首页 > 最新文献

EW 11最新文献

英文 中文
A step towards ubiquitous computing: an efficient flexible micro-ORB 迈向普适计算的一步:高效灵活的微型orb
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133580
F. Ogel, B. Folliot, Gaël Thomas
Smart devices, such as personal assistants, mobile phone or smart cards, continuously spread and thus challenge every aspect of our lives. However, such environments exhibit specific constraints, such as mobility, high-level of dynamism and most often restricted resources. Traditional middle-wares were not designed for such constraints and, because of their monolithic, static and rigid architectures, are not likely to become a fit.In response, we propose a flexible micro-ORB, called Flex-ORB, that supports on demand export of services as well as their dynamic deployment and reconfiguration. Flex-ORB supports mobile code through an intermediate code representation. It is built on top of NEVERMIND, a flexible minimal execution environment, which uses a reflexive dynamic compiler as a central common language substrate upon which to achieve interoperability.Preliminary performance measurements show that, while being relatively small (120 KB) and dynamically adaptable, FlexORB outperforms traditional middlewares such as RPC, CORBA and Java RMI.
智能设备,如个人助理,手机或智能卡,不断普及,从而挑战我们生活的方方面面。然而,这种环境表现出特定的限制,例如流动性、高水平的活力和最经常受到限制的资源。传统的中间件不是为这样的约束而设计的,而且由于它们的整体、静态和刚性架构,不太可能成为合适的。作为回应,我们提出了一个灵活的微orb,称为Flex-ORB,它支持按需导出服务以及动态部署和重新配置。Flex-ORB通过中间代码表示支持移动代码。它建立在NEVERMIND的基础上,NEVERMIND是一个灵活的最小执行环境,它使用自反式动态编译器作为实现互操作性的中心公共语言基板。初步的性能测量表明,虽然FlexORB相对较小(120 KB)并且具有动态适应性,但它优于传统的中间件,如RPC、CORBA和Java RMI。
{"title":"A step towards ubiquitous computing: an efficient flexible micro-ORB","authors":"F. Ogel, B. Folliot, Gaël Thomas","doi":"10.1145/1133572.1133580","DOIUrl":"https://doi.org/10.1145/1133572.1133580","url":null,"abstract":"Smart devices, such as personal assistants, mobile phone or smart cards, continuously spread and thus challenge every aspect of our lives. However, such environments exhibit specific constraints, such as mobility, high-level of dynamism and most often restricted resources. Traditional middle-wares were not designed for such constraints and, because of their monolithic, static and rigid architectures, are not likely to become a fit.In response, we propose a flexible micro-ORB, called Flex-ORB, that supports on demand export of services as well as their dynamic deployment and reconfiguration. Flex-ORB supports mobile code through an intermediate code representation. It is built on top of NEVERMIND, a flexible minimal execution environment, which uses a reflexive dynamic compiler as a central common language substrate upon which to achieve interoperability.Preliminary performance measurements show that, while being relatively small (120 KB) and dynamically adaptable, FlexORB outperforms traditional middlewares such as RPC, CORBA and Java RMI.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A component-based approach to distributed system management: a use case with self-manageable J2EE clusters 分布式系统管理的基于组件的方法:具有自管理J2EE集群的用例
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133574
S. Bouchenak, F. Boyer, E. Cecchet, Sébastien Jean, Alan Schmitt, J. Stefani
Clustering has become a de facto standard to scale distributed systems and applications. However, the administration and management of such systems still use ad-hoc techniques that partially fulfill the needs. The expertise needed to configure and tune these systems goes beyond the capacity of a single system administrator or software developer.We present a modular software infrastructure to build command and control loops to manage large scale distributed systems. Our approach uses a reflective component model in a systematic way for building a system model and every single stage in the supervision loop. This approach offers modularity, easy configuration, dynamic reconfiguration, as well as reusability. We illustrate how this architecture can be used to build self-manageable J2EE application server clusters.
