首页 > 最新文献

2009 IEEE International Symposium on Parallel and Distributed Processing with Applications最新文献

英文 中文
A Replacement Algorithm Designed for the Web Search Engine and Its Application in Storage Cache Web搜索引擎的替换算法及其在存储缓存中的应用
Xiaoxuan Meng, Chengxiang Si, Xiaoming Han, Jiangang Zhang, Lu Xu
With popularity of different kind of search engines on WWW, it requires the backend storage system to provide better physical I/O performance to speedup the query service perceived by end users. However, existing general purpose designed replacement algorithm can’t performs well for the web search applications. This paper first studies the access pattern of various real-life web search workload and then propose a new replacement algorithm RED-LRU based on the observed access properties. The simulation results shows that our proposed algorithm uniformly outperform the other replacement algorithms for all the workloads and cache size. To validate the simulation results, we integrate RED-LRU algorithm into a real storage cache DPCache. The experiment results in real system confirm the effectiveness of our proposed algorithm in improving the caching performance for web search application. Moreover, the runtime overhead of RED-LRU is also fairly low in practice.
随着WWW上各种搜索引擎的普及,要求后端存储系统提供更好的物理I/O性能,以提高最终用户感知到的查询服务的速度。然而,现有的通用替换算法在网络搜索应用中表现不佳。本文首先研究了现实生活中各种web搜索工作负载的访问模式,然后基于观察到的访问属性,提出了一种新的替换算法RED-LRU。仿真结果表明,对于所有的工作负载和缓存大小,我们提出的算法均优于其他替换算法。为了验证仿真结果,我们将RED-LRU算法集成到实际的存储缓存DPCache中。在实际系统中的实验结果证实了本文算法在提高web搜索应用的缓存性能方面的有效性。此外,在实践中,RED-LRU的运行时开销也相当低。
{"title":"A Replacement Algorithm Designed for the Web Search Engine and Its Application in Storage Cache","authors":"Xiaoxuan Meng, Chengxiang Si, Xiaoming Han, Jiangang Zhang, Lu Xu","doi":"10.1109/ISPA.2009.36","DOIUrl":"https://doi.org/10.1109/ISPA.2009.36","url":null,"abstract":"With popularity of different kind of search engines on WWW, it requires the backend storage system to provide better physical I/O performance to speedup the query service perceived by end users. However, existing general purpose designed replacement algorithm can’t performs well for the web search applications. This paper first studies the access pattern of various real-life web search workload and then propose a new replacement algorithm RED-LRU based on the observed access properties. The simulation results shows that our proposed algorithm uniformly outperform the other replacement algorithms for all the workloads and cache size. To validate the simulation results, we integrate RED-LRU algorithm into a real storage cache DPCache. The experiment results in real system confirm the effectiveness of our proposed algorithm in improving the caching performance for web search application. Moreover, the runtime overhead of RED-LRU is also fairly low in practice.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115588887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Semantic Security Policy for Web Service Web服务的语义安全策略
He Zheng-qiu, Wu Li-fa, Hong Zheng, Lai Hai-guang
A primary problem for the security of web service is how to precisely express and match the security policy of each participant that may be in different security domain. Presently, most schemes use syntactic approaches, where pairs of policies are compared for structural and syntactic similarity to determine compatibility, which is prone to result in false negative because of lacking semantics. In this paper, we propose a novel approach to express and match the security policy of web service based on semantics. Through constructing a general security ontology, we present the definition method and matching algorithm of semantic security policy for web service. The use of semantic security policy enables richer representations of policy intent and allows matching of policies with compatible intent, but dissimilar syntax, which is not possible with syntactic approaches. The proposed security ontology is extensible and the semantic security policy is of strong inferability and adaptability, and these characteristics are extremely important to the heterogeneous and dynamic environment of web service.
web服务安全性的一个主要问题是如何精确地表达和匹配可能处于不同安全域中的每个参与者的安全策略。目前,大多数方案采用语法方法,通过比较策略对的结构和语法相似性来确定兼容性,由于缺乏语义,容易产生假阴性。本文提出了一种基于语义的web服务安全策略表达和匹配的新方法。通过构建通用安全本体,提出了web服务语义安全策略的定义方法和匹配算法。语义安全策略的使用支持更丰富的策略意图表示,并允许匹配具有兼容意图但语法不同的策略,这是语法方法无法实现的。本文提出的安全本体具有可扩展性,语义安全策略具有较强的可推演性和适应性,这些特点对web服务的异构动态环境至关重要。
{"title":"Semantic Security Policy for Web Service","authors":"He Zheng-qiu, Wu Li-fa, Hong Zheng, Lai Hai-guang","doi":"10.1109/ISPA.2009.10","DOIUrl":"https://doi.org/10.1109/ISPA.2009.10","url":null,"abstract":"A primary problem for the security of web service is how to precisely express and match the security policy of each participant that may be in different security domain. Presently, most schemes use syntactic approaches, where pairs of policies are compared for structural and syntactic similarity to determine compatibility, which is prone to result in false negative because of lacking semantics. In this paper, we propose a novel approach to express and match the security policy of web service based on semantics. Through constructing a general security ontology, we present the definition method and matching algorithm of semantic security policy for web service. The use of semantic security policy enables richer representations of policy intent and allows matching of policies with compatible intent, but dissimilar syntax, which is not possible with syntactic approaches. The proposed security ontology is extensible and the semantic security policy is of strong inferability and adaptability, and these characteristics are extremely important to the heterogeneous and dynamic environment of web service.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"434 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116007627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Block-Based In-Place Replacement Strategy for x86 Sensitive Instructions in Virtual Machine 基于块的x86虚拟机敏感指令就地替换策略
Yusong Tan, Weihua Zhang, Q. Wu
It is trendy that virtualization technology is adopted by server and desktop computers recently. Binary translation is an important method to implement full virtualization supporting any guest operating system without modification. Traditional methods use trap or interrupt to catch sensitive instruction's execution. Its performance is influenced by trap's context switch overhead. This article proposes a novel code scanning and replacing strategy, named as Block-based In-Place Replacement. BIPR tries to find a code block whose length is longer than 5 bytes and replaces the block with 5-bytes JMP instruction. The translated code block has same run-time mode as original code. As a result, BIPR's cost is lower than traditional trap methods. Moreover, it gives an optimize strategy, i.e. Super Block-based In-Place Replacement, to reduce unnecessary translation overhead of BIPR and get better performances. Experiment results prove that SBIPR performs pretty.
近年来,服务器和台式计算机采用虚拟化技术已成为一种潮流。二进制转换是实现完全虚拟化的一种重要方法,可以支持任何客户机操作系统而无需修改。传统的方法使用陷阱或中断来捕捉敏感指令的执行。它的性能受到trap上下文切换开销的影响。本文提出了一种新的代码扫描和替换策略,称为基于块的就地替换。BIPR试图找到长度大于5字节的代码块,并用5字节的JMP指令替换该代码块。翻译后的代码块具有与原始代码相同的运行时模式。因此,BIPR的成本低于传统的捕集器方法。并提出了一种优化策略,即基于超级块的就地替换,以减少不必要的翻译开销,获得更好的性能。实验结果表明,该方法具有良好的性能。
{"title":"Block-Based In-Place Replacement Strategy for x86 Sensitive Instructions in Virtual Machine","authors":"Yusong Tan, Weihua Zhang, Q. Wu","doi":"10.1109/ISPA.2009.33","DOIUrl":"https://doi.org/10.1109/ISPA.2009.33","url":null,"abstract":"It is trendy that virtualization technology is adopted by server and desktop computers recently. Binary translation is an important method to implement full virtualization supporting any guest operating system without modification. Traditional methods use trap or interrupt to catch sensitive instruction's execution. Its performance is influenced by trap's context switch overhead. This article proposes a novel code scanning and replacing strategy, named as Block-based In-Place Replacement. BIPR tries to find a code block whose length is longer than 5 bytes and replaces the block with 5-bytes JMP instruction. The translated code block has same run-time mode as original code. As a result, BIPR's cost is lower than traditional trap methods. Moreover, it gives an optimize strategy, i.e. Super Block-based In-Place Replacement, to reduce unnecessary translation overhead of BIPR and get better performances. Experiment results prove that SBIPR performs pretty.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132607645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Active Attacks on Reputable Mix Networks 对信誉良好的混合网络的主动攻击
LongHai Li, Shaofeng Fu, XiangQuan Che
A mix network is a cryptographic construction for anonymous communications. In addition to anonymity, a reputable mix network first defined by Golle offers a reputation property: the mix-net can prove that every message it outputs corresponds to an input submitted by a user without revealing which input. This property can shield the mix-net from liability in the event that an output message is objectionable or illegal. In this work we analyze two reputable ElGamal based mix-net schemes proposed by Golle and present two active attacks for them. Our attacks rely on the homomorphism properties of RSA signature and ElGamal cryptosystem and can break the reputation properties of those schemes. We also show how to counter our attacks by using secure hash functions.
