首页 > 最新文献

2009 IEEE International Symposium on Parallel and Distributed Processing with Applications最新文献

英文 中文
An Efficient Task Allocation Protocol for P2P Multi-agent Systems 一种高效的P2P多智能体系统任务分配协议
Dayong Ye, Q. Bai, Minjie Zhang, K. Win, Zhiqi Shen
Recently, task allocation in multi-agent systems has been investigated by many researchers. Some researchers suggested to have a central controller which has a global view about the environment to allocate tasks. Although centralized control brings convenience during task allocation processes, it also has some obvious weaknesses. Firstly, a central controller plays an important role in a multi-agent system, but task allocation procedures will break down if the central controller of a system cannot work properly. Secondly, centralized multi-agent architecture is not suitable for distributed working environments. In order to overcome some limitations caused by centralized control, some researchers proposed distributed task allocation protocols. They supposed that each agent has a limited local view about its direct linked neighbors, and can allocate tasks to its neighbors. However, only involving direct linked neighbors could limit resource origins, so that the task allocation efficiency will be greatly reduced. In this paper, we propose an efficient task allocation protocol for P2P multi-agent systems. This protocol allows not only neighboring agents but also indirect linked agents in the system to help with a task if needed. Through this way, agents can achieve more efficient and robust task allocations in loosely coupled distributed environments (e.g. P2P multi-agent systems). A set of experiments are presented in this paper to evaluate the efficiency and adaptability of the protocol. The experiment result shows that the protocol can work efficiently in different situations.
近年来,许多研究者对多智能体系统中的任务分配问题进行了研究。一些研究人员建议设置一个对环境有全局视野的中央控制器来分配任务。虽然集中控制在任务分配过程中带来了方便,但它也有一些明显的缺点。首先,在多智能体系统中,中心控制器起着重要的作用,但如果系统的中心控制器不能正常工作,任务分配过程将会中断。其次,集中式多智能体架构不适合分布式工作环境。为了克服集中控制带来的一些局限性,一些研究者提出了分布式任务分配协议。他们假设每个智能体对其直接连接的邻居具有有限的局部视图,并且可以将任务分配给它的邻居。但是,如果只涉及直接连接的邻居,可能会限制资源的来源,从而大大降低任务分配效率。本文提出了一种适用于P2P多智能体系统的高效任务分配协议。该协议不仅允许相邻代理,还允许系统中间接链接的代理在需要时帮助完成任务。通过这种方式,代理可以在松散耦合的分布式环境(如P2P多代理系统)中实现更高效、更健壮的任务分配。通过实验验证了该协议的有效性和适应性。实验结果表明,该协议可以在不同的情况下有效地工作。
{"title":"An Efficient Task Allocation Protocol for P2P Multi-agent Systems","authors":"Dayong Ye, Q. Bai, Minjie Zhang, K. Win, Zhiqi Shen","doi":"10.1109/ISPA.2009.14","DOIUrl":"https://doi.org/10.1109/ISPA.2009.14","url":null,"abstract":"Recently, task allocation in multi-agent systems has been investigated by many researchers. Some researchers suggested to have a central controller which has a global view about the environment to allocate tasks. Although centralized control brings convenience during task allocation processes, it also has some obvious weaknesses. Firstly, a central controller plays an important role in a multi-agent system, but task allocation procedures will break down if the central controller of a system cannot work properly. Secondly, centralized multi-agent architecture is not suitable for distributed working environments. In order to overcome some limitations caused by centralized control, some researchers proposed distributed task allocation protocols. They supposed that each agent has a limited local view about its direct linked neighbors, and can allocate tasks to its neighbors. However, only involving direct linked neighbors could limit resource origins, so that the task allocation efficiency will be greatly reduced. In this paper, we propose an efficient task allocation protocol for P2P multi-agent systems. This protocol allows not only neighboring agents but also indirect linked agents in the system to help with a task if needed. Through this way, agents can achieve more efficient and robust task allocations in loosely coupled distributed environments (e.g. P2P multi-agent systems). A set of experiments are presented in this paper to evaluate the efficiency and adaptability of the protocol. The experiment result shows that the protocol can work efficiently in different situations.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130110141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Supporting Reconfigurable Fault Tolerance on Application Servers 支持应用服务器上的可重构容错
Junguo Li, Gang Huang, Xingrun Chen, Franck Chauvel, Hong Mei
Dynamic reconfiguration support in application servers is a solution to meet the demands for flexible and adaptive component-based applications. However, when an application is reconfigured, its fault-tolerant mechanism should be reconfigured either. This is one of the crucial problems we have to solve before a fault-tolerant application is dynamically reconfigured at runtime. This paper proposes a fault-tolerant sandbox to support the reconfigurable fault-tolerant mechanisms on application servers. We present how the sandbox integrates multiple error detection and recovery mechanisms, and how to reconfigure these mechanisms at runtime, especially for coordinated recovery mechanisms. We implement a prototype and perform a set of controlled experiments to demonstrate the sandbox’s capabilities.
