首页 > 最新文献

2011 IEEE 13th International Symposium on High-Assurance Systems Engineering最新文献

英文 中文
The OASIS Kernel: A Framework for High Dependability Real-Time Systems OASIS内核:高可靠性实时系统的框架
Stéphane Louise, Matthieu Lemerre, Christophe Aussaguès, V. David
This paper presents the design and some aspects of implementation of a highly dependable, safety-oriented kernel for real-time applications. It is specifically designed as an execution facility for a deterministic semi-formal model -- the OASIS model -- which allows to express and verify temporal behaviors and communications of a safety critical real-time application. This paper shows specifically how, from a formalism, and a Domain Specific Language, we achieved to build a generic execution layer that conforms to the highest levels of safety, how the safety is implemented thank to the interaction between the kernel and the compilation tools, and how performance was optimized within these constraints.
本文介绍了一个高可靠、面向安全的实时应用内核的设计和实现的一些方面。它被专门设计为确定性半形式化模型(OASIS模型)的执行工具,该模型允许表达和验证安全关键实时应用程序的临时行为和通信。本文具体展示了如何从形式化和领域特定语言出发,构建符合最高安全级别的通用执行层,如何通过内核和编译工具之间的交互实现安全性,以及如何在这些约束条件下优化性能。
{"title":"The OASIS Kernel: A Framework for High Dependability Real-Time Systems","authors":"Stéphane Louise, Matthieu Lemerre, Christophe Aussaguès, V. David","doi":"10.1109/HASE.2011.38","DOIUrl":"https://doi.org/10.1109/HASE.2011.38","url":null,"abstract":"This paper presents the design and some aspects of implementation of a highly dependable, safety-oriented kernel for real-time applications. It is specifically designed as an execution facility for a deterministic semi-formal model -- the OASIS model -- which allows to express and verify temporal behaviors and communications of a safety critical real-time application. This paper shows specifically how, from a formalism, and a Domain Specific Language, we achieved to build a generic execution layer that conforms to the highest levels of safety, how the safety is implemented thank to the interaction between the kernel and the compilation tools, and how performance was optimized within these constraints.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124918015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Reducing State Explosion with Context Modeling for Model-Checking 基于上下文建模的模型检查减少状态爆炸
P. Dhaussy, Jean-Charles Roger, F. Boniol
This paper deals with the problem of the usage of formal techniques, based on model checking, where models are large and formal verification techniques face the combinatorial explosion issue. The goal of the approach is to express and verify requirements relative to certain context situations. The idea is to unroll the context into several scenarios and successively compose each scenario with the system and verify the resulting composition. We propose to specify the context in which the behavior occurs using a language called CDL ({em Context Description Language}), based on activity and message sequence diagrams. The properties to be verified are specified with textual patterns and attached to specific regions in the context. This article shows how this combinatorial explosion could be reduced by specifying the environment of the system to be validated. Our contribution is illustrated on an industrial embedded system.