混合网络是一种用于匿名通信的加密结构。除了匿名性,一个由Golle首先定义的有信誉的混合网络提供了一个声誉属性:混合网络可以证明它输出的每条消息都对应于用户提交的输入,而不透露是哪个输入。在输出消息令人反感或非法的情况下,此属性可以使mix-net免于承担责任。在这项工作中,我们分析了Golle提出的两个著名的基于ElGamal的混合网络方案,并提出了两个针对它们的主动攻击。我们的攻击依赖于RSA签名和ElGamal密码系统的同态特性,可以破坏这些方案的信誉特性。我们还将展示如何通过使用安全散列函数来对抗攻击。
{"title":"Active Attacks on Reputable Mix Networks","authors":"LongHai Li, Shaofeng Fu, XiangQuan Che","doi":"10.1109/ISPA.2009.38","DOIUrl":"https://doi.org/10.1109/ISPA.2009.38","url":null,"abstract":"A mix network is a cryptographic construction for anonymous communications. In addition to anonymity, a reputable mix network first defined by Golle offers a reputation property: the mix-net can prove that every message it outputs corresponds to an input submitted by a user without revealing which input. This property can shield the mix-net from liability in the event that an output message is objectionable or illegal. In this work we analyze two reputable ElGamal based mix-net schemes proposed by Golle and present two active attacks for them. Our attacks rely on the homomorphism properties of RSA signature and ElGamal cryptosystem and can break the reputation properties of those schemes. We also show how to counter our attacks by using secure hash functions.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131744400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ARRAY: A Non-application-Related, Secure, Wide-Area Disaster Recovery Storage System ARRAY:一种与应用无关、安全的广域容灾存储系统
Lingfang Zeng, D. Feng, B. Veeravalli, Q. Wei
With our society more information-driven, we have begun to distribute data in wide-area storage systems. At the same time, both physical failure and logic error have made it difficult to bring the necessary recovery to bear on remote data disaster, and understanding this proceeding. We describe ARRAY, a system architecture for data disaster recovery that combines reliability, storage space, and security to improve performance for data recovery applications. The paper presents an exhaustive analysis of the design space of ARRAY systems, focusing on the trade-offs between reliability, storage space, security, and performance that ARRAY must make. We present RSRAII (Replication-based Snapshot Redundant Array of Independent Imagefiles) which is a configurable RAID-like data erasure-coding, and also others benefits come from consolidation both erasure-coding and replication strategies. A novel algorithm is proposed to improve snapshot performance referred to as SMPDP (Snapshot based on Multi-Parallel Degree Pipeline).