应用服务器中的动态重新配置支持是满足灵活和自适应的基于组件的应用程序需求的一种解决方案。但是,当重新配置应用程序时,也应该重新配置它的容错机制。在运行时动态重新配置容错应用程序之前,这是我们必须解决的关键问题之一。本文提出了一种容错沙箱来支持应用服务器上可重构的容错机制。我们介绍了沙盒如何集成多个错误检测和恢复机制,以及如何在运行时重新配置这些机制,特别是对于协调恢复机制。我们实现了一个原型,并执行了一组受控实验来演示沙盒的功能。
{"title":"Supporting Reconfigurable Fault Tolerance on Application Servers","authors":"Junguo Li, Gang Huang, Xingrun Chen, Franck Chauvel, Hong Mei","doi":"10.1109/ISPA.2009.57","DOIUrl":"https://doi.org/10.1109/ISPA.2009.57","url":null,"abstract":"Dynamic reconfiguration support in application servers is a solution to meet the demands for flexible and adaptive component-based applications. However, when an application is reconfigured, its fault-tolerant mechanism should be reconfigured either. This is one of the crucial problems we have to solve before a fault-tolerant application is dynamically reconfigured at runtime. This paper proposes a fault-tolerant sandbox to support the reconfigurable fault-tolerant mechanisms on application servers. We present how the sandbox integrates multiple error detection and recovery mechanisms, and how to reconfigure these mechanisms at runtime, especially for coordinated recovery mechanisms. We implement a prototype and perform a set of controlled experiments to demonstrate the sandbox’s capabilities.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122661217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reverse Analysis and Vulnerability Detection for Network System Software 网络系统软件逆向分析与漏洞检测
Wei Pan, Weihua Li
In information era advocating ubiquitous computing, computing resources are susceptible to attack without guaranteeing security of network system. It is necessary and desirable for network system to employ powerful safeguard to protect itself against diversified vulnerabilities. In this paper, we present reverse analysis and vulnerability detection for network system software (RAVDNSS), a novel approach which uses reverse analysis and vulnerability detection technologies to deal with security problems on critical network system. Adaptive reverse analysis we propose is used to dig out potential vulnerabilities, which might be abused by unauthorized and unlawful communities. A new vulnerability detection model is designed to provide safety precautions through detecting vulnerabilities and monitoring program behaviors. Our investigation aims to improve the ability to guard network system against malicious attacks. The proposed schemes demonstrate that our approach can effectively perform security detection and management of network system software.
