首页 > 最新文献

2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)最新文献

英文 中文
An OS-level Framework for Providing Application-Aware Reliability 提供应用程序感知可靠性的操作系统级框架
Long Wang, Z. Kalbarczyk, W. Gu, R. Iyer
The paper describes the reliability microkernel framework (RMK), a loadable kernel module for providing application-aware reliability and dynamically configuring reliability mechanisms installed in RMK. The RMK prototype is implemented in Linux and supports detection of application/OS failures and transparent application checkpointing. Experiment results show that the OS hang detection, which exploits characteristics of application and system behavior, can achieve high coverage (100% in our experiments) and low false positive rate. Moreover, the performance overhead is negligible because instruction counting is performed in hardware
本文描述了可靠性微内核框架(RMK),它是一个可加载的内核模块,用于提供应用感知的可靠性和动态配置安装在RMK中的可靠性机制。RMK原型是在Linux中实现的,支持应用程序/操作系统故障检测和透明的应用程序检查点。实验结果表明,利用应用程序和系统行为特征的操作系统挂起检测可以实现高覆盖率(实验结果为100%)和低误报率。此外,性能开销可以忽略不计,因为指令计数是在硬件中执行的
{"title":"An OS-level Framework for Providing Application-Aware Reliability","authors":"Long Wang, Z. Kalbarczyk, W. Gu, R. Iyer","doi":"10.1109/PRDC.2006.19","DOIUrl":"https://doi.org/10.1109/PRDC.2006.19","url":null,"abstract":"The paper describes the reliability microkernel framework (RMK), a loadable kernel module for providing application-aware reliability and dynamically configuring reliability mechanisms installed in RMK. The RMK prototype is implemented in Linux and supports detection of application/OS failures and transparent application checkpointing. Experiment results show that the OS hang detection, which exploits characteristics of application and system behavior, can achieve high coverage (100% in our experiments) and low false positive rate. Moreover, the performance overhead is negligible because instruction counting is performed in hardware","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129438583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Pragmatic Protocol for Database Replication in Interconnected Clusters 互联集群中数据库复制的实用协议
J. Grov, L. Soares, A. Correia, J. Pereira, R. Oliveira, F. Pedone
Multi-master update everywhere database replication, as achieved by protocols based on group communication such as DBSM and Postgres-R, addresses both performance and availability. By scaling it to wide area networks, one could save costly bandwidth and avoid large round-trips to a distant master server. Also, by ensuring that updates are safely stored at a remote site within transaction boundaries, disaster recovery is guaranteed. Unfortunately, scaling existing cluster based replication protocols is troublesome. In this paper we present a database replication protocol based on group communication that targets interconnected clusters. In contrast with previous proposals, it uses a separate multicast group for each cluster and thus does not impose any additional requirements on group communication, easing implementation and deployment in a real setting. Nonetheless, the protocol ensures one-copy equivalence while allowing all sites to execute update transactions. Experimental evaluation using the workload of the industry standard TPC-C benchmark confirms the advantages of the approach
通过基于组通信(如DBSM和postgresr)的协议实现的多主处处更新数据库复制,同时解决了性能和可用性问题。通过将其扩展到广域网,可以节省昂贵的带宽,并避免到远程主服务器的大量往返。此外,通过确保更新安全地存储在事务边界内的远程站点上,可以保证灾难恢复。不幸的是,扩展现有的基于集群的复制协议是很麻烦的。本文提出了一种基于组通信的数据库复制协议。与之前的方案相比,它为每个集群使用一个单独的多播组,因此不会对组通信施加任何额外的要求,从而简化了在实际环境中的实现和部署。尽管如此,该协议确保了单副本等价性,同时允许所有站点执行更新事务。利用工业标准TPC-C基准测试的工作负载进行的实验评估证实了该方法的优越性