随着我们的社会越来越多的信息驱动,我们已经开始在广域存储系统中分布数据。同时,物理故障和逻辑错误使得在远程数据灾难中进行必要的恢复变得困难,并且很难理解这一过程。我们描述ARRAY,这是一种用于数据灾难恢复的系统架构,它结合了可靠性、存储空间和安全性,以提高数据恢复应用程序的性能。本文对ARRAY系统的设计空间进行了详尽的分析,重点讨论了ARRAY必须在可靠性、存储空间、安全性和性能之间做出的权衡。我们提出了RSRAII(基于复制的独立映像文件快照冗余阵列),它是一种可配置的类似raid的数据擦除编码,并且其他好处来自于擦除编码和复制策略的整合。提出了一种改进快照性能的新算法SMPDP (snapshot based on Multi-Parallel Degree Pipeline)。
{"title":"ARRAY: A Non-application-Related, Secure, Wide-Area Disaster Recovery Storage System","authors":"Lingfang Zeng, D. Feng, B. Veeravalli, Q. Wei","doi":"10.1109/ISPA.2009.54","DOIUrl":"https://doi.org/10.1109/ISPA.2009.54","url":null,"abstract":"With our society more information-driven, we have begun to distribute data in wide-area storage systems. At the same time, both physical failure and logic error have made it difficult to bring the necessary recovery to bear on remote data disaster, and understanding this proceeding. We describe ARRAY, a system architecture for data disaster recovery that combines reliability, storage space, and security to improve performance for data recovery applications. The paper presents an exhaustive analysis of the design space of ARRAY systems, focusing on the trade-offs between reliability, storage space, security, and performance that ARRAY must make. We present RSRAII (Replication-based Snapshot Redundant Array of Independent Imagefiles) which is a configurable RAID-like data erasure-coding, and also others benefits come from consolidation both erasure-coding and replication strategies. A novel algorithm is proposed to improve snapshot performance referred to as SMPDP (Snapshot based on Multi-Parallel Degree Pipeline).","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124386061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimize Multiple Mobile Elements Touring in Wireless Sensor Networks 无线传感器网络中多移动元素巡回优化
Liang He, Jingdong Xu, Yuntao Yu
Integrating mobility into WSNs can significantly reduce the energy consumption of sensor nodes. However, this may lead to unacceptable data collection latency at the same time. In our previous work, we alleviated the problem under the assumption of a mobile base station (BS). In this paper, we discuss how the problem can be solved when the BS itself is not capable of moving, but it can instead employ some mobile elements (MEs). The data collection latency is mainly determined by the longest tour of the MEs in this case. Each ME should be assigned a similar workload to reduce the latency. Furthermore, the total length of the tours should be minimized to decrease the working cost of MEs. We propose three methods to solve the problem with these two-fold objectives. In the first two methods, we cluster the network according to some criteria, and then construct the data collection tour for each ME. We apply a heuristic operator based on the genetic algorithm in the third method, whose fitness function is defined according to the two-fold objectives. These methods are evaluated by comprehensive experiments. The results show that the genetic method can provide us more steady solutions in term of data collection latency. We also compare the mobile BS model and the multiple MEs model, whose results show that the latter can get us better solutions when the number of MEs gets larger.