集群已经成为扩展分布式系统和应用程序的事实上的标准。然而,这些系统的管理和管理仍然使用部分满足需求的特殊技术。配置和调优这些系统所需的专业知识超出了单个系统管理员或软件开发人员的能力。我们提出了一个模块化的软件基础设施来构建命令和控制回路来管理大规模的分布式系统。我们的方法以系统的方式使用反射组件模型来构建系统模型和监督循环中的每个阶段。这种方法提供了模块化、易于配置、动态重新配置以及可重用性。我们将说明如何使用此体系结构来构建自管理的J2EE应用程序服务器集群。
{"title":"A component-based approach to distributed system management: a use case with self-manageable J2EE clusters","authors":"S. Bouchenak, F. Boyer, E. Cecchet, Sébastien Jean, Alan Schmitt, J. Stefani","doi":"10.1145/1133572.1133574","DOIUrl":"https://doi.org/10.1145/1133572.1133574","url":null,"abstract":"Clustering has become a de facto standard to scale distributed systems and applications. However, the administration and management of such systems still use ad-hoc techniques that partially fulfill the needs. The expertise needed to configure and tune these systems goes beyond the capacity of a single system administrator or software developer.We present a modular software infrastructure to build command and control loops to manage large scale distributed systems. Our approach uses a reflective component model in a systematic way for building a system model and every single stage in the supervision loop. This approach offers modularity, easy configuration, dynamic reconfiguration, as well as reusability. We illustrate how this architecture can be used to build self-manageable J2EE application server clusters.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125692948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Self-migration of operating systems 操作系统的自迁移
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133616
J. Hansen, E. Jul
This paper is about on-the-fly migration of entire operating systems between physically different host computers. Resource allocation is often static; using migration allows applications to dynamically change bindings between programs and physical hosts as to improve utilisation. We first survey different approaches to migration and then present two prototypes that allow migration not only of an application but also of the operating system running the application. One of the prototypes includes a novel approach, self-migration, to operating system migration. Performance numbers show that migration can be done with merely subsecond suspension of the application.
本文是关于整个操作系统在物理上不同的主机之间的动态迁移。资源分配通常是静态的;使用迁移允许应用程序动态更改程序和物理主机之间的绑定,以提高利用率。我们首先调查了不同的迁移方法,然后给出了两种原型,它们不仅允许迁移应用程序,还允许迁移运行该应用程序的操作系统。其中一个原型包括一种新颖的方法,即自迁移到操作系统迁移。性能数据表明,只需将应用程序暂停几秒,就可以完成迁移。
{"title":"Self-migration of operating systems","authors":"J. Hansen, E. Jul","doi":"10.1145/1133572.1133616","DOIUrl":"https://doi.org/10.1145/1133572.1133616","url":null,"abstract":"This paper is about on-the-fly migration of entire operating systems between physically different host computers. Resource allocation is often static; using migration allows applications to dynamically change bindings between programs and physical hosts as to improve utilisation. We first survey different approaches to migration and then present two prototypes that allow migration not only of an application but also of the operating system running the application. One of the prototypes includes a novel approach, self-migration, to operating system migration. Performance numbers show that migration can be done with merely subsecond suspension of the application.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
An approach to benchmarking configuration complexity 一种对配置复杂性进行基准测试的方法
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133609
Aaron B. Brown, J. Hellerstein
Configuration is the process whereby components are assembled or adjusted to produce a functional system that operates at a specified level of performance. Today, the complexity of configuration is a major impediment to deploying and managing computer systems. We describe an approach to quantifying configuration complexity, with the ultimate goal of producing a configuration complexity benchmark. Our belief is that such a benchmark can drive progress towards self-configuring systems. Unlike traditional workload-based performance benchmarks, our approach is process-based. It generates metrics that reflect the level of human involvement in the configuration process, quantified by interaction time and probability of successful configuration. It computes the metrics using a model of a standardized human operator, calibrated in advance by a user study that measures operator behavior on a set of parameterized canonical configuration actions. The model captures the human component of configuration complexity at low cost and provides representativeness and reproducibility.
