首页 > 最新文献

2011 IEEE 13th International Symposium on High-Assurance Systems Engineering最新文献

英文 中文
On High-Assurance Scientific Workflows 论高保证科学工作流程
M. Vouk, Pierre Mouallem
Scientific Workflow Management Systems (S-WFMS), such as Kepler, have proven to be an important tools in scientific problem solving. Interestingly, S-WFMS fault-tolerance and failure recovery is still an open topic. It often involves classic fault-tolerance mechanisms, such as alternative versions and rollback with re-runs, reliance on the fault-tolerance capabilities provided by subcomponents and lower layers such as schedulers, Grid and cloud resources, or the underlying operating systems. When failures occur at the underlying layers, a workflow system sees this as failed steps in the process, but frequently without additional detail. This limits S-WFMS' ability to recover from failures. We describe a light weight end-to-end S-WFMS fault-tolerance framework, developed to handle failure patterns that occur in some real-life scientific workflows. Capabilities and limitations of the framework are discussed and assessed using simulations. The results show that the solution considerably increase workflow reliability and execution time stability.
科学工作流管理系统(S-WFMS),如开普勒,已被证明是解决科学问题的重要工具。有趣的是,S-WFMS的容错和故障恢复仍然是一个开放的话题。它通常涉及经典的容错机制,例如可选版本和带有重新运行的回滚,依赖于子组件和较低层(如调度器、网格和云资源)或底层操作系统提供的容错功能。当底层发生故障时,工作流系统将其视为流程中失败的步骤,但通常没有额外的细节。这限制了S-WFMS从故障中恢复的能力。我们描述了一个轻量级的端到端S-WFMS容错框架,用于处理一些现实生活中的科学工作流中出现的故障模式。讨论了该框架的功能和局限性,并利用仿真对其进行了评估。结果表明,该方案大大提高了工作流的可靠性和执行时间的稳定性。
{"title":"On High-Assurance Scientific Workflows","authors":"M. Vouk, Pierre Mouallem","doi":"10.1109/HASE.2011.58","DOIUrl":"https://doi.org/10.1109/HASE.2011.58","url":null,"abstract":"Scientific Workflow Management Systems (S-WFMS), such as Kepler, have proven to be an important tools in scientific problem solving. Interestingly, S-WFMS fault-tolerance and failure recovery is still an open topic. It often involves classic fault-tolerance mechanisms, such as alternative versions and rollback with re-runs, reliance on the fault-tolerance capabilities provided by subcomponents and lower layers such as schedulers, Grid and cloud resources, or the underlying operating systems. When failures occur at the underlying layers, a workflow system sees this as failed steps in the process, but frequently without additional detail. This limits S-WFMS' ability to recover from failures. We describe a light weight end-to-end S-WFMS fault-tolerance framework, developed to handle failure patterns that occur in some real-life scientific workflows. Capabilities and limitations of the framework are discussed and assessed using simulations. The results show that the solution considerably increase workflow reliability and execution time stability.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133812437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using Automated Control Charts for the Runtime Evaluation of QoS Attributes 使用自动控制图对QoS属性进行运行时评估
Ayman A. Amin, A. Colman, Lars Grunske
As modern software systems operate in a highly dynamic context, they have to adapt their behaviour in response to changes in their operational environment or/and requirements. Triggering adaptation depends on detecting quality of service (QoS) violations by comparing observed QoS values to predefined thresholds. