首页 > 最新文献

Joint Conference on Lexical and Computational Semantics最新文献

英文 中文
Secure event types in content-based, multi-domain publish/subscribe systems 基于内容的多域发布/订阅系统中的安全事件类型
Pub Date : 2005-09-05 DOI: 10.1145/1108473.1108495
Lauri I. W. Pesonen, J. Bacon
Publish/subscribe research has so far been mostly focused on efficient event routing, event filtering, and composite event detection. The little research that has been published regarding security in publish/subscribe systems has been tentative at best. This paper presents a model for secure type names, and definitions for type-checked, content-based publish/subscribe systems. Our model provides a cryptographically verifiable binding between type names and type definitions. It also produces self-certifiable type definitions that guarantee type definition authenticity and integrity. We also consider type management in a large-scale publish/subscribe system and present a way for delegating management duties to type managers by issuing SPKI authorisation certificates. We feel that secure names are a prerequisite for most other security related work with publish/subscribe systems.
到目前为止,发布/订阅研究主要集中在有效的事件路由、事件过滤和组合事件检测上。已经发表的关于发布/订阅系统安全性的少量研究充其量只是试探性的。本文提出了一个安全类型名称的模型,以及类型检查、基于内容的发布/订阅系统的定义。我们的模型在类型名称和类型定义之间提供了一种加密可验证的绑定。它还生成可自我认证的类型定义,以保证类型定义的真实性和完整性。我们还考虑了大规模发布/订阅系统中的类型管理,并提出了一种通过颁发SPKI授权证书将管理职责委托给类型管理器的方法。我们认为安全名称是与发布/订阅系统相关的大多数其他安全工作的先决条件。
{"title":"Secure event types in content-based, multi-domain publish/subscribe systems","authors":"Lauri I. W. Pesonen, J. Bacon","doi":"10.1145/1108473.1108495","DOIUrl":"https://doi.org/10.1145/1108473.1108495","url":null,"abstract":"Publish/subscribe research has so far been mostly focused on efficient event routing, event filtering, and composite event detection. The little research that has been published regarding security in publish/subscribe systems has been tentative at best. This paper presents a model for secure type names, and definitions for type-checked, content-based publish/subscribe systems. Our model provides a cryptographically verifiable binding between type names and type definitions. It also produces self-certifiable type definitions that guarantee type definition authenticity and integrity. We also consider type management in a large-scale publish/subscribe system and present a way for delegating management duties to type managers by issuing SPKI authorisation certificates. We feel that secure names are a prerequisite for most other security related work with publish/subscribe systems.","PeriodicalId":344435,"journal":{"name":"Joint Conference on Lexical and Computational Semantics","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127248479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A middleware for autonomic QoS management based on learning 基于学习的自主QoS管理中间件
Pub Date : 2005-09-05 DOI: 10.1145/1108473.1108475
P. Vienne, J. Sourrouille
In any system, applications compete for a limited amount of resources. As long as there are enough resources, resource sharing based on a best effort policy is satisfactory. When resources become scarce, the system gives rise to uncontrol-lable degradations. From a global view of the system and according to the degrees of freedom of applications, Quality of Service (QoS) managers aim to adapt application behavior to deal with overload effects.This paper proposes a middleware for autonomic QoS management of a system in a dynamic environment. It associates a reinforcement learning technique with a control mechanism to improve and adapt the QoS management policy in an execution context that changes unexpectedly. The simulation of the QoS management of a set of heterogeneous applications illustrates our results.