配置是将组件组装或调整以产生在指定性能水平上运行的功能系统的过程。今天,配置的复杂性是部署和管理计算机系统的主要障碍。我们描述了一种量化配置复杂性的方法,其最终目标是生成配置复杂性基准。我们相信这样的基准可以推动自配置系统的发展。与传统的基于工作负载的性能基准测试不同,我们的方法是基于过程的。它生成反映配置过程中人类参与程度的度量,通过交互时间和成功配置的概率进行量化。它使用标准化的人类操作员模型来计算度量,并通过用户研究预先校准,该研究测量操作员在一组参数化规范配置操作上的行为。该模型以低成本捕获了配置复杂性的人为成分,并提供了代表性和可再现性。
{"title":"An approach to benchmarking configuration complexity","authors":"Aaron B. Brown, J. Hellerstein","doi":"10.1145/1133572.1133609","DOIUrl":"https://doi.org/10.1145/1133572.1133609","url":null,"abstract":"Configuration is the process whereby components are assembled or adjusted to produce a functional system that operates at a specified level of performance. Today, the complexity of configuration is a major impediment to deploying and managing computer systems. We describe an approach to quantifying configuration complexity, with the ultimate goal of producing a configuration complexity benchmark. Our belief is that such a benchmark can drive progress towards self-configuring systems. Unlike traditional workload-based performance benchmarks, our approach is process-based. It generates metrics that reflect the level of human involvement in the configuration process, quantified by interaction time and probability of successful configuration. It computes the metrics using a model of a standardized human operator, calibrated in advance by a user study that measures operator behavior on a set of parameterized canonical configuration actions. The model captures the human component of configuration complexity at low cost and provides representativeness and reproducibility.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133831686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Using virtual markets to program global behavior in sensor networks 利用虚拟市场对传感器网络中的全局行为进行编程
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133587
G. Mainland, Laura Kang, Sébastien Lahaie, D. Parkes, M. Welsh
This paper presents market-based macroprogramming (MBM), a new paradigm for achieving globally efficient behavior in sensor networks. Rather than programming the individual, low-level behaviors of sensor nodes, MBM defines a virtual market where nodes sell "actions" (such as taking a sensor reading or aggregating data) in response to global price information. Nodes take actions to maximize their own utility, subject to energy budget constraints. The behavior of the network is determined by adjusting the price vectors for each action, rather than by directly specifying local node actions, resulting in a globally efficient allocation of network resources. We present the market-based macro-programming paradigm, as well as several experiments demonstrating its value for a sensor network vehicle tracking application.
本文提出了基于市场的宏规划(MBM),这是一种在传感器网络中实现全局高效行为的新范式。MBM定义了一个虚拟市场,节点根据全球价格信息出售“动作”(例如读取传感器或汇总数据),而不是对传感器节点的单个低级行为进行编程。在能源预算约束下,节点采取行动最大化自身效用。网络的行为是通过调整每个行为的价格向量来决定的,而不是通过直接指定局部节点的行为,从而实现网络资源的全局有效分配。我们提出了基于市场的宏观编程范例,以及几个实验,证明了它在传感器网络车辆跟踪应用中的价值。
{"title":"Using virtual markets to program global behavior in sensor networks","authors":"G. Mainland, Laura Kang, Sébastien Lahaie, D. Parkes, M. Welsh","doi":"10.1145/1133572.1133587","DOIUrl":"https://doi.org/10.1145/1133572.1133587","url":null,"abstract":"This paper presents market-based macroprogramming (MBM), a new paradigm for achieving globally efficient behavior in sensor networks. Rather than programming the individual, low-level behaviors of sensor nodes, MBM defines a virtual market where nodes sell \"actions\" (such as taking a sensor reading or aggregating data) in response to global price information. Nodes take actions to maximize their own utility, subject to energy budget constraints. The behavior of the network is determined by adjusting the price vectors for each action, rather than by directly specifying local node actions, resulting in a globally efficient allocation of network resources. We present the market-based macro-programming paradigm, as well as several experiments demonstrating its value for a sensor network vehicle tracking application.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114938123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Using time travel to diagnose computer problems 利用时间旅行诊断计算机问题
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133607
Andrew Whitaker, Richard S. Cox, S. Gribble
The solution to a number of modern computer problems takes the form of a manual, expert-guided search through a large space of computer configurations. For example, if a desktop computer is crashing or malfunctioning, a troubleshooter will use her knowledge of system features such as configuration files, registries, and dynamic library versions to apply a series of configuration changes until the system once again begins functioning. As another example, to obtain good performance from a complex system like a database or a web application, a specialized and highly paid administrator will explore the set of application and operating system parameters to find the optimal values.