在崇尚普适计算的信息时代,计算资源容易受到攻击,无法保证网络系统的安全。网络系统采用强大的安全防护措施来保护自身免受各种漏洞的侵害是必要的,也是可取的。本文提出了网络系统软件逆向分析和漏洞检测(RAVDNSS),这是一种利用逆向分析和漏洞检测技术来解决关键网络系统安全问题的新方法。我们提出的自适应反向分析是用来挖掘潜在的漏洞,这些漏洞可能被未经授权和非法社区滥用。设计了一种新的漏洞检测模型,通过检测漏洞和监控程序行为提供安全防范措施。我们的调查旨在提高网络系统抵御恶意攻击的能力。所提出的方案表明,我们的方法可以有效地对网络系统软件进行安全检测和管理。
{"title":"Reverse Analysis and Vulnerability Detection for Network System Software","authors":"Wei Pan, Weihua Li","doi":"10.1109/ISPA.2009.73","DOIUrl":"https://doi.org/10.1109/ISPA.2009.73","url":null,"abstract":"In information era advocating ubiquitous computing, computing resources are susceptible to attack without guaranteeing security of network system. It is necessary and desirable for network system to employ powerful safeguard to protect itself against diversified vulnerabilities. In this paper, we present reverse analysis and vulnerability detection for network system software (RAVDNSS), a novel approach which uses reverse analysis and vulnerability detection technologies to deal with security problems on critical network system. Adaptive reverse analysis we propose is used to dig out potential vulnerabilities, which might be abused by unauthorized and unlawful communities. A new vulnerability detection model is designed to provide safety precautions through detecting vulnerabilities and monitoring program behaviors. Our investigation aims to improve the ability to guard network system against malicious attacks. The proposed schemes demonstrate that our approach can effectively perform security detection and management of network system software.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117205350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of In-Depth-Defense for Network Security Based on Immunity Principles 一种基于免疫原理的网络安全深度防御方法
Yaping Jiang, Jianhua Zhou, Yong Gan, Zengyu Cai
The concepts of self, nonself, antibody, antigen and vaccine in in-Depth-Defense system for Network Security was presented in this paper, the architecture of in-Depth Defense for network intrusion and detection based on immune principle is proposed. The intrusion information gotten from current monitored network is encapsulated and sent to the neighbor network as bacterin; therefore the neighbor network can make use of the bacterin and predict the danger of network. We can use communicate agent cooperated with response agent to achieve active defense formwork. The experimental results show that the new model not only actualizes an active prevention method but also improves the ability of intrusion detection and prevention than that of the traditional passive intrusion prevention systems
提出了网络安全纵深防御系统中的自我、非自我、抗体、抗原、疫苗等概念,提出了基于免疫原理的网络入侵纵深防御与检测体系结构。将当前被监控网络中获取的入侵信息进行封装,以细菌的形式发送到相邻网络;因此,邻居网络可以利用细菌来预测网络的危险性。我们可以采用通信代理与响应代理配合的方式来实现主动防御模式。实验结果表明,与传统的被动入侵防御系统相比,新模型不仅实现了一种主动防御方法,而且提高了入侵检测和防御能力
{"title":"A Method of In-Depth-Defense for Network Security Based on Immunity Principles","authors":"Yaping Jiang, Jianhua Zhou, Yong Gan, Zengyu Cai","doi":"10.1109/ISPA.2009.65","DOIUrl":"https://doi.org/10.1109/ISPA.2009.65","url":null,"abstract":"The concepts of self, nonself, antibody, antigen and vaccine in in-Depth-Defense system for Network Security was presented in this paper, the architecture of in-Depth Defense for network intrusion and detection based on immune principle is proposed. The intrusion information gotten from current monitored network is encapsulated and sent to the neighbor network as bacterin; therefore the neighbor network can make use of the bacterin and predict the danger of network. We can use communicate agent cooperated with response agent to achieve active defense formwork. The experimental results show that the new model not only actualizes an active prevention method but also improves the ability of intrusion detection and prevention than that of the traditional passive intrusion prevention systems","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Alliance Based Reputation Model for Internet Autonomous System Trust Evaluation 基于联盟的互联网自治系统信任评估信誉模型
Ning Hu, Peidong Zhu, Peng Zou
The security of inter-domain routing system greatly depends on the trustworthiness of routing information and routing behavior of autonomous system (AS). Many researches on e-commerce, grid, and p2p have proven that reputation mechanism is helpful to inhibit the spread of false route and the occurrence of malicious routing behavior. To increase AS resistance to malicious routing attack, we designs an alliance based reputation model for AS routing behavior trust evaluation. Our approach calculates AS reputation with the Bayesian probability model and manages AS reputation with AS alliance. Compared with the fully distributed reputation model, our model has lower storage and communication overhead. This reputation model is incremental deployment and easy to implement. It can be employed for securing AS routing and assisting malicious behavior detection.