在任何系统中,应用程序都要争夺有限的资源。只要有足够的资源,基于尽力而为策略的资源共享是令人满意的。当资源变得稀缺时,系统会产生无法控制的退化。从系统的全局视图出发,根据应用程序的自由度,服务质量(QoS)管理人员的目标是调整应用程序的行为以处理过载效应。提出了一种用于动态环境下系统自主QoS管理的中间件。它将强化学习技术与控制机制相关联,以在意外变化的执行上下文中改进和适应QoS管理策略。对一组异构应用程序的QoS管理的仿真验证了我们的结果。
{"title":"A middleware for autonomic QoS management based on learning","authors":"P. Vienne, J. Sourrouille","doi":"10.1145/1108473.1108475","DOIUrl":"https://doi.org/10.1145/1108473.1108475","url":null,"abstract":"In any system, applications compete for a limited amount of resources. As long as there are enough resources, resource sharing based on a best effort policy is satisfactory. When resources become scarce, the system gives rise to uncontrol-lable degradations. From a global view of the system and according to the degrees of freedom of applications, Quality of Service (QoS) managers aim to adapt application behavior to deal with overload effects.This paper proposes a middleware for autonomic QoS management of a system in a dynamic environment. It associates a reinforcement learning technique with a control mechanism to improve and adapt the QoS management policy in an execution context that changes unexpectedly. The simulation of the QoS management of a set of heterogeneous applications illustrates our results.","PeriodicalId":344435,"journal":{"name":"Joint Conference on Lexical and Computational Semantics","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125155305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Optimizing layered middleware 优化分层中间件
Pub Date : 2005-09-05 DOI: 10.1145/1108473.1108481
Ö. Demir, Premkumar T. Devanbu, E. Wohlstadter, S. Tai
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, request dispatching, thread management, etc. Layered architecture helps in the development and evolution of the middleware. It also provides tactical side-benefits: layers provide convenient protection boundaries for enforcing security policies. However, the benefits of this layered structure come at a cost. Layered designs can hinder performance-related optimizations, and actually make it more difficult to adapt systems to conveniently address late-bound requirements such as dependability, access control, virus protection, and so on. We present some examples of this issue, and outline a new approach, under investigation at UC Davis, which includes ideas in middleware, architectures, and programming models.
中间件通常使用分层的体系结构风格构建。分层设计为中间件的不同关注点提供了良好的分离,例如通信、封送、请求调度、线程管理等。分层体系结构有助于中间件的开发和发展。它还提供了战术上的附带好处:层为执行安全策略提供了方便的保护边界。然而,这种分层结构的好处是有代价的。分层设计可能阻碍与性能相关的优化,并且实际上使调整系统以方便地处理后期需求(如可靠性、访问控制、病毒防护等)变得更加困难。我们提出了这个问题的一些例子,并概述了一种新的方法,该方法正在加州大学戴维斯分校进行研究,其中包括中间件、体系结构和编程模型方面的思想。
{"title":"Optimizing layered middleware","authors":"Ö. Demir, Premkumar T. Devanbu, E. Wohlstadter, S. Tai","doi":"10.1145/1108473.1108481","DOIUrl":"https://doi.org/10.1145/1108473.1108481","url":null,"abstract":"Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, request dispatching, thread management, etc. Layered architecture helps in the development and evolution of the middleware. It also provides tactical side-benefits: layers provide convenient protection boundaries for enforcing security policies. However, the benefits of this layered structure come at a cost. Layered designs can hinder performance-related optimizations, and actually make it more difficult to adapt systems to conveniently address late-bound requirements such as dependability, access control, virus protection, and so on. We present some examples of this issue, and outline a new approach, under investigation at UC Davis, which includes ideas in middleware, architectures, and programming models.","PeriodicalId":344435,"journal":{"name":"Joint Conference on Lexical and Computational Semantics","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131882848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experiences in coverage testing of a Java middleware 有Java中间件覆盖测试的经验
Pub Date : 2005-09-05 DOI: 10.1145/1108473.1108483
M. Kessis, Y. Ledru, G. Vandome
This paper addresses the issues of test coverage analysis of J2EE [22] servers. These middleware are nowadays at the core of the modern information technology's landscape. They provide enterprise applications with several non functional services such as security, persistence, transaction, messaging, etc. In several cases, J2EE servers play a critical role when applied to e-business or banking applications. Therefore, ensuring the quality of such software layers becomes an essential requirement. However, in industrial context, professional middleware software are highly complicated and have a huge size which makes their maintenance and quality management a big challenge for testers and quality managers. The aim of this paper is to present our test and coverage analysis case study with and the JOnAS [23] J2EE server. The challenges of this work result from the size of the test suites and the size of the tested middleware (200,000 lines of code (LOC) for JOnAS)
本文讨论了J2EE[22]服务器的测试覆盖率分析问题。这些中间件现在是现代信息技术领域的核心。它们为企业应用程序提供一些非功能性服务,如安全性、持久性、事务、消息传递等。在一些情况下,J2EE服务器在应用于电子商务或银行应用程序时起着关键作用。因此,确保这些软件层的质量成为一项基本要求。然而,在工业环境中,专业中间件软件高度复杂且规模巨大,这使得它们的维护和质量管理对测试人员和质量管理人员来说是一个巨大的挑战。本文的目的是介绍我们使用JOnAS [23] J2EE服务器进行测试和覆盖率分析的案例研究。这项工作的挑战来自测试套件的大小和测试中间件的大小(JOnAS的200,000行代码(LOC))。