许多现代计算机问题的解决方案采用手动的形式,在专家的指导下搜索大量的计算机配置。例如,如果一台桌面计算机正在崩溃或发生故障,故障排除程序将使用她对系统特性(如配置文件、注册表和动态库版本)的了解来应用一系列配置更改,直到系统再次开始运行。再例如,为了从数据库或web应用程序等复杂系统中获得良好的性能,高薪的专业管理员将探索应用程序和操作系统参数集,以找到最优值。
{"title":"Using time travel to diagnose computer problems","authors":"Andrew Whitaker, Richard S. Cox, S. Gribble","doi":"10.1145/1133572.1133607","DOIUrl":"https://doi.org/10.1145/1133572.1133607","url":null,"abstract":"The solution to a number of modern computer problems takes the form of a manual, expert-guided search through a large space of computer configurations. For example, if a desktop computer is crashing or malfunctioning, a troubleshooter will use her knowledge of system features such as configuration files, registries, and dynamic library versions to apply a series of configuration changes until the system once again begins functioning. As another example, to obtain good performance from a complex system like a database or a web application, a specialized and highly paid administrator will explore the set of application and operating system parameters to find the optimal values.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117087836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
AP3: cooperative, decentralized anonymous communication AP3:协作、分散的匿名通信
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133578
A. Mislove, Gaurav Oberoi, Ansley Post, C. Reis, P. Druschel, D. Wallach
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides clients with three primitives: (i) anonymous message delivery, (ii) anonymous channels, and (iii) secure pseudonyms. AP3 is designed to be lightweight, low-cost and provides "probable innocence" anonymity to participating users, even under a large-scale coordinated attack by a limited fraction of malicious overlay nodes. Additionally, we use AP3's primitives to build novel anonymous group communication facilities (multicast and anycast), which shield the identity of both publishers and subscribers.
本文描述了一种为参与用户提供匿名通信服务的协作覆盖网络。匿名点对点代理(AP3)系统为客户端提供了三个基本功能:(i)匿名消息传递,(ii)匿名通道,(iii)安全假名。AP3被设计为轻量级、低成本,并为参与的用户提供“可能无辜”的匿名性,即使在有限部分恶意覆盖节点的大规模协同攻击下也是如此。此外,我们使用AP3的原语来构建新的匿名组通信设施(多播和任意播),从而保护发布者和订阅者的身份。
{"title":"AP3: cooperative, decentralized anonymous communication","authors":"A. Mislove, Gaurav Oberoi, Ansley Post, C. Reis, P. Druschel, D. Wallach","doi":"10.1145/1133572.1133578","DOIUrl":"https://doi.org/10.1145/1133572.1133578","url":null,"abstract":"This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides clients with three primitives: (i) anonymous message delivery, (ii) anonymous channels, and (iii) secure pseudonyms. AP3 is designed to be lightweight, low-cost and provides \"probable innocence\" anonymity to participating users, even under a large-scale coordinated attack by a limited fraction of malicious overlay nodes. Additionally, we use AP3's primitives to build novel anonymous group communication facilities (multicast and anycast), which shield the identity of both publishers and subscribers.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134436750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 132
A sledgehammer approach to reuse of legacy device drivers 重用遗留设备驱动程序的大锤式方法
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133617
Joshua LeVasseur, Volkmar Uhlig
Device drivers account for the majority of an operating system's code base, and reuse of the existing driver infrastructure is a pragmatic requirement of any new OS project. New operating systems should benefit from the existing device driver code base without demanding legacy support from the kernel.Instead of trying to directly integrate existing device drivers we propose a more radical approach. We run the unmodified device driver, with its complete original OS, isolated in a virtual machine. Our flexible approach, requiring only minimal support infrastructure, allows us to run any existing device driver, independently of the OS or driver vendor.
设备驱动程序占操作系统代码库的大部分,重用现有的驱动程序基础结构是任何新操作系统项目的实际需求。新的操作系统应该受益于现有的设备驱动程序代码库,而不需要内核的遗留支持。而不是试图直接集成现有的设备驱动程序,我们提出了一个更激进的方法。我们运行未修改的设备驱动程序,其完整的原始操作系统,隔离在虚拟机中。我们灵活的方法,只需要最少的支持基础设施,允许我们运行任何现有的设备驱动程序,独立于操作系统或驱动程序供应商。
{"title":"A sledgehammer approach to reuse of legacy device drivers","authors":"Joshua LeVasseur, Volkmar Uhlig","doi":"10.1145/1133572.1133617","DOIUrl":"https://doi.org/10.1145/1133572.1133617","url":null,"abstract":"Device drivers account for the majority of an operating system's code base, and reuse of the existing driver infrastructure is a pragmatic requirement of any new OS project. New operating systems should benefit from the existing device driver code base without demanding legacy support from the kernel.Instead of trying to directly integrate existing device drivers we propose a more radical approach. We run the unmodified device driver, with its complete original OS, isolated in a virtual machine. Our flexible approach, requiring only minimal support infrastructure, allows us to run any existing device driver, independently of the OS or driver vendor.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121393838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Impeding attrition attacks in P2P systems 阻止P2P系统的损耗攻击
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133601
Petros Maniatis, T. J. Giuli, M. Roussopoulos, D. Rosenthal, Mary Baker
P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-level abuse of the peer communication protocol. We identify a set of defenses that systems can deploy against such attacks and potential synergies among them. We illustrate the application of these defenses in the context of the LOCKSS digital preservation system.
