorn
In this paper we propose architecture and design methodology for the inter-domains security management (IDSM) model for the IP multimedia system (IMS), which is standardized by third generation partnership project (3GPP) and 3GPP2 as next generation mobile networks. The IDSM model is based on trust domain relationship between different network domain operators using policy based security associations and managements. The design methodology introduces inter-domains security gateways for generating and managing keys and certificates based on public key infrastructure (PKI) architecture. IPSec protocol is used for implementing confidentiality and integrity protection. This research work is part of secure service provisioning (SSP) framework for the IMS playground and third generation beyond (3Gb) testbed at the FOKUS Fraunhofer Institute.
本文提出了IP多媒体系统(IMS)域间安全管理(IDSM)模型的体系结构和设计方法,该模型将被第三代合作伙伴计划(3GPP)和3GPP2作为下一代移动网络进行标准化。IDSM模型基于不同网络域运营商之间的信任域关系,使用基于策略的安全关联和管理。设计方法引入域间安全网关,用于生成和管理基于公钥基础设施(PKI)体系结构的密钥和证书。IPSec协议用于实现机密性和完整性保护。这项研究工作是FOKUS Fraunhofer研究所IMS游乐场和第三代超(3Gb)测试平台的安全服务供应(SSP)框架的一部分。
{"title":"Inter-domains security management (IDSM) model for IP multimedia subsystem (IMS)","authors":"M. Sher, T. Magedanz, W. T. Penzhorn","doi":"10.1109/ARES.2006.76","DOIUrl":"https://doi.org/10.1109/ARES.2006.76","url":null,"abstract":"In this paper we propose architecture and design methodology for the inter-domains security management (IDSM) model for the IP multimedia system (IMS), which is standardized by third generation partnership project (3GPP) and 3GPP2 as next generation mobile networks. The IDSM model is based on trust domain relationship between different network domain operators using policy based security associations and managements. The design methodology introduces inter-domains security gateways for generating and managing keys and certificates based on public key infrastructure (PKI) architecture. IPSec protocol is used for implementing confidentiality and integrity protection. This research work is part of secure service provisioning (SSP) framework for the IMS playground and third generation beyond (3Gb) testbed at the FOKUS Fraunhofer Institute.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114262718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
No risk is unsafe: simulated results on dependability of complementary currencies 没有风险是不安全的:关于互补货币可靠性的模拟结果
Kenji Saito, E. Morino, J. Murai
Efforts have been put for electronization of complementary currencies (alternative forms of monetary media) in the hope that it would reduce their operational cost. However, this paper argues that the problem is more inherent in the core design of MCS (mutual credit system), the most common form of complementary currency today. By simulating a small world of 2,500 traders, we show that growing the number of free-riders in MCS has a paradoxical effect of increasing "welfare" (a "happiness" metric) of the community. Since there is no pressure to stop the growth of the bad users, it is difficult to sustain the soundness of the system without strong interventions from the operators of the system; we need alternatives to the alternatives. We have proposed i-WAT as an electronic descendant of the WAT System, a polycentric complementary currency using "WAT tickets" as its media of exchange. A simulation using the same model as above indicates that i-WAT users can sustain barter relationships even in the presence of free-riders by natural evasive actions to avoid risks.
已作出努力使补充货币(替代形式的货币媒介)电子化,以期减少其业务成本。然而,本文认为,这个问题更多地存在于MCS(互信用系统)的核心设计中,MCS是当今最常见的互补货币形式。通过模拟一个由2500名交易员组成的小世界,我们表明,在MCS中,增加搭便车者的数量会产生增加社区“福利”(一种“幸福”指标)的矛盾效应。由于没有阻止不良用户增长的压力,如果没有系统运营商的强有力干预,很难维持系统的健全;我们需要替代方案的替代方案。我们提出i-WAT作为WAT系统的电子后裔,是一种使用“WAT票证”作为交换媒介的多中心补充货币。使用上述相同模型的模拟表明,即使在存在搭便车者的情况下,i-WAT用户也可以通过自然规避行为来避免风险,从而维持易货关系。
{"title":"No risk is unsafe: simulated results on dependability of complementary currencies","authors":"Kenji Saito, E. Morino, J. Murai","doi":"10.1109/ARES.2006.88","DOIUrl":"https://doi.org/10.1109/ARES.2006.88","url":null,"abstract":"Efforts have been put for electronization of complementary currencies (alternative forms of monetary media) in the hope that it would reduce their operational cost. However, this paper argues that the problem is more inherent in the core design of MCS (mutual credit system), the most common form of complementary currency today. By simulating a small world of 2,500 traders, we show that growing the number of free-riders in MCS has a paradoxical effect of increasing \"welfare\" (a \"happiness\" metric) of the community. Since there is no pressure to stop the growth of the bad users, it is difficult to sustain the soundness of the system without strong interventions from the operators of the system; we need alternatives to the alternatives. We have proposed i-WAT as an electronic descendant of the WAT System, a polycentric complementary currency using \"WAT tickets\" as its media of exchange. A simulation using the same model as above indicates that i-WAT users can sustain barter relationships even in the presence of free-riders by natural evasive actions to avoid risks.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114513505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Timed modelling and analysis in Web service compositions Web服务组合中的定时建模和分析
R. Kazhamiakin, P. Pandya, M. Pistore
In this paper we present an approach for modelling and analyzing time-related properties of Web service compositions defined as a set of BPEL4WS processes. We introduce a formalism, called Web service timed state transition systems (WSTTS), to capture the timed behavior of the composite Web services. We also exploit an interval temporal logic to express complex timed assumptions and requirements on the system's behavior. Building upon of this formalization, we provide techniques and tools for model checking BPEL4WS compositions against time-related requirements. We perform a preliminary experimental evaluation of our approach and tools with the help of the e-government case study.