{"title":"Experiences in coverage testing of a Java middleware","authors":"M. Kessis, Y. Ledru, G. Vandome","doi":"10.1145/1108473.1108483","DOIUrl":"https://doi.org/10.1145/1108473.1108483","url":null,"abstract":"This paper addresses the issues of test coverage analysis of J2EE [22] servers. These middleware are nowadays at the core of the modern information technology's landscape. They provide enterprise applications with several non functional services such as security, persistence, transaction, messaging, etc. In several cases, J2EE servers play a critical role when applied to e-business or banking applications. Therefore, ensuring the quality of such software layers becomes an essential requirement. However, in industrial context, professional middleware software are highly complicated and have a huge size which makes their maintenance and quality management a big challenge for testers and quality managers. The aim of this paper is to present our test and coverage analysis case study with and the JOnAS [23] J2EE server. The challenges of this work result from the size of the test suites and the size of the tested middleware (200,000 lines of code (LOC) for JOnAS)","PeriodicalId":344435,"journal":{"name":"Joint Conference on Lexical and Computational Semantics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134123185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Dynamic adapter generation for data integration middleware 数据集成中间件的动态适配器生成
Pub Date : 2005-09-05 DOI: 10.1145/1108473.1108476
P. Gong, I. Gorton, D. Feng
Relatively mature integration technologies are available that make application integration tractable from an engineering perspective. However, integrating multiple heterogeneous data sources into applications is still a time-consuming, costly and error-prone engineering task, because existing integration technologies are based on static integration architectures. Such architectures tightly couple a data source to the data integration infrastructure. This paper describes the architecture and evolving prototype implementation of the Data Concierge, which provides a dynamic solution to integrate heterogeneous data sources. The core architecture and mechanisms in the Data Concierge can be used for dynamically attaching to a previously unidentified source of information, without the need for a pre-existing adapter component. In this paper, an ontology based API description mechanism supported by the Data Concierge is described, along with the architecture and prototype tools for describing the metadata necessary to facilitate dynamic integration. The use of an ontology and associated state machine to generate API calls to access data sources is illustrated using an FTP data source.
相对成熟的集成技术可以使应用程序集成从工程的角度来看易于处理。然而,将多个异构数据源集成到应用程序中仍然是一项耗时、昂贵且容易出错的工程任务,因为现有的集成技术是基于静态集成体系结构的。这种体系结构将数据源与数据集成基础设施紧密耦合在一起。本文描述了Data Concierge的体系结构和不断发展的原型实现,它提供了一种集成异构数据源的动态解决方案。Data Concierge中的核心体系结构和机制可用于动态地附加到以前未标识的信息源,而不需要预先存在的适配器组件。在本文中,描述了由Data Concierge支持的基于本体的API描述机制,以及用于描述促进动态集成所需的元数据的体系结构和原型工具。使用一个FTP数据源说明了如何使用本体和关联状态机生成API调用来访问数据源。
{"title":"Dynamic adapter generation for data integration middleware","authors":"P. Gong, I. Gorton, D. Feng","doi":"10.1145/1108473.1108476","DOIUrl":"https://doi.org/10.1145/1108473.1108476","url":null,"abstract":"Relatively mature integration technologies are available that make application integration tractable from an engineering perspective. However, integrating multiple heterogeneous data sources into applications is still a time-consuming, costly and error-prone engineering task, because existing integration technologies are based on static integration architectures. Such architectures tightly couple a data source to the data integration infrastructure. This paper describes the architecture and evolving prototype implementation of the Data Concierge, which provides a dynamic solution to integrate heterogeneous data sources. The core architecture and mechanisms in the Data Concierge can be used for dynamically attaching to a previously unidentified source of information, without the need for a pre-existing adapter component. In this paper, an ontology based API description mechanism supported by the Data Concierge is described, along with the architecture and prototype tools for describing the metadata necessary to facilitate dynamic integration. The use of an ontology and associated state machine to generate API calls to access data sources is illustrated using an FTP data source.","PeriodicalId":344435,"journal":{"name":"Joint Conference on Lexical and Computational Semantics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126090785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A flexible and extensible object middleware: CORBA and beyond 灵活且可扩展的对象中间件:CORBA及其他
Pub Date : 2005-09-05 DOI: 10.1145/1108473.1108489
F. Hauck, R. Kapitza, Hans P. Reiser, Andreas I. Schmied
This paper presents a CORBA-compliant middleware architecture that is more flexible and extensible compared to standard CORBA. The portable design of this architecture is easily integrated in any standard CORBA middleware; for this purpose, mainly the handling of object references (IORs) has to be changed. To encapsulate those changes, we introduce the concept of a generic reference manager with portable profile managers. Profile managers are pluggable and in extreme can be downloaded on demand. To illustrate the use of this approach, we present a profile manager implementation for fragmented objects and another one for bridging CORBA to the Jini world. The first profile manager supports truly distributed objects, which allow seamless integration of partitioning, scalability, fault tolerance, end-to-end quality of service, and many more implementation aspects into a distributed object without losing distribution and location transparency. The second profile manager illustrates how our architecture enables fully transparent access from CORBA applications to services on non-CORBA platforms.