{"title":"A Pragmatic Protocol for Database Replication in Interconnected Clusters","authors":"J. Grov, L. Soares, A. Correia, J. Pereira, R. Oliveira, F. Pedone","doi":"10.1109/PRDC.2006.11","DOIUrl":"https://doi.org/10.1109/PRDC.2006.11","url":null,"abstract":"Multi-master update everywhere database replication, as achieved by protocols based on group communication such as DBSM and Postgres-R, addresses both performance and availability. By scaling it to wide area networks, one could save costly bandwidth and avoid large round-trips to a distant master server. Also, by ensuring that updates are safely stored at a remote site within transaction boundaries, disaster recovery is guaranteed. Unfortunately, scaling existing cluster based replication protocols is troublesome. In this paper we present a database replication protocol based on group communication that targets interconnected clusters. In contrast with previous proposals, it uses a separate multicast group for each cluster and thus does not impose any additional requirements on group communication, easing implementation and deployment in a real setting. Nonetheless, the protocol ensures one-copy equivalence while allowing all sites to execute update transactions. Experimental evaluation using the workload of the industry standard TPC-C benchmark confirms the advantages of the approach","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123142242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Storing RSA Private Keys In Your Head 在你的头脑中存储RSA私钥
Taisya Krivoruchko, J. Diamond, J. Hooper
An issue when using the RSA public-key system is that for reasonable levels of security, both the public key and the private key must be quite large. Since few people are capable of memorizing a 1024-bit private key, most people must store this number on a computer hard drive or other digital storage device. There are (at least) three problems with this; the first is that if your computer is even temporarily compromised, your private key could be stolen. The second is that if you are away from your computer (and don't have your key on a portable storage device) but need your private key to access some resource, you are unable to do so. The third is that your key could be irrevocably lost because of hardware problems. This paper describes a way of generating a public/private RSA key pair from a passphrase to overcome these problems. Although the paper's focus is on the generation of RSA keys, the process can be applied to any cryptosystem (symmetric or asymmetric) which relies on random data for generating keys
使用RSA公钥系统时的一个问题是,为了达到合理的安全级别,公钥和私钥都必须相当大。由于很少有人能够记住1024位私钥,大多数人必须将这个数字存储在计算机硬盘驱动器或其他数字存储设备上。这(至少)存在三个问题;首先,如果你的电脑被暂时入侵,你的私钥可能被盗。第二个问题是,如果您远离计算机(并且没有将密钥存储在便携式存储设备上),但是需要您的私钥来访问某些资源,则无法这样做。第三种是由于硬件问题,您的密钥可能会不可挽回地丢失。本文描述了一种从密码短语生成公钥/私钥对的方法来克服这些问题。虽然本文的重点是RSA密钥的生成,但该过程可以应用于任何依赖随机数据生成密钥的密码系统(对称或非对称)
{"title":"Storing RSA Private Keys In Your Head","authors":"Taisya Krivoruchko, J. Diamond, J. Hooper","doi":"10.1109/PRDC.2006.58","DOIUrl":"https://doi.org/10.1109/PRDC.2006.58","url":null,"abstract":"An issue when using the RSA public-key system is that for reasonable levels of security, both the public key and the private key must be quite large. Since few people are capable of memorizing a 1024-bit private key, most people must store this number on a computer hard drive or other digital storage device. There are (at least) three problems with this; the first is that if your computer is even temporarily compromised, your private key could be stolen. The second is that if you are away from your computer (and don't have your key on a portable storage device) but need your private key to access some resource, you are unable to do so. The third is that your key could be irrevocably lost because of hardware problems. This paper describes a way of generating a public/private RSA key pair from a passphrase to overcome these problems. Although the paper's focus is on the generation of RSA keys, the process can be applied to any cryptosystem (symmetric or asymmetric) which relies on random data for generating keys","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134171076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reliable Video Transmission Techniques for Wireless MPEG-4 Streaming Systems 无线MPEG-4流媒体系统的可靠视频传输技术
Sheng-Tzong Cheng, Jianrui Lin