域间路由系统的安全性很大程度上取决于路由信息的可信度和自治系统的路由行为。许多关于电子商务、网格和p2p的研究都证明信誉机制有助于抑制虚假路由的传播和恶意路由行为的发生。为了增强AS对恶意路由攻击的抵抗力,设计了基于联盟的AS路由行为信任评估信誉模型。我们的方法使用贝叶斯概率模型计算AS声誉,并通过AS联盟管理AS声誉。与完全分布式信誉模型相比,我们的模型具有更低的存储和通信开销。这种信誉模型是增量部署,易于实现。它可以用于保护AS路由和协助恶意行为检测。
{"title":"An Alliance Based Reputation Model for Internet Autonomous System Trust Evaluation","authors":"Ning Hu, Peidong Zhu, Peng Zou","doi":"10.1109/ISPA.2009.104","DOIUrl":"https://doi.org/10.1109/ISPA.2009.104","url":null,"abstract":"The security of inter-domain routing system greatly depends on the trustworthiness of routing information and routing behavior of autonomous system (AS). Many researches on e-commerce, grid, and p2p have proven that reputation mechanism is helpful to inhibit the spread of false route and the occurrence of malicious routing behavior. To increase AS resistance to malicious routing attack, we designs an alliance based reputation model for AS routing behavior trust evaluation. Our approach calculates AS reputation with the Bayesian probability model and manages AS reputation with AS alliance. Compared with the fully distributed reputation model, our model has lower storage and communication overhead. This reputation model is incremental deployment and easy to implement. It can be employed for securing AS routing and assisting malicious behavior detection.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Solo: A Lightweight Virtual Machine Solo:轻量级虚拟机
Xiang Zhang, Jie Ma, Yanchao Miao, Qingwei Meng, Dan Meng
The overhead caused by virtualization makes it difficult to apply VM in the applications which require high degrees of both performance isolation and efficiency, such as the high performance computing. In this paper, we present a lightweight virtual machine, named Solo. It simplifies the design of VMM greatly by making most privileged instructions bypass the VMM, except the I/O operations. Solo allows VM running directly on hardware with the highest privileges, therefore greatly reduces the overhead caused by virtualization. Our evaluation shows that Solo not only guarantees the VM performance isolation, but also improves VM performance to the level of traditional OS, and thus meets the requirements of the high performance applications without special hardware support.