本文提出了一种与CORBA兼容的中间件体系结构,与标准CORBA相比,它更加灵活和可扩展。这种体系结构的可移植设计很容易集成到任何标准的CORBA中间件中;为此,主要需要改变对象引用(ior)的处理。为了封装这些更改,我们引入了带有可移植配置文件管理器的通用引用管理器的概念。配置文件管理器是可插拔的,在极端情况下可以按需下载。为了说明这种方法的使用,我们给出了一个用于碎片化对象的概要管理器实现,以及另一个用于将CORBA连接到Jini世界的概要管理器实现。第一个配置文件管理器支持真正的分布式对象,它允许将分区、可伸缩性、容错、端到端服务质量以及许多其他实现方面无缝集成到分布式对象中,而不会失去分布和位置的透明性。第二个概要管理器说明了我们的体系结构如何支持从CORBA应用程序到非CORBA平台上的服务的完全透明访问。
{"title":"A flexible and extensible object middleware: CORBA and beyond","authors":"F. Hauck, R. Kapitza, Hans P. Reiser, Andreas I. Schmied","doi":"10.1145/1108473.1108489","DOIUrl":"https://doi.org/10.1145/1108473.1108489","url":null,"abstract":"This paper presents a CORBA-compliant middleware architecture that is more flexible and extensible compared to standard CORBA. The portable design of this architecture is easily integrated in any standard CORBA middleware; for this purpose, mainly the handling of object references (IORs) has to be changed. To encapsulate those changes, we introduce the concept of a generic reference manager with portable profile managers. Profile managers are pluggable and in extreme can be downloaded on demand. To illustrate the use of this approach, we present a profile manager implementation for fragmented objects and another one for bridging CORBA to the Jini world. The first profile manager supports truly distributed objects, which allow seamless integration of partitioning, scalability, fault tolerance, end-to-end quality of service, and many more implementation aspects into a distributed object without losing distribution and location transparency. The second profile manager illustrates how our architecture enables fully transparent access from CORBA applications to services on non-CORBA platforms.","PeriodicalId":344435,"journal":{"name":"Joint Conference on Lexical and Computational Semantics","volume":"70 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120844078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Portable, efficient, and accurate sampling profiling for java-based middleware 用于基于java的中间件的可移植、高效和准确的抽样分析
Pub Date : 2005-09-05 DOI: 10.1145/1108473.1108484
Walter Binder
This paper presents innovative program transformations for the efficient and accurate profiling of Java programs. The profiling is based on a deterministic sampling mechanism that exploits the number of executed JVM bytecode instructions to trigger a user-defined profiling agent in order to process samples of the call stack. The instrumentation is entirely portable, profiles are reproducible, and the sampling rate can be dynamically tuned. Moderate overhead and high profile accuracy make the profiling framework attractive for developers of complex systems, such as application servers.