将移动性集成到WSNs中可以显著降低传感器节点的能量消耗。但是,这可能同时导致不可接受的数据收集延迟。在我们之前的工作中,我们在移动基站(BS)的假设下缓解了这个问题。在本文中,我们讨论了当BS本身不能移动时,如何解决这个问题,但它可以使用一些移动元素(MEs)来代替。在这种情况下,数据收集延迟主要由MEs的最长行程决定。应该为每个ME分配类似的工作负载,以减少延迟。此外,应尽量减少旅行的总长度,以减少MEs的工作成本。我们提出了三种方法来解决这一双重目标的问题。在前两种方法中,我们根据一定的标准对网络进行聚类,然后为每个ME构造数据收集之旅。第三种方法采用了一种基于遗传算法的启发式算子,其适应度函数根据双重目标定义。通过综合实验对这些方法进行了评价。结果表明,遗传方法在数据采集延迟方面可以提供更稳定的解。我们还比较了移动BS模型和多个微商户模型,结果表明,当微商户数量较大时,后者可以得到更好的解决方案。
{"title":"Optimize Multiple Mobile Elements Touring in Wireless Sensor Networks","authors":"Liang He, Jingdong Xu, Yuntao Yu","doi":"10.1109/ISPA.2009.16","DOIUrl":"https://doi.org/10.1109/ISPA.2009.16","url":null,"abstract":"Integrating mobility into WSNs can significantly reduce the energy consumption of sensor nodes. However, this may lead to unacceptable data collection latency at the same time. In our previous work, we alleviated the problem under the assumption of a mobile base station (BS). In this paper, we discuss how the problem can be solved when the BS itself is not capable of moving, but it can instead employ some mobile elements (MEs). The data collection latency is mainly determined by the longest tour of the MEs in this case. Each ME should be assigned a similar workload to reduce the latency. Furthermore, the total length of the tours should be minimized to decrease the working cost of MEs. We propose three methods to solve the problem with these two-fold objectives. In the first two methods, we cluster the network according to some criteria, and then construct the data collection tour for each ME. We apply a heuristic operator based on the genetic algorithm in the third method, whose fitness function is defined according to the two-fold objectives. These methods are evaluated by comprehensive experiments. The results show that the genetic method can provide us more steady solutions in term of data collection latency. We also compare the mobile BS model and the multiple MEs model, whose results show that the latter can get us better solutions when the number of MEs gets larger.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116904985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Semantically Reliable Multicast Based on the (m-k)-Firm Technique 基于(m-k) firm技术的语义可靠组播
Wilian Queiroz, L. Lung, Luciana Rech, L. Lima
There was a lot of interest in multicast communications within this decade as it is an essential part of many network applications, e.g. video-on-demand, etc. In this paper, we model flow rate allocation for application overlay as a utility based optimization problem constrained by capacity limitations of physical links and overlay constraints. The optimization flow control presented here addresses not only concave utility functions which are suitable for applications with elastic traffics, but also especial forms of non-concave utilities that are used to model applications with inelastic traffics, which might demand for hard delay and rate requirements. We then propose an iterative algorithm as the solution to the optimization flow control problem and investigate especial forms of non-concave utilities that are supported by this model. Simulation results show that the iterative algorithm can be used to deal with sigmoidal-like utilities which are useful for modeling real-time applications such as live streaming.
在这十年中,由于多播通信是许多网络应用的重要组成部分,例如视频点播等,因此对多播通信产生了很大的兴趣。在本文中,我们将应用覆盖的流量分配建模为一个基于效用的优化问题,该优化问题受物理链路容量限制和覆盖约束的约束。本文提出的优化流控制不仅解决了适用于弹性流量应用的凹效用函数,而且还解决了用于模拟可能需要硬延迟和速率要求的非弹性流量应用的特殊形式的非凹效用函数。然后,我们提出了一种迭代算法作为优化流控制问题的解决方案,并研究了该模型支持的特殊形式的非凹效用。仿真结果表明,该迭代算法可用于处理类sigmoidal实用程序,这对于实时应用(如直播)的建模很有用。
{"title":"Semantically Reliable Multicast Based on the (m-k)-Firm Technique","authors":"Wilian Queiroz, L. Lung, Luciana Rech, L. Lima","doi":"10.1109/ISPA.2009.109","DOIUrl":"https://doi.org/10.1109/ISPA.2009.109","url":null,"abstract":"There was a lot of interest in multicast communications within this decade as it is an essential part of many network applications, e.g. video-on-demand, etc. In this paper, we model flow rate allocation for application overlay as a utility based optimization problem constrained by capacity limitations of physical links and overlay constraints. The optimization flow control presented here addresses not only concave utility functions which are suitable for applications with elastic traffics, but also especial forms of non-concave utilities that are used to model applications with inelastic traffics, which might demand for hard delay and rate requirements. We then propose an iterative algorithm as the solution to the optimization flow control problem and investigate especial forms of non-concave utilities that are supported by this model. Simulation results show that the iterative algorithm can be used to deal with sigmoidal-like utilities which are useful for modeling real-time applications such as live streaming.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Domain Specific Language and Workflow Execution Engine to Enable Dynamic Workflows 支持动态工作流的领域特定语言和工作流执行引擎
Gerhard Stuermer, Juergen Mangler, E. Schikuta
Workflow engines often being based on WS-BPEL, currently rely on a mix of recovery / modification strategies that are either part of the workflow description, part of the workflow engine, or realized as plugins to the workflow engine. To foster the development of distributed cloud-based workflow engines and novel repair algorithms, workflow engines have to be modularized in order to overcome the static and inflexible APIs provided by these workflow engines. Dynamic features gained by a modularization include the creation of external modules to monitor as well as modify a workflow to provide error handling in conjunction with Service Level Agreement (SLA) constraints. The aim of this paper is to present a flexible Workflow Execution Engine to facilitate the development of a new dynamic infrastructure to realize dynamic workflow engines with a focus on cloud-based environments.