虚拟化带来的开销使得在高性能计算等对性能隔离和效率都要求很高的应用程序中难以应用VM。在本文中,我们提出了一个名为Solo的轻量级虚拟机。除了I/O操作外,它使大多数特权指令绕过VMM,从而大大简化了VMM的设计。Solo允许VM以最高权限直接在硬件上运行,因此大大减少了虚拟化带来的开销。我们的评估表明,Solo不仅保证了VM的性能隔离,而且将VM的性能提高到传统操作系统的水平,从而满足无需特殊硬件支持的高性能应用的需求。
{"title":"Solo: A Lightweight Virtual Machine","authors":"Xiang Zhang, Jie Ma, Yanchao Miao, Qingwei Meng, Dan Meng","doi":"10.1109/ISPA.2009.7","DOIUrl":"https://doi.org/10.1109/ISPA.2009.7","url":null,"abstract":"The overhead caused by virtualization makes it difficult to apply VM in the applications which require high degrees of both performance isolation and efficiency, such as the high performance computing. In this paper, we present a lightweight virtual machine, named Solo. It simplifies the design of VMM greatly by making most privileged instructions bypass the VMM, except the I/O operations. Solo allows VM running directly on hardware with the highest privileges, therefore greatly reduces the overhead caused by virtualization. Our evaluation shows that Solo not only guarantees the VM performance isolation, but also improves VM performance to the level of traditional OS, and thus meets the requirements of the high performance applications without special hardware support.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134455616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Program Optimization of Stencil Based Application on the GPU-Accelerated System 基于模板的gpu加速系统应用程序优化
Guibin Wang, Xuejun Yang, Y. Zhang, T. Tang, Xudong Fang
Graphic Processing Unit (GPU), with many light-weight data-parallel cores, can provide substantial parallel computational power to accelerate general purpose applications. But the powerful computing capacity could not be fully utilized for memory-intensive applications, which are limited by off-chip memory bandwidth and latency. Stencil computation has abundant parallelism and low computational intensity which make it a useful architectural evaluation benchmark. In this paper, we propose some memory optimizations for a stencil based application mgrid from SPEC 2K benchmarks. Through exploiting data locality in 3-level memory hierarchies and tuning the thread granularity, we reduce the pressure on the off-chip memory bandwidth. To hide the long off-chip memory access latency, we further prefetch data during computation through double-buffer. In order to fully exploit the CPU-GPU heterogeneous system, we redistribute the computation between these two computing resource. Through all these optimizations, we gain 24.2x speedup compared to the simple mapping version, and get as high as 34.3x speedup when compared with a CPU implementation.
图形处理单元(GPU)具有许多轻量级的数据并行核,可以提供大量的并行计算能力来加速通用应用程序。但受片外内存带宽和延迟的限制,强大的计算能力无法充分发挥到内存密集型应用中。模板计算具有丰富的并行性和较低的计算强度,是一种有用的体系结构评价基准。在本文中,我们从spec2k基准测试中为基于模板的应用程序mgrid提出了一些内存优化。通过利用3级内存层次结构中的数据局部性和调优线程粒度,我们减少了片外内存带宽的压力。为了隐藏片外存储器访问延迟,我们进一步通过双缓冲区在计算过程中预取数据。为了充分利用CPU-GPU异构系统,我们在这两种计算资源之间重新分配计算。通过所有这些优化,与简单的映射版本相比,我们获得了24.2倍的加速,与CPU实现相比,我们获得了高达34.3倍的加速。
{"title":"Program Optimization of Stencil Based Application on the GPU-Accelerated System","authors":"Guibin Wang, Xuejun Yang, Y. Zhang, T. Tang, Xudong Fang","doi":"10.1109/ISPA.2009.70","DOIUrl":"https://doi.org/10.1109/ISPA.2009.70","url":null,"abstract":"Graphic Processing Unit (GPU), with many light-weight data-parallel cores, can provide substantial parallel computational power to accelerate general purpose applications. But the powerful computing capacity could not be fully utilized for memory-intensive applications, which are limited by off-chip memory bandwidth and latency. Stencil computation has abundant parallelism and low computational intensity which make it a useful architectural evaluation benchmark. In this paper, we propose some memory optimizations for a stencil based application mgrid from SPEC 2K benchmarks. Through exploiting data locality in 3-level memory hierarchies and tuning the thread granularity, we reduce the pressure on the off-chip memory bandwidth. To hide the long off-chip memory access latency, we further prefetch data during computation through double-buffer. In order to fully exploit the CPU-GPU heterogeneous system, we redistribute the computation between these two computing resource. Through all these optimizations, we gain 24.2x speedup compared to the simple mapping version, and get as high as 34.3x speedup when compared with a CPU implementation.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128073552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security System for Overlapping Non-dedicated Clusters 重叠非专用集群的安全系统