本文提出了一种新颖的程序转换方法,用于高效、准确地分析Java程序。该分析基于确定性采样机制,该机制利用执行的JVM字节码指令的数量来触发用户定义的分析代理,以便处理调用堆栈的样本。仪器是完全可移植的,配置文件是可重复的,采样率可以动态调整。适中的开销和较高的配置精度使得分析框架对复杂系统(如应用服务器)的开发人员具有吸引力。
{"title":"Portable, efficient, and accurate sampling profiling for java-based middleware","authors":"Walter Binder","doi":"10.1145/1108473.1108484","DOIUrl":"https://doi.org/10.1145/1108473.1108484","url":null,"abstract":"This paper presents innovative program transformations for the efficient and accurate profiling of Java programs. The profiling is based on a deterministic sampling mechanism that exploits the number of executed JVM bytecode instructions to trigger a user-defined profiling agent in order to process samples of the call stack. The instrumentation is entirely portable, profiles are reproducible, and the sampling rate can be dynamically tuned. Moderate overhead and high profile accuracy make the profiling framework attractive for developers of complex systems, such as application servers.","PeriodicalId":344435,"journal":{"name":"Joint Conference on Lexical and Computational Semantics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122088538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Exception handling in component composition with the support of middleware 在中间件的支持下,组件组合中的异常处理
Pub Date : 2005-09-05 DOI: 10.1145/1108473.1108493
Yao-Dong Feng, Gang Huang, Yali Zhu, Hong Mei
Exception handling is a practical and important way to improve the reliability of a software system. In component based software engineering, exceptions are usually handled by the developers of reusable components. However, many exceptions are dependent on the context of a component in the target system. Such exceptions are difficult and sometimes impossible to be handled at the stage of development of reusable components. On the other hand, we found out that many exceptions can be successfully handled by some special mechanisms of middleware. In this paper, an approach to handling the exceptions in the component composition with the support of middleware is proposed. We define an exception handling model complementary to the software architecture for identifying and analyzing the exceptions and taking the knowledge of supporting middleware into the decision of exception handling. The feasibility and effectiveness of the approach are demonstrated through a J2EE blueprint program.
异常处理是提高软件系统可靠性的一种实用而重要的方法。在基于组件的软件工程中,异常通常由可重用组件的开发人员处理。然而,许多异常依赖于目标系统中组件的上下文。在可重用组件的开发阶段,这种异常很难处理,有时甚至不可能处理。另一方面,我们发现通过中间件的一些特殊机制可以成功地处理许多异常。本文提出了一种基于中间件的构件组合异常处理方法。我们定义了一个与软件体系结构互补的异常处理模型,用于识别和分析异常,并将支持中间件的知识纳入异常处理的决策中。通过J2EE蓝图程序验证了该方法的可行性和有效性。
{"title":"Exception handling in component composition with the support of middleware","authors":"Yao-Dong Feng, Gang Huang, Yali Zhu, Hong Mei","doi":"10.1145/1108473.1108493","DOIUrl":"https://doi.org/10.1145/1108473.1108493","url":null,"abstract":"Exception handling is a practical and important way to improve the reliability of a software system. In component based software engineering, exceptions are usually handled by the developers of reusable components. However, many exceptions are dependent on the context of a component in the target system. Such exceptions are difficult and sometimes impossible to be handled at the stage of development of reusable components. On the other hand, we found out that many exceptions can be successfully handled by some special mechanisms of middleware. In this paper, an approach to handling the exceptions in the component composition with the support of middleware is proposed. We define an exception handling model complementary to the software architecture for identifying and analyzing the exceptions and taking the knowledge of supporting middleware into the decision of exception handling. The feasibility and effectiveness of the approach are demonstrated through a J2EE blueprint program.","PeriodicalId":344435,"journal":{"name":"Joint Conference on Lexical and Computational Semantics","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131908025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Using parse tree validation to prevent SQL injection attacks 使用解析树验证来防止SQL注入攻击
Pub Date : 2005-09-05 DOI: 10.1145/1108473.1108496
G. Buehrer, B. Weide, P. Sivilotti
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input in database requests, typically SQL statements. In SQL injection, the attacker provides user input that results in a different database request than was intended by the application programmer. That is, the interpretation of the user input as part of a larger SQL statement, results in an SQL statement of a different form than originally intended. We describe a technique to prevent this kind of manipulation and hence eliminate SQL injection vulnerabilities. The technique is based on comparing, at run time, the parse tree of the SQL statement before inclusion of user input with that resulting after inclusion of input. Our solution is efficient, adding about 3 ms overhead to database query costs. In addition, it is easily adopted by application programmers, having the same syntactic structure as current popular record set retrieval methods. For empirical analysis, we provide a case study of our solution in J2EE. We implement our solution in a simple static Java class, and show its effectiveness and scalability.