Multimedia streaming over wireless network faces the problem of low-bandwidth data transmission in an error prone environment. Furthermore, due to the frame dependency exploited by the video coding schemes, packet loss could degrade the perceptual quality of the media streams. In this paper, we design and implement a group-of-pictures (GOP) based video packet interleaving technique to reduce the impact of bursty packet losses. At the server side of our system, the packets of B or P frames are interleaved into the packets of a single I frame. At the client side, the de-interleaving method is developed based on the RTP timestamp of RTP header. We also apply the technique to the MPEG-4 video codec in the streaming system and integrate its error resilient tools - video packet, data partition, and RVLC, to increase the performance of GOP based video packet interleaving technique. From the experiment results, we show that our technique improves the perceptual quality better than the classic scheme does
无线网络上的多媒体流面临着在易出错环境下低带宽数据传输的问题。此外,由于视频编码方案所利用的帧依赖性,丢包会降低媒体流的感知质量。本文设计并实现了一种基于图像组(group-of-picture, GOP)的视频分组交错技术,以减少突发丢包的影响。在我们系统的服务器端,B帧或P帧的数据包被交织成单个I帧的数据包。在客户端,基于RTP报头的RTP时间戳开发了去交错方法。我们还将该技术应用于流媒体系统中的MPEG-4视频编解码器,并集成了视频分组、数据分区和RVLC等抗错误工具,以提高基于GOP的视频分组交错技术的性能。实验结果表明,与经典方案相比,我们的方法能更好地提高感知质量
{"title":"Reliable Video Transmission Techniques for Wireless MPEG-4 Streaming Systems","authors":"Sheng-Tzong Cheng, Jianrui Lin","doi":"10.1109/PRDC.2006.53","DOIUrl":"https://doi.org/10.1109/PRDC.2006.53","url":null,"abstract":"Multimedia streaming over wireless network faces the problem of low-bandwidth data transmission in an error prone environment. Furthermore, due to the frame dependency exploited by the video coding schemes, packet loss could degrade the perceptual quality of the media streams. In this paper, we design and implement a group-of-pictures (GOP) based video packet interleaving technique to reduce the impact of bursty packet losses. At the server side of our system, the packets of B or P frames are interleaved into the packets of a single I frame. At the client side, the de-interleaving method is developed based on the RTP timestamp of RTP header. We also apply the technique to the MPEG-4 video codec in the streaming system and integrate its error resilient tools - video packet, data partition, and RVLC, to increase the performance of GOP based video packet interleaving technique. From the experiment results, we show that our technique improves the perceptual quality better than the classic scheme does","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134544629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantum Oblivious Transfer and Fair Digital Transactions 量子无关传输和公平数字交易
Yao-Hsin Chou, I. Tsai, Chien-Ming Ko, S. Kuo, Ing-Yi Chen
Quantum entanglement is a phenomenon available only at nanometer scale. In this paper, we show how quantum entanglement can be used to build cryptographic primitives such as oblivious transfer. In addition to studying the protocol itself, we also show how to realize some applications based on our proposal. These include typical e-business applications such as contract signing, certified mail, simultaneous secret exchange, secure transaction and remote coin flip. Unlike classical oblivious transfer, the security of this protocol is based on physical laws, instead of any unproven mathematic conjecture. As a result, our proposal provides unconditional security for e-business
量子纠缠是一种只有在纳米尺度上才存在的现象。在本文中,我们展示了如何使用量子纠缠来构建密码原语,如遗忘传输。除了研究协议本身,我们还展示了如何基于我们的提议实现一些应用。这包括典型的电子商务应用程序,如合同签署、认证邮件、同时秘密交换、安全交易和远程抛硬币。与经典的遗忘传输不同,该协议的安全性基于物理定律,而不是任何未经证明的数学猜想。因此,我们的建议为电子商务提供了无条件的安全性