在本文中,我们提出了一种方法,用于建模和分析定义为一组BPEL4WS流程的Web服务组合的时间相关属性。我们引入一种称为Web服务定时状态转换系统(WSTTS)的形式化方法来捕获复合Web服务的定时行为。我们还利用区间时间逻辑来表达系统行为的复杂时间假设和要求。在此形式化的基础上,我们提供了用于根据时间相关需求对BPEL4WS组合进行模型检查的技术和工具。在电子政府案例研究的帮助下,我们对我们的方法和工具进行了初步的实验评估。
{"title":"Timed modelling and analysis in Web service compositions","authors":"R. Kazhamiakin, P. Pandya, M. Pistore","doi":"10.1109/ARES.2006.134","DOIUrl":"https://doi.org/10.1109/ARES.2006.134","url":null,"abstract":"In this paper we present an approach for modelling and analyzing time-related properties of Web service compositions defined as a set of BPEL4WS processes. We introduce a formalism, called Web service timed state transition systems (WSTTS), to capture the timed behavior of the composite Web services. We also exploit an interval temporal logic to express complex timed assumptions and requirements on the system's behavior. Building upon of this formalization, we provide techniques and tools for model checking BPEL4WS compositions against time-related requirements. We perform a preliminary experimental evaluation of our approach and tools with the help of the e-government case study.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122108809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Intra-application partitioning in an eLearning environment - a discussion of critical aspects 电子学习环境中的应用程序内部划分——关键方面的讨论
Elke Franz, K. Borcea-Pfitzmann
In the course of the strengthened activities in eBusiness and the connected increasing awareness of privacy aspects, users of another application area become more and more sensitized of the problem field of the users' privacy $eLearning. With this paper we aim to increase the consciousness of the eLearning community for the relevance of preserving privacy by intra-application partitioning (IAP) in eLearning applications. This, especially, relates to collaborative eLearning environments where the contact to others is the basis of knowledge gathering and building, but, also implies an enhanced risk with respect to one's privacy. Therefore, we discuss concrete collaborative educational examples which illustrate that IAP by means of context recognition improves users' situation from a privacy perspective. Nevertheless, the paper discusses also critical aspects one has to consider when partitioning users' personal data and describes possible solutions. This allows for coming to the conclusion that intra-application data partitioning improves working in the application for the user but does not threaten the enforcement of crucial aspects.
随着电子商务活动的加强和隐私意识的提高,另一个应用领域的用户对电子学习用户隐私问题领域也越来越敏感。通过本文,我们的目标是提高电子学习社区对在电子学习应用程序中通过应用内分区(IAP)保护隐私的相关性的意识。这尤其与协作式电子学习环境有关,在这种环境中,与他人的接触是知识收集和建立的基础,但这也意味着个人隐私的风险增加。因此,我们讨论了具体的协作教育实例,从隐私的角度说明,通过上下文识别的IAP改善了用户的情况。尽管如此,本文还讨论了在划分用户个人数据时必须考虑的关键方面,并描述了可能的解决方案。由此可以得出结论:应用程序内部数据分区改善了用户在应用程序中的工作,但不会威胁到关键方面的执行。
{"title":"Intra-application partitioning in an eLearning environment - a discussion of critical aspects","authors":"Elke Franz, K. Borcea-Pfitzmann","doi":"10.1109/ARES.2006.77","DOIUrl":"https://doi.org/10.1109/ARES.2006.77","url":null,"abstract":"In the course of the strengthened activities in eBusiness and the connected increasing awareness of privacy aspects, users of another application area become more and more sensitized of the problem field of the users' privacy $eLearning. With this paper we aim to increase the consciousness of the eLearning community for the relevance of preserving privacy by intra-application partitioning (IAP) in eLearning applications. This, especially, relates to collaborative eLearning environments where the contact to others is the basis of knowledge gathering and building, but, also implies an enhanced risk with respect to one's privacy. Therefore, we discuss concrete collaborative educational examples which illustrate that IAP by means of context recognition improves users' situation from a privacy perspective. Nevertheless, the paper discusses also critical aspects one has to consider when partitioning users' personal data and describes possible solutions. This allows for coming to the conclusion that intra-application data partitioning improves working in the application for the user but does not threaten the enforcement of crucial aspects.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129312254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1