SQL注入攻击的目标是使用数据库服务的交互式web应用程序。这类应用程序接受用户输入,例如表单字段,然后将此输入包含在数据库请求(通常是SQL语句)中。在SQL注入中,攻击者提供的用户输入会产生与应用程序程序员所期望的不同的数据库请求。也就是说,将用户输入解释为更大的SQL语句的一部分,会导致SQL语句的形式与最初预期的不同。我们描述了一种防止此类操作的技术,从而消除了SQL注入漏洞。该技术基于在运行时将包含用户输入之前的SQL语句解析树与包含输入之后的结果进行比较。我们的解决方案是高效的,增加了大约3毫秒的数据库查询开销。此外,它很容易被应用程序程序员采用,与当前流行的记录集检索方法具有相同的语法结构。为了进行实证分析,我们提供了一个J2EE解决方案的案例研究。我们在一个简单的静态Java类中实现了我们的解决方案,并展示了它的有效性和可伸缩性。
{"title":"Using parse tree validation to prevent SQL injection attacks","authors":"G. Buehrer, B. Weide, P. Sivilotti","doi":"10.1145/1108473.1108496","DOIUrl":"https://doi.org/10.1145/1108473.1108496","url":null,"abstract":"An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input in database requests, typically SQL statements. In SQL injection, the attacker provides user input that results in a different database request than was intended by the application programmer. That is, the interpretation of the user input as part of a larger SQL statement, results in an SQL statement of a different form than originally intended. We describe a technique to prevent this kind of manipulation and hence eliminate SQL injection vulnerabilities. The technique is based on comparing, at run time, the parse tree of the SQL statement before inclusion of user input with that resulting after inclusion of input. Our solution is efficient, adding about 3 ms overhead to database query costs. In addition, it is easily adopted by application programmers, having the same syntactic structure as current popular record set retrieval methods. For empirical analysis, we provide a case study of our solution in J2EE. We implement our solution in a simple static Java class, and show its effectiveness and scalability.","PeriodicalId":344435,"journal":{"name":"Joint Conference on Lexical and Computational Semantics","volume":"551 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115246011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 456
Striving for versatility in publish/subscribe infrastructures 努力实现发布/订阅基础设施的多功能性
Pub Date : 2005-09-05 DOI: 10.1145/1108473.1108478
R. S. Filho, D. Redmiles
Publish/subscribe infrastructures are used as the basic communication and integration framework in many application domains. The majority of those infrastructures, however, fall short of mechanisms that allow their customization and configuration to comply with the requirements of those application domains. In other words, they are not versatile enough to support new and evolving requirements demanded by different applications. The YANCEES (Yet ANother Configurable Extensible Event Service) addresses these versatility issues by relying on a combination of plug-in oriented architecture and extensible languages decomposed over different design dimensions of a publish/subscribe infrastructure. We demonstrate our approach, showing how the YANCEES platform can be useful in reducing the customization, extension and implementation effort of different publish/subscribe infrastructures to attend the demands of many application domains.
在许多应用程序领域中,发布/订阅基础结构被用作基本的通信和集成框架。然而,这些基础结构中的大多数缺乏允许其定制和配置以符合这些应用程序域需求的机制。换句话说,它们不够通用,无法支持不同应用程序所要求的新的和不断发展的需求。yanees (Yet ANother Configurable Extensible Event Service,另一种可配置可扩展事件服务)通过将面向插件的体系结构和可扩展语言结合起来,分解为发布/订阅基础设施的不同设计维度,从而解决了这些多功能性问题。我们演示了我们的方法,展示了YANCEES平台如何在减少定制、扩展和实现不同发布/订阅基础设施的工作方面发挥作用,以满足许多应用程序领域的需求。
{"title":"Striving for versatility in publish/subscribe infrastructures","authors":"R. S. Filho, D. Redmiles","doi":"10.1145/1108473.1108478","DOIUrl":"https://doi.org/10.1145/1108473.1108478","url":null,"abstract":"Publish/subscribe infrastructures are used as the basic communication and integration framework in many application domains. The majority of those infrastructures, however, fall short of mechanisms that allow their customization and configuration to comply with the requirements of those application domains. In other words, they are not versatile enough to support new and evolving requirements demanded by different applications. The YANCEES (Yet ANother Configurable Extensible Event Service) addresses these versatility issues by relying on a combination of plug-in oriented architecture and extensible languages decomposed over different design dimensions of a publish/subscribe infrastructure. We demonstrate our approach, showing how the YANCEES platform can be useful in reducing the customization, extension and implementation effort of different publish/subscribe infrastructures to attend the demands of many application domains.","PeriodicalId":344435,"journal":{"name":"Joint Conference on Lexical and Computational Semantics","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125190082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
Joint Conference on Lexical and Computational Semantics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1