{"title":"Quantum Oblivious Transfer and Fair Digital Transactions","authors":"Yao-Hsin Chou, I. Tsai, Chien-Ming Ko, S. Kuo, Ing-Yi Chen","doi":"10.1109/PRDC.2006.51","DOIUrl":"https://doi.org/10.1109/PRDC.2006.51","url":null,"abstract":"Quantum entanglement is a phenomenon available only at nanometer scale. In this paper, we show how quantum entanglement can be used to build cryptographic primitives such as oblivious transfer. In addition to studying the protocol itself, we also show how to realize some applications based on our proposal. These include typical e-business applications such as contract signing, certified mail, simultaneous secret exchange, secure transaction and remote coin flip. Unlike classical oblivious transfer, the security of this protocol is based on physical laws, instead of any unproven mathematic conjecture. As a result, our proposal provides unconditional security for e-business","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114483339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Low-Overhead Run-Time Memory Leak Detection and Recovery 低开销运行时内存泄漏检测和恢复
Timothy Tsai, K. Vaidyanathan, K. Gross
Memory leaks are known to be a major cause of reliability and performance issues in software. This paper describes a run-time scheme that detects and removes memory leaks with minimal performance overhead and with no modifications to application source code. The scheme consists of a first stage where a pattern recognition technique proactively detects subtle memory leaks, followed by a more resource-intensive second stage that scans the memory space of an application and removes detected memory leaks. The pattern recognition technique in the first stage is based on the multivariate state estimation technique (MSET) which provides accurate detection of subtle memory leaks with very little overhead. The second stage is only activated when problems are identified by the first stage. For our prototype, this second stage is based on debugging and analysis tools provided by Solaris 10. Due to the low-overhead impact of the first stage, the system can be monitored for memory leaks without incurring noticeable performance degradation. We present and discuss some results from our unique proactive detection and debugging methodology
众所周知,内存泄漏是导致软件可靠性和性能问题的主要原因。本文描述了一种运行时方案,该方案以最小的性能开销和不修改应用程序源代码的情况下检测和删除内存泄漏。该方案包括第一阶段,其中模式识别技术主动检测细微的内存泄漏,然后是资源更密集的第二阶段,扫描应用程序的内存空间并删除检测到的内存泄漏。第一阶段的模式识别技术是基于多变量状态估计技术(MSET)的,该技术可以在很小的开销下精确检测细微的内存泄漏。只有在第一阶段发现问题时才会激活第二阶段。对于我们的原型,第二阶段是基于Solaris 10提供的调试和分析工具。由于第一阶段的低开销影响,可以监视系统的内存泄漏,而不会引起明显的性能下降。我们介绍并讨论了我们独特的主动检测和调试方法的一些结果
{"title":"Low-Overhead Run-Time Memory Leak Detection and Recovery","authors":"Timothy Tsai, K. Vaidyanathan, K. Gross","doi":"10.1109/PRDC.2006.42","DOIUrl":"https://doi.org/10.1109/PRDC.2006.42","url":null,"abstract":"Memory leaks are known to be a major cause of reliability and performance issues in software. This paper describes a run-time scheme that detects and removes memory leaks with minimal performance overhead and with no modifications to application source code. The scheme consists of a first stage where a pattern recognition technique proactively detects subtle memory leaks, followed by a more resource-intensive second stage that scans the memory space of an application and removes detected memory leaks. The pattern recognition technique in the first stage is based on the multivariate state estimation technique (MSET) which provides accurate detection of subtle memory leaks with very little overhead. The second stage is only activated when problems are identified by the first stage. For our prototype, this second stage is based on debugging and analysis tools provided by Solaris 10. Due to the low-overhead impact of the first stage, the system can be monitored for memory leaks without incurring noticeable performance degradation. We present and discuss some results from our unique proactive detection and debugging methodology","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116274338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Improving Fast Paxos: being optimistic with no overhead 改进Fast Paxos:保持乐观,没有开销
Bernadette Charron-Bost, A. Schiper
The paper addresses the cost of consensus algorithms. It has been shown that in the best case, consensus can be solved in two communication steps with f
本文讨论了共识算法的成本。结果表明,在最佳情况下,协商一致可以在f