本文在模型检验的基础上,针对模型规模大、形式验证技术面临组合爆炸的问题,研究了形式验证技术的使用问题。该方法的目标是表达和验证与特定上下文情况相关的需求。其思想是将上下文展开为几个场景,并依次将每个场景与系统组合在一起,并验证结果组合。我们建议使用一种称为CDL ({em context Description language})的语言来指定行为发生的上下文,这种语言基于活动和消息序列图。要验证的属性是用文本模式指定的,并附加到上下文中的特定区域。本文展示了如何通过指定要验证的系统的环境来减少这种组合爆炸。我们的贡献以一个工业嵌入式系统为例。
{"title":"Reducing State Explosion with Context Modeling for Model-Checking","authors":"P. Dhaussy, Jean-Charles Roger, F. Boniol","doi":"10.1109/HASE.2011.24","DOIUrl":"https://doi.org/10.1109/HASE.2011.24","url":null,"abstract":"This paper deals with the problem of the usage of formal techniques, based on model checking, where models are large and formal verification techniques face the combinatorial explosion issue. The goal of the approach is to express and verify requirements relative to certain context situations. The idea is to unroll the context into several scenarios and successively compose each scenario with the system and verify the resulting composition. We propose to specify the context in which the behavior occurs using a language called CDL ({em Context Description Language}), based on activity and message sequence diagrams. The properties to be verified are specified with textual patterns and attached to specific regions in the context. This article shows how this combinatorial explosion could be reduced by specifying the environment of the system to be validated. Our contribution is illustrated on an industrial embedded system.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Bug Signature Minimization and Fusion Bug签名最小化和融合
D. Lo, Hong Cheng, Xiaoyin Wang
Debugging is a time-consuming activity. To help in debugging, many approaches have been proposed to pinpoint the location of errors given labeled failures and correct executions. While such approaches have been shown to be accurate, at times the location alone is not sufficient in helping programmers understand why the bug happens and how to fix it. Furthermore, a single location might not be powerful enough to discriminate failures from correct executions. To address the above challenges, there have been recent studies on extracting bug signatures which are composed of multiple locations appearing together in a particular order signifying an occurrence of a bug. The latest study on bug signatures by Cheng et al. models program executions as graphs. Two sets of graphs corresponding to failures and correct executions are then contrasted to extract the most discriminative connected sub graphs serving as bug signatures. However, there are two limitations: (1) returned signatures might not be minimal and (2) they can only capture localized bug context. In this work, we develop a signature minimization technique to capture minimal discriminative signatures. Also, we propose a technique of signature fusion to fuse disconnected sub graphs so that our method can capture bug contexts spanning multiple locations. Experimental study on Siemens and Space dataset shows the effectiveness of the proposed bug signature minimization and fusion techniques. Comparing with the state-of-the-art bug signature mining technique, we reduce the number of bugs missed by up to 57.7%, and reduce the average number of nodes traversed by up to 85.6%.
调试是一项耗时的活动。为了帮助调试,已经提出了许多方法来精确定位给定标记失败的错误位置并纠正执行。虽然这些方法已被证明是准确的,但有时仅靠位置不足以帮助程序员理解错误发生的原因以及如何修复它。此外,单个位置可能不足以区分失败和正确执行。为了解决上述挑战,最近有一些关于提取bug签名的研究,这些签名由多个位置以特定顺序出现在一起表示bug的发生。Cheng等人对bug签名的最新研究将程序执行建模为图形。然后对比对应于失败和正确执行的两组图,以提取最具判别性的连接子图,作为错误签名。然而,有两个限制:(1)返回的签名可能不是最小的;(2)它们只能捕获本地化的错误上下文。在这项工作中,我们开发了一种签名最小化技术来捕获最小的判别签名。此外,我们还提出了一种签名融合技术来融合断开的子图,以便我们的方法可以捕获跨越多个位置的错误上下文。在Siemens和Space数据集上的实验研究表明了所提出的缺陷特征最小化和融合技术的有效性。与最先进的漏洞签名挖掘技术相比,我们减少了高达57.7%的漏洞数量,减少了高达85.6%的平均遍历节点数量。
{"title":"Bug Signature Minimization and Fusion","authors":"D. Lo, Hong Cheng, Xiaoyin Wang","doi":"10.1109/HASE.2011.36","DOIUrl":"https://doi.org/10.1109/HASE.2011.36","url":null,"abstract":"Debugging is a time-consuming activity. To help in debugging, many approaches have been proposed to pinpoint the location of errors given labeled failures and correct executions. While such approaches have been shown to be accurate, at times the location alone is not sufficient in helping programmers understand why the bug happens and how to fix it. Furthermore, a single location might not be powerful enough to discriminate failures from correct executions. To address the above challenges, there have been recent studies on extracting bug signatures which are composed of multiple locations appearing together in a particular order signifying an occurrence of a bug. The latest study on bug signatures by Cheng et al. models program executions as graphs. Two sets of graphs corresponding to failures and correct executions are then contrasted to extract the most discriminative connected sub graphs serving as bug signatures. However, there are two limitations: (1) returned signatures might not be minimal and (2) they can only capture localized bug context. In this work, we develop a signature minimization technique to capture minimal discriminative signatures. Also, we propose a technique of signature fusion to fuse disconnected sub graphs so that our method can capture bug contexts spanning multiple locations. Experimental study on Siemens and Space dataset shows the effectiveness of the proposed bug signature minimization and fusion techniques. Comparing with the state-of-the-art bug signature mining technique, we reduce the number of bugs missed by up to 57.7%, and reduce the average number of nodes traversed by up to 85.6%.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Regression Testing of Component-Based Software: A Systematic Practise Based on State Testing 基于组件的软件回归测试:基于状态测试的系统实践
Chuanqi Tao, Bixin Li, J. Gao
Component-based software systems consist of various components, such as third-party components and in-house built components. Component changes frequently occur in software maintenance, which refers to regression testing. When changes made to a component, the component could be affected, moreover, the changes could bring impacts on the entire system. Related existing research did not address the issue of systematic regression testing of component-based software, especially at system level. This paper proposes a systematic regression testing method from components to system, including analysis of change, impact and test suite refreshment. The paper also reports a case study based on a realistic component-based software system using a state-based testing practice, which shows that the approach is feasible and effective.