M. Stáva, P. Tvrdík
Techniques for building local area network clusters differ from those used for large scale harvesting of idle computing power. The overlapping non dedicated clusters (ONDC) architecture is trying to mix advantages of both techniques. Clusters build in ONDC style can be deployed both on small scale local networks, but as well in large scale over the Internet deployments. In this paper we analyze the security requirements of ONDC and describe our solution. The solution was implemented for the Clondike clustering system, but the same approach can be used for any other ONDC system. The proposed system is inspired by the security mechanisms of existing P2P grid systems and various trust management systems, but it is tailored to exactly match the ONDC requirements. An important aspect of the proposed solution is a combination of locally issued identity based access control and certificates based delegated authorizations. While the identity based access control is the most intuitive way how to express trust for the users of the system, delegated authorizations are an answer for more complex cases. The unique feature of the proposed system is configurable mechanism for authorization distributions and storage that enables users to trade-off a local information availability with local storage requirements.
构建局域网集群的技术不同于那些用于大规模收集空闲计算能力的技术。重叠非专用集群(ONDC)架构试图混合这两种技术的优点。以ONDC风格构建的集群既可以部署在小规模的本地网络上,也可以部署在大规模的Internet部署上。本文分析了ONDC的安全需求,并给出了解决方案。该解决方案是为Clondike集群系统实现的,但同样的方法也可以用于任何其他ONDC系统。该系统受到现有P2P网格系统和各种信任管理系统的安全机制的启发,但它经过量身定制,完全符合ONDC的要求。所建议的解决方案的一个重要方面是结合了本地颁发的基于身份的访问控制和基于委托授权的证书。虽然基于身份的访问控制是对系统用户表示信任的最直观方式,但委托授权是解决更复杂情况的一种方法。所建议的系统的独特特性是用于授权分发和存储的可配置机制,使用户能够权衡本地信息可用性和本地存储需求。
{"title":"Security System for Overlapping Non-dedicated Clusters","authors":"M. Stáva, P. Tvrdík","doi":"10.1109/ISPA.2009.19","DOIUrl":"https://doi.org/10.1109/ISPA.2009.19","url":null,"abstract":"Techniques for building local area network clusters differ from those used for large scale harvesting of idle computing power. The overlapping non dedicated clusters (ONDC) architecture is trying to mix advantages of both techniques. Clusters build in ONDC style can be deployed both on small scale local networks, but as well in large scale over the Internet deployments. In this paper we analyze the security requirements of ONDC and describe our solution. The solution was implemented for the Clondike clustering system, but the same approach can be used for any other ONDC system. The proposed system is inspired by the security mechanisms of existing P2P grid systems and various trust management systems, but it is tailored to exactly match the ONDC requirements. An important aspect of the proposed solution is a combination of locally issued identity based access control and certificates based delegated authorizations. While the identity based access control is the most intuitive way how to express trust for the users of the system, delegated authorizations are an answer for more complex cases. The unique feature of the proposed system is configurable mechanism for authorization distributions and storage that enables users to trade-off a local information availability with local storage requirements.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122960334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Execution of Workflow Using Parallel Partitioning 基于并行分区的工作流分布式执行
M. Hedayat, Wentong Cai, S. Turner, Shayan Shahand
Grid computing is a fundamental technology for large scale distributed resource sharing. Workflow management is becoming one of the most important Grid services. A lot of research work has been done on different issues involved in workflow management systems. The focus of this paper is on three areas: workflow partitioning, enactment and data movement. A new workflow management system called parallel and distributed workflow management system (PDWMS) is proposed. In this system the execution of workflow is done by a network of collaborative engines. To achieve this target, the original abstract workflow (input of the system) is partitioned into parallel parts, using a new proposed partitioning algorithm. PDWMS’s data movement, which is categorized into local and global models, uses a peer-to-peer approach.