{"title":"Improving Fast Paxos: being optimistic with no overhead","authors":"Bernadette Charron-Bost, A. Schiper","doi":"10.1109/PRDC.2006.39","DOIUrl":"https://doi.org/10.1109/PRDC.2006.39","url":null,"abstract":"The paper addresses the cost of consensus algorithms. It has been shown that in the best case, consensus can be solved in two communication steps with f<n/2, and in one communication step with f<n/3 (f is the maximum number of faulty processes). This leads to a dilemma when choosing a consensus algorithm: greater efficiency or higher resiliency degree. Recently Lamport has proposed a solution called Fast Paxos, for partly escaping from this dilemma. The idea is to combine two types of rounds in a single consensus algorithm: fast rounds and rounds of the ordinary Paxos algorithm. In the best case, Fast Paxos solves consensus in one fast round, that is it requires only one communication step. Unfortunately, the combination induces some time overhead, and so Fast Paxos becomes more expensive than ordinary Paxos when fast rounds do not succeed. In this paper we go one step further: we show that it is possible to tentatively execute a fast round before a classical round without any time overhead if the fast round does not succeed","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122733495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
An Evaluation of Similarity Coefficients for Software Fault Localization 软件故障定位的相似系数评价
Rui Abreu, P. Zoeteweij, A. V. Gemund
Automated diagnosis of software faults can improve the efficiency of the debugging process, and is therefore an important technique for the development of dependable software. In this paper we study different similarity coefficients that are applied in the context of a program spectral approach to software fault localization (single programming mistakes). The coefficients studied are taken from the systems diagnosis/automated debugging tools Pinpoint, Tarantula, and AMPLE, and from the molecular biology domain (the Ochiai coefficient). We evaluate these coefficients on the Siemens Suite of benchmark faults, and assess their effectiveness in terms of the position of the actual fault in the probability ranking of fault candidates produced by the diagnosis technique. Our experiments indicate that the Ochiai coefficient consistently outperforms the coefficients currently used by the tools mentioned. In terms of the amount of code that needs to be inspected, this coefficient improves 5% on average over the next best technique, and up to 30% in specific cases
软件故障的自动诊断可以提高调试过程的效率,是开发可靠软件的重要技术。本文研究了应用程序谱方法进行软件故障定位(单个编程错误)的不同相似系数。所研究的系数取自系统诊断/自动调试工具Pinpoint、Tarantula和AMPLE,以及分子生物学领域(Ochiai系数)。我们在西门子基准故障集上评估这些系数,并根据实际故障在诊断技术产生的故障候选概率排序中的位置来评估它们的有效性。我们的实验表明,Ochiai系数始终优于上述工具目前使用的系数。就需要检查的代码量而言,该系数比下一个最佳技术平均提高了5%,在特定情况下提高了30%
{"title":"An Evaluation of Similarity Coefficients for Software Fault Localization","authors":"Rui Abreu, P. Zoeteweij, A. V. Gemund","doi":"10.1109/PRDC.2006.18","DOIUrl":"https://doi.org/10.1109/PRDC.2006.18","url":null,"abstract":"Automated diagnosis of software faults can improve the efficiency of the debugging process, and is therefore an important technique for the development of dependable software. In this paper we study different similarity coefficients that are applied in the context of a program spectral approach to software fault localization (single programming mistakes). The coefficients studied are taken from the systems diagnosis/automated debugging tools Pinpoint, Tarantula, and AMPLE, and from the molecular biology domain (the Ochiai coefficient). We evaluate these coefficients on the Siemens Suite of benchmark faults, and assess their effectiveness in terms of the position of the actual fault in the probability ranking of fault candidates produced by the diagnosis technique. Our experiments indicate that the Ochiai coefficient consistently outperforms the coefficients currently used by the tools mentioned. In terms of the amount of code that needs to be inspected, this coefficient improves 5% on average over the next best technique, and up to 30% in specific cases","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129769707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 467