基于组件的软件系统由各种组件组成,例如第三方组件和内部构建的组件。组件更改经常发生在软件维护中,这涉及到回归测试。当对组件进行更改时,组件可能会受到影响,而且更改可能会对整个系统产生影响。现有的相关研究没有解决基于组件的软件的系统回归测试问题,特别是在系统级别。本文提出了一种从组件到系统的系统回归测试方法,包括变更分析、影响分析和测试套件更新。本文还通过一个基于状态的测试实践,对一个现实的基于组件的软件系统进行了实例分析,验证了该方法的可行性和有效性。
{"title":"Regression Testing of Component-Based Software: A Systematic Practise Based on State Testing","authors":"Chuanqi Tao, Bixin Li, J. Gao","doi":"10.1109/HASE.2011.40","DOIUrl":"https://doi.org/10.1109/HASE.2011.40","url":null,"abstract":"Component-based software systems consist of various components, such as third-party components and in-house built components. Component changes frequently occur in software maintenance, which refers to regression testing. When changes made to a component, the component could be affected, moreover, the changes could bring impacts on the entire system. Related existing research did not address the issue of systematic regression testing of component-based software, especially at system level. This paper proposes a systematic regression testing method from components to system, including analysis of change, impact and test suite refreshment. The paper also reports a case study based on a realistic component-based software system using a state-based testing practice, which shows that the approach is feasible and effective.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115564805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Patterns for Representing FMEA in Formal Specification of Control Systems 控制系统正式规范中FMEA的表示模式
I. Lopatkin, A. Iliasov, A. Romanovsky, Y. Prokhorova, E. Troubitsyna
Failure Modes and Effects analysis (FMEA) is a widely used technique for inductive safety analysis. FMEA provides engineers with valuable information about failure modes of system components as well as procedures for error detection and recovery. In this paper we propose an approach that facilitates representation of FMEA results in formal Event-B specifications of control systems. We define a umber of patterns for representing requirements derived from FMEA in formal system model specified in Event-B. The patterns help the developers to trace the requirements from safety analysis to formal specification. Moreover, they allow them to increase automation of formal system development by refinement. Our approach is illustrated by an example - a sluice control system.
失效模式与影响分析(FMEA)是一种应用广泛的安全分析方法。FMEA为工程师提供了有关系统组件故障模式以及错误检测和恢复程序的宝贵信息。在本文中,我们提出了一种方法,便于在控制系统的正式Event-B规范中表示FMEA结果。我们定义了许多模式,用于在Event-B中指定的正式系统模型中表示来自FMEA的需求。这些模式帮助开发人员跟踪从安全分析到正式规范的需求。此外,它们允许他们通过细化来增加正式系统开发的自动化。通过一个水闸控制系统的实例说明了我们的方法。
{"title":"Patterns for Representing FMEA in Formal Specification of Control Systems","authors":"I. Lopatkin, A. Iliasov, A. Romanovsky, Y. Prokhorova, E. Troubitsyna","doi":"10.1109/HASE.2011.10","DOIUrl":"https://doi.org/10.1109/HASE.2011.10","url":null,"abstract":"Failure Modes and Effects analysis (FMEA) is a widely used technique for inductive safety analysis. FMEA provides engineers with valuable information about failure modes of system components as well as procedures for error detection and recovery. In this paper we propose an approach that facilitates representation of FMEA results in formal Event-B specifications of control systems. We define a umber of patterns for representing requirements derived from FMEA in formal system model specified in Event-B. The patterns help the developers to trace the requirements from safety analysis to formal specification. Moreover, they allow them to increase automation of formal system development by refinement. Our approach is illustrated by an example - a sluice control system.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124293716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Improve the Effectiveness of Test Case Generation on EFSM via Automatic Path Feasibility Analysis 通过自动路径可行性分析提高EFSM测试用例生成的有效性
Rui Yang, Zhenyu Chen, Baowen Xu, W. E. Wong, Jie Zhang
A typical approach utilized for automated test case generation is to create a model of the implementation under test. Extended Finite State Machine (EFSM) is among the most popular models for model-based testing. However, automated test case generation on EFSM models is still a challenge task as a result of the fact that an EFSM model may contain infeasible paths. In this article we present a novel approach that combines static analysis and dynamic analysis techniques to address the problems of path infeasibility in the process of test case generation on EFSM models. A metric is presented for the purpose of finding a path subset that has few paths, long path length and goodness feasibility to meet adequacy coverage criteria. In addition, we develop an executable model to obtain run-time information feedback and introduce the Scatter Search into test case generation. Based on the executable model, the expected outputs associated with test data are also collected for construction of test oracles automatically. The experimental results show that our approach has good effectiveness for test case generation on EFSM models, and the method that combines static analysis and dynamic analysis can speed up the process of test case generation greatly.
用于自动生成测试用例的典型方法是创建被测实现的模型。扩展有限状态机(EFSM)是最流行的基于模型的测试模型之一。然而,在EFSM模型上自动生成测试用例仍然是一项具有挑战性的任务,因为EFSM模型可能包含不可行的路径。在这篇文章中,我们提出了一种结合了静态分析和动态分析技术的新方法来解决EFSM模型上测试用例生成过程中路径不可行的问题。提出了一种度量,用于寻找具有较少路径、较长的路径长度和良好可行性以满足充分性覆盖标准的路径子集。此外,我们开发了一个可执行模型来获取运行时信息反馈,并将分散搜索引入到测试用例生成中。基于可执行模型,与测试数据相关的预期输出也被自动收集,用于构建测试预言机。实验结果表明,该方法对EFSM模型上的测试用例生成具有良好的有效性,静态分析和动态分析相结合的方法可以大大加快测试用例的生成过程。
{"title":"Improve the Effectiveness of Test Case Generation on EFSM via Automatic Path Feasibility Analysis","authors":"Rui Yang, Zhenyu Chen, Baowen Xu, W. E. Wong, Jie Zhang","doi":"10.1109/HASE.2011.12","DOIUrl":"https://doi.org/10.1109/HASE.2011.12","url":null,"abstract":"A typical approach utilized for automated test case generation is to create a model of the implementation under test. Extended Finite State Machine (EFSM) is among the most popular models for model-based testing. However, automated test case generation on EFSM models is still a challenge task as a result of the fact that an EFSM model may contain infeasible paths. In this article we present a novel approach that combines static analysis and dynamic analysis techniques to address the problems of path infeasibility in the process of test case generation on EFSM models. A metric is presented for the purpose of finding a path subset that has few paths, long path length and goodness feasibility to meet adequacy coverage criteria. In addition, we develop an executable model to obtain run-time information feedback and introduce the Scatter Search into test case generation. Based on the executable model, the expected outputs associated with test data are also collected for construction of test oracles automatically. The experimental results show that our approach has good effectiveness for test case generation on EFSM models, and the method that combines static analysis and dynamic analysis can speed up the process of test case generation greatly.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116948080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Comparison and Analysis of Cryptographic Algorithms Aiming Performance Improvement in Secure Web Services 安全Web服务中提高性能的加密算法的比较与分析
D. Rodrigues, D. F. Pigatto, J. C. Estrella, K. Branco
In this paper is shown an evaluation and comparison of techniques that allow the validation of the Web services used, to determine characteristics related to performance and security. In this sense, it is crucial evaluate the cryptography and digital signature performance in SOAP messages, performing the change of cryptographic algorithms, as well as the keys length. Security at the message-level was provided using WSSecurity. The results obtained allow to determine the impact of security mechanisms used in this type of applications.