P2P系统暴露在异常广泛的攻击之下。这些攻击包括一系列拒绝服务攻击或损耗攻击,从低级数据包泛滥到高级滥用对等通信协议。我们确定了系统可以部署的一组防御措施,以防止此类攻击以及它们之间的潜在协同作用。我们在LOCKSS数字保存系统的背景下说明这些防御的应用。
{"title":"Impeding attrition attacks in P2P systems","authors":"Petros Maniatis, T. J. Giuli, M. Roussopoulos, D. Rosenthal, Mary Baker","doi":"10.1145/1133572.1133601","DOIUrl":"https://doi.org/10.1145/1133572.1133601","url":null,"abstract":"P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-level abuse of the peer communication protocol. We identify a set of defenses that systems can deploy against such attacks and potential synergies among them. We illustrate the application of these defenses in the context of the LOCKSS digital preservation system.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Data lifetime is a systems problem 数据生存期是一个系统问题
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133599
Tal Garfinkel, Ben Pfaff, Jim Chow, M. Rosenblum
As sensitive data lifetime (i.e. propagation and duration in memory) increases, so does the risk of exposure. Unfortunately, this issue has been largely overlooked in the design of most of today's operating systems, libraries, languages, etc. As a result, applications are likely to leave the sensitive data they handle (passwords, financial and military information, etc.) scattered widely over memory, leaked to disk, etc. and left there for an indeterminate period of time. This greatly increases the impact of a system compromise.Dealing with data lifetime issues is currently left to application developers, who largely overlook them. Security-aware developers who attempt to address them (e.g. cryptographic library writers) are stymied by the limitations of the operating systems, languages, etc. they rely on. We argue that data lifetime is a systems issue which must be recognized and addressed at all layers of the software stack.
随着敏感数据生命周期(即在内存中的传播和持续时间)的增加,暴露的风险也在增加。不幸的是,在当今大多数操作系统、库、语言等的设计中,这个问题在很大程度上被忽视了。因此,应用程序很可能将它们处理的敏感数据(密码、财务和军事信息等)分散在内存中,泄漏到磁盘等,并在不确定的时间内留在那里。这大大增加了系统泄漏的影响。处理数据生命周期问题目前留给了应用程序开发人员,他们在很大程度上忽略了这些问题。试图解决这些问题的安全意识开发人员(例如加密库编写者)受到他们所依赖的操作系统、语言等的限制。我们认为,数据生命周期是一个系统问题,必须在软件堆栈的所有层认识和解决。
{"title":"Data lifetime is a systems problem","authors":"Tal Garfinkel, Ben Pfaff, Jim Chow, M. Rosenblum","doi":"10.1145/1133572.1133599","DOIUrl":"https://doi.org/10.1145/1133572.1133599","url":null,"abstract":"As sensitive data lifetime (i.e. propagation and duration in memory) increases, so does the risk of exposure. Unfortunately, this issue has been largely overlooked in the design of most of today's operating systems, libraries, languages, etc. As a result, applications are likely to leave the sensitive data they handle (passwords, financial and military information, etc.) scattered widely over memory, leaked to disk, etc. and left there for an indeterminate period of time. This greatly increases the impact of a system compromise.Dealing with data lifetime issues is currently left to application developers, who largely overlook them. Security-aware developers who attempt to address them (e.g. cryptographic library writers) are stymied by the limitations of the operating systems, languages, etc. they rely on. We argue that data lifetime is a systems issue which must be recognized and addressed at all layers of the software stack.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126238931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
期刊
EW 11
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1