Ontology based IT-security planning 基于本体的it安全规划
Stefan Fenz, E. Weippl
IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-security approach. We thus propose a security ontology, to provide a solid base for an applicable and holistic IT-security approach for SMEs, enabling low-cost risk management and threat analysis
资讯科技保安已成为一个多元化的范畴,而中小型企业尤其没有足够的财力推行全面的资讯科技保安措施。因此,我们提出了一个安全本体,为中小企业提供一个适用的、全面的it安全方法提供坚实的基础,从而实现低成本的风险管理和威胁分析
{"title":"Ontology based IT-security planning","authors":"Stefan Fenz, E. Weippl","doi":"10.1109/PRDC.2006.49","DOIUrl":"https://doi.org/10.1109/PRDC.2006.49","url":null,"abstract":"IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-security approach. We thus propose a security ontology, to provide a solid base for an applicable and holistic IT-security approach for SMEs, enabling low-cost risk management and threat analysis","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
On the fly estimation of the processes that are alive/crashed in an asynchronous message-passing system 对异步消息传递系统中活动/崩溃的进程进行动态估计
A. Mostéfaoui, M. Raynal, Gilles Trédan
It is well-known that, in an asynchronous system where processes are prone to crash, it is impossible to design a protocol that provides each process with the set of processes that are currently alive. Basically, this comes from the fact that it is impossible to distinguish a crashed process from a process that is very slow or with which communications are very slow. Nevertheless, designing protocols that provide the processes with good approximations of the set of processes that are currently alive remains a real challenge in fault-tolerant distributed computing. This paper proposes such a protocol. To that end, it considers a realistic computation model where the processes are provided with non-synchronized local clocks and a function alpha(). That function takes a local duration as a parameter, and returns an integer that is an estimate of the number of processes that can crash during that duration. A simulation-based experimental evaluation of the protocol is also presented. The experiments show that the protocol is practically relevant
众所周知,在进程容易崩溃的异步系统中,不可能设计一个协议,为每个进程提供当前活动的进程集。基本上,这是因为不可能将崩溃的进程与非常慢的进程或与之通信非常慢的进程区分开来。然而,在容错分布式计算中,设计为进程提供与当前活动的进程集良好近似的协议仍然是一个真正的挑战。本文提出了这样一个协议。为此,它考虑了一个现实的计算模型,其中为进程提供了非同步的本地时钟和函数alpha()。该函数将本地持续时间作为参数,并返回一个整数,该整数表示在该持续时间内可能崩溃的进程数量的估计值。本文还对该协议进行了基于仿真的实验评估。实验结果表明,该方案具有实际意义
{"title":"On the fly estimation of the processes that are alive/crashed in an asynchronous message-passing system","authors":"A. Mostéfaoui, M. Raynal, Gilles Trédan","doi":"10.1109/PRDC.2006.48","DOIUrl":"https://doi.org/10.1109/PRDC.2006.48","url":null,"abstract":"It is well-known that, in an asynchronous system where processes are prone to crash, it is impossible to design a protocol that provides each process with the set of processes that are currently alive. Basically, this comes from the fact that it is impossible to distinguish a crashed process from a process that is very slow or with which communications are very slow. Nevertheless, designing protocols that provide the processes with good approximations of the set of processes that are currently alive remains a real challenge in fault-tolerant distributed computing. This paper proposes such a protocol. To that end, it considers a realistic computation model where the processes are provided with non-synchronized local clocks and a function alpha(). That function takes a local duration as a parameter, and returns an integer that is an estimate of the number of processes that can crash during that duration. A simulation-based experimental evaluation of the protocol is also presented. The experiments show that the protocol is practically relevant","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132086294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1