工作流引擎通常基于WS-BPEL,目前依赖于恢复/修改策略的混合,这些策略要么是工作流描述的一部分,要么是工作流引擎的一部分,要么是作为工作流引擎的插件实现的。为了促进分布式云工作流引擎和新型修复算法的发展,工作流引擎必须模块化,以克服这些工作流引擎提供的静态和不灵活的api。通过模块化获得的动态特性包括创建外部模块来监视和修改工作流,以结合服务水平协议(Service Level Agreement, SLA)约束提供错误处理。本文的目的是提出一个灵活的工作流执行引擎,以促进新的动态基础设施的发展,以实现基于云的动态工作流引擎。
{"title":"A Domain Specific Language and Workflow Execution Engine to Enable Dynamic Workflows","authors":"Gerhard Stuermer, Juergen Mangler, E. Schikuta","doi":"10.1109/ISPA.2009.106","DOIUrl":"https://doi.org/10.1109/ISPA.2009.106","url":null,"abstract":"Workflow engines often being based on WS-BPEL, currently rely on a mix of recovery / modification strategies that are either part of the workflow description, part of the workflow engine, or realized as plugins to the workflow engine. To foster the development of distributed cloud-based workflow engines and novel repair algorithms, workflow engines have to be modularized in order to overcome the static and inflexible APIs provided by these workflow engines. Dynamic features gained by a modularization include the creation of external modules to monitor as well as modify a workflow to provide error handling in conjunction with Service Level Agreement (SLA) constraints. The aim of this paper is to present a flexible Workflow Execution Engine to facilitate the development of a new dynamic infrastructure to realize dynamic workflow engines with a focus on cloud-based environments.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Service 一种同时支持k -匿名和l -多样性的基于位置服务的隐私保护新方法
Jung-Ho Um, Miyoung Jang, Kyoung-Jin Jo, Jae-Woo Chang
In Location-Based Services (LBSs), users send location-based queries to LBS servers along with their exact locations, but the location information of the users can be misused by adversaries. In this regard, there must be a mechanism which can deal with the privacy protection of the users. In this paper, we propose a cloaking method considering both K-anonymity and L-diversity. Our cloaking method creates a minimum cloaking region by finding L number of buildings (L-diversity) and then finds K number of users (K-anonymity). To support it, we use R*-tree based index structures as well as efficient filtering techniques to generate a minimum cloaking region. Finally, we show from our performance analysis that our cloaking method outperforms the existing grid-based cloaking method in terms of the size of cloaking regions and cloaking region creation time.
在基于位置的服务(LBS)中,用户将基于位置的查询连同他们的确切位置一起发送给LBS服务器,但是用户的位置信息可能被对手滥用。在这方面,必须有一个机制来处理用户的隐私保护。本文提出了一种同时考虑k -匿名性和l -多样性的隐形方法。我们的隐形方法通过找到L个建筑物(L-多样性),然后找到K个用户(K-匿名性)来创建一个最小的隐形区域。为了支持它,我们使用基于R*树的索引结构以及有效的过滤技术来生成最小的隐藏区域。最后,我们通过性能分析表明,我们的隐身方法在隐身区域的大小和隐身区域创建时间方面优于现有的基于网格的隐身方法。
{"title":"A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Service","authors":"Jung-Ho Um, Miyoung Jang, Kyoung-Jin Jo, Jae-Woo Chang","doi":"10.1109/ISPA.2009.93","DOIUrl":"https://doi.org/10.1109/ISPA.2009.93","url":null,"abstract":"In Location-Based Services (LBSs), users send location-based queries to LBS servers along with their exact locations, but the location information of the users can be misused by adversaries. In this regard, there must be a mechanism which can deal with the privacy protection of the users. In this paper, we propose a cloaking method considering both K-anonymity and L-diversity. Our cloaking method creates a minimum cloaking region by finding L number of buildings (L-diversity) and then finds K number of users (K-anonymity). To support it, we use R*-tree based index structures as well as efficient filtering techniques to generate a minimum cloaking region. Finally, we show from our performance analysis that our cloaking method outperforms the existing grid-based cloaking method in terms of the size of cloaking regions and cloaking region creation time.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121959275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Global QoS-Driven Evaluation Strategy for Web Services Composition 面向Web服务组合的全局qos驱动评估策略
Xuyun Zhang, Wanchun Dou
Since non-functional properties play a more and more import role during the process of web service composition, the QoS issues for web service composition have obtained great interest in both research community and IT domain. Yet identifying the consumers¡¯ degree of satisfaction on QoS is a significant but challenging problem. This paper proposes a global QoS-driven evaluation strategy for web service composition on top of some previous work, aiming at improving some previous QoS frameworks. The executions of services are analyzed with the ACP (Algebra of Communication Process, a dialect of process algebra), and then the composite QoS values of a composite service are calculated by the ACP expressions. Finally, for the purpose that the composite service is evaluated via aggregating the criteria values into the degree of consumers¡¯ satisfaction, a synthetic method is formulated for comprehensively estimating the weights assigned to the criteria in terms of the consumers¡¯ preferences.
由于非功能属性在web服务组合过程中扮演着越来越重要的角色,web服务组合的QoS问题受到了学术界和IT界的极大关注。然而,确定消费者对服务质量的满意程度是一个重要但具有挑战性的问题。本文在前人研究的基础上,提出了一种面向web服务组合的全局QoS驱动评估策略,旨在改进现有的QoS框架。利用ACP (Algebra of Communication Process,进程代数的一种方言)对服务的执行过程进行分析,然后利用ACP表达式计算复合服务的复合QoS值。最后,为了通过将标准值汇总为消费者满意程度来评估复合服务,我们制定了一种综合方法,根据消费者的偏好综合估计赋予标准的权重。
{"title":"A Global QoS-Driven Evaluation Strategy for Web Services Composition","authors":"Xuyun Zhang, Wanchun Dou","doi":"10.1109/ISPA.2009.81","DOIUrl":"https://doi.org/10.1109/ISPA.2009.81","url":null,"abstract":"Since non-functional properties play a more and more import role during the process of web service composition, the QoS issues for web service composition have obtained great interest in both research community and IT domain. Yet identifying the consumers¡¯ degree of satisfaction on QoS is a significant but challenging problem. This paper proposes a global QoS-driven evaluation strategy for web service composition on top of some previous work, aiming at improving some previous QoS frameworks. The executions of services are analyzed with the ACP (Algebra of Communication Process, a dialect of process algebra), and then the composite QoS values of a composite service are calculated by the ACP expressions. Finally, for the purpose that the composite service is evaluated via aggregating the criteria values into the degree of consumers¡¯ satisfaction, a synthetic method is formulated for comprehensively estimating the weights assigned to the criteria in terms of the consumers¡¯ preferences.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121960670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 IEEE International Symposium on Parallel and Distributed Processing with Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1