本文展示了一种技术的评估和比较,这些技术允许对所使用的Web服务进行验证,以确定与性能和安全性相关的特征。从这个意义上说,评估SOAP消息中的加密和数字签名性能、执行加密算法的更改以及密钥长度是至关重要的。消息级别的安全性是使用WSSecurity提供的。获得的结果允许确定在这种类型的应用程序中使用的安全机制的影响。
{"title":"Comparison and Analysis of Cryptographic Algorithms Aiming Performance Improvement in Secure Web Services","authors":"D. Rodrigues, D. F. Pigatto, J. C. Estrella, K. Branco","doi":"10.1109/HASE.2011.69","DOIUrl":"https://doi.org/10.1109/HASE.2011.69","url":null,"abstract":"In this paper is shown an evaluation and comparison of techniques that allow the validation of the Web services used, to determine characteristics related to performance and security. In this sense, it is crucial evaluate the cryptography and digital signature performance in SOAP messages, performing the change of cryptographic algorithms, as well as the keys length. Security at the message-level was provided using WSSecurity. The results obtained allow to determine the impact of security mechanisms used in this type of applications.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117323555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integrating Legacy Applications for High Availability: A Case Study 为高可用性集成遗留应用程序:案例研究
A. Kanso, F. Khendek, A. Mishra, M. Toeroe
Service high availability is becoming a must in various domains. Services provided by applications originally not designed for high availability can be rendered highly available by integrating them with a middleware compliant to the SAForum specification. Such a middleware offers a number of configuration options. The assessment of service availability at the design of the system configuration facilitates the selection of a system configuration, which is optimal with respect to specific priorities. In this paper we present a case study of turning a legacy video streaming application into a highly available one. We present our methodology, and then we analyze the availability we can expect from the application in various configurations and settings.
服务的高可用性在各个领域都是必须的。最初不是为高可用性而设计的应用程序所提供的服务,可以通过将它们与符合SAForum规范的中间件集成来实现高可用性。这样的中间件提供了许多配置选项。在设计系统配置时对服务可用性的评估有助于系统配置的选择,这对于特定的优先级来说是最优的。在本文中,我们提出了一个将传统视频流应用程序转变为高可用性应用程序的案例研究。我们介绍了我们的方法,然后分析了应用程序在各种配置和设置下的可用性。
{"title":"Integrating Legacy Applications for High Availability: A Case Study","authors":"A. Kanso, F. Khendek, A. Mishra, M. Toeroe","doi":"10.1109/HASE.2011.39","DOIUrl":"https://doi.org/10.1109/HASE.2011.39","url":null,"abstract":"Service high availability is becoming a must in various domains. Services provided by applications originally not designed for high availability can be rendered highly available by integrating them with a middleware compliant to the SAForum specification. Such a middleware offers a number of configuration options. The assessment of service availability at the design of the system configuration facilitates the selection of a system configuration, which is optimal with respect to specific priorities. In this paper we present a case study of turning a legacy video streaming application into a highly available one. We present our methodology, and then we analyze the availability we can expect from the application in various configurations and settings.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126539280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Leader-Determined Membership Protocol 领导决定的成员协议
Wenbing Zhao, P. Melliar-Smith, L. Moser
Many fault-tolerant systems organize the replicas of an application process as a process group. The Leader-Determined Membership Protocol determines a new membership for the process group, when a member becomes faulty, a member leaves the group, or a new member joins the group. If the primary becomes faulty, the protocol selects a new primary deterministically, based on the precedences and the ranks of the backups. The new primary determines which processes are members of the new membership, and communicates that information to the backups. The protocol maintains a consistent view of the membership, so that the members see the same primary, the same set of members, and the same primary view number. It also ensures consistency of the states of the members, and consistency with other processes with which the members communicate. By avoiding the use of a multiple-round majority-based consensus algorithm, the Leader-Determined Membership Protocol achieves better performance than other membership protocols, and can operate with the primary and only a single backup.