网格计算是实现大规模分布式资源共享的基础技术。工作流管理正在成为最重要的网格服务之一。对于工作流管理系统所涉及的各种问题,人们做了大量的研究工作。本文主要从工作流划分、工作流制定和工作流移动三个方面进行了研究。提出了一种新的工作流管理系统——并行分布式工作流管理系统(PDWMS)。在该系统中,工作流的执行由协同引擎网络完成。为了实现这一目标,采用一种新的划分算法,将原始的抽象工作流(系统的输入)划分为并行的部分。PDWMS的数据移动分为本地模型和全局模型,使用点对点方法。
{"title":"Distributed Execution of Workflow Using Parallel Partitioning","authors":"M. Hedayat, Wentong Cai, S. Turner, Shayan Shahand","doi":"10.1109/ISPA.2009.96","DOIUrl":"https://doi.org/10.1109/ISPA.2009.96","url":null,"abstract":"Grid computing is a fundamental technology for large scale distributed resource sharing. Workflow management is becoming one of the most important Grid services. A lot of research work has been done on different issues involved in workflow management systems. The focus of this paper is on three areas: workflow partitioning, enactment and data movement. A new workflow management system called parallel and distributed workflow management system (PDWMS) is proposed. In this system the execution of workflow is done by a network of collaborative engines. To achieve this target, the original abstract workflow (input of the system) is partitioned into parallel parts, using a new proposed partitioning algorithm. PDWMS’s data movement, which is categorized into local and global models, uses a peer-to-peer approach.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124471305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysing Internet Information Propagation Using Quality of Service Methodology Based on Algebra of System 基于系统代数的服务质量方法分析互联网信息传播
T. Wang, Q. Qu, Benjamin H. Y. Koo
In this paper, we analyze the basic characteristics of the propagation network. Using the modeling framework Algebra of System (AoS), we convert the complexity of the network structure into the quantity of data. By using OPN(Object-Process Network) which is an executable meta-language based on the mathematical specification of AoS, we build a framework to describe and evaluate the performance of internet networking during Beijing Olympic Games, which is collected by GPERF, a globally distributed performance measurement system of China Education and Research Network (CERNET). In this framework, we deal with the information of QoS for simulation, visualization, and analysis of user’s needs in a uniform algebraic way.
本文分析了传播网络的基本特性。利用系统代数(AoS)建模框架,将网络结构的复杂性转化为数据量。利用OPN(Object-Process Network)这一基于AoS数学规范的可执行元语言,构建了一个描述和评估北京奥运会期间互联网网络性能的框架,该框架由中国教育和科研网络(CERNET)的全球分布式性能测量系统GPERF收集。在这个框架中,我们以统一的代数方式处理QoS的信息,用于仿真、可视化和用户需求分析。
{"title":"Analysing Internet Information Propagation Using Quality of Service Methodology Based on Algebra of System","authors":"T. Wang, Q. Qu, Benjamin H. Y. Koo","doi":"10.1109/ISPA.2009.87","DOIUrl":"https://doi.org/10.1109/ISPA.2009.87","url":null,"abstract":"In this paper, we analyze the basic characteristics of the propagation network. Using the modeling framework Algebra of System (AoS), we convert the complexity of the network structure into the quantity of data. By using OPN(Object-Process Network) which is an executable meta-language based on the mathematical specification of AoS, we build a framework to describe and evaluate the performance of internet networking during Beijing Olympic Games, which is collected by GPERF, a globally distributed performance measurement system of China Education and Research Network (CERNET). In this framework, we deal with the information of QoS for simulation, visualization, and analysis of user’s needs in a uniform algebraic way.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121634208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 IEEE International Symposium on Parallel and Distributed Processing with Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1