许多容错系统将应用程序流程的副本组织为流程组。领导者确定的成员关系协议确定流程组的新成员关系,当成员出现故障、成员离开组或新成员加入组时。如果主备份出现故障,协议将根据备份的优先级和级别确定地选择一个新的主备份。新的主进程确定哪些进程是新成员关系的成员,并将该信息传递给备份。协议维护成员关系的一致视图,以便成员看到相同的主视图、相同的成员集和相同的主视图号。它还确保成员状态的一致性,以及与成员通信的其他过程的一致性。通过避免使用多轮基于多数的共识算法,Leader-Determined Membership Protocol获得了比其他成员协议更好的性能,并且可以在主节点上运行,只有一个备份。
{"title":"Leader-Determined Membership Protocol","authors":"Wenbing Zhao, P. Melliar-Smith, L. Moser","doi":"10.1109/HASE.2011.14","DOIUrl":"https://doi.org/10.1109/HASE.2011.14","url":null,"abstract":"Many fault-tolerant systems organize the replicas of an application process as a process group. The Leader-Determined Membership Protocol determines a new membership for the process group, when a member becomes faulty, a member leaves the group, or a new member joins the group. If the primary becomes faulty, the protocol selects a new primary deterministically, based on the precedences and the ranks of the backups. The new primary determines which processes are members of the new membership, and communicates that information to the backups. The protocol maintains a consistent view of the membership, so that the members see the same primary, the same set of members, and the same primary view number. It also ensures consistency of the states of the members, and consistency with other processes with which the members communicate. By avoiding the use of a multiple-round majority-based consensus algorithm, the Leader-Determined Membership Protocol achieves better performance than other membership protocols, and can operate with the primary and only a single backup.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-layer Monitoring for Cloud Computing 面向云计算的多层监控
Javier González, A. Muñoz, A. Maña
An architecture for dynamic security monitoring and enforcement for client software running in virtualized environments is presented. Virtualization is heavily used in cloud computing in order to allow a proper trade-off between isolation and resource usage. In this new architecture, monitoring mechanisms check a set of policy-defined conditions at runtime in order to detect threats or anomalous behaviour. On the other hand, enforcement is achievable by using secure software execution methods that comply with the defined policies. The presented architecture allows for context adaptation of the defined policies by using a new event-sequence language. This renders the automatic policy runtime enforcement as a crucial component to achieve proper security in virtualized platforms for cloud computing.
提出了在虚拟环境中运行的客户端软件的动态安全监控和实施体系结构。在云计算中大量使用虚拟化,以便在隔离和资源使用之间进行适当的权衡。在这个新的体系结构中,监控机制在运行时检查一组策略定义的条件,以便检测威胁或异常行为。另一方面,可以通过使用符合已定义策略的安全软件执行方法来实现强制执行。本文提出的体系结构允许通过使用新的事件序列语言来适应所定义策略的上下文。这使得自动策略运行时实施成为在云计算的虚拟化平台中实现适当安全性的关键组件。
{"title":"Multi-layer Monitoring for Cloud Computing","authors":"Javier González, A. Muñoz, A. Maña","doi":"10.1109/HASE.2011.65","DOIUrl":"https://doi.org/10.1109/HASE.2011.65","url":null,"abstract":"An architecture for dynamic security monitoring and enforcement for client software running in virtualized environments is presented. Virtualization is heavily used in cloud computing in order to allow a proper trade-off between isolation and resource usage. In this new architecture, monitoring mechanisms check a set of policy-defined conditions at runtime in order to detect threats or anomalous behaviour. On the other hand, enforcement is achievable by using secure software execution methods that comply with the defined policies. The presented architecture allows for context adaptation of the defined policies by using a new event-sequence language. This renders the automatic policy runtime enforcement as a crucial component to achieve proper security in virtualized platforms for cloud computing.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131780982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2011 IEEE 13th International Symposium on High-Assurance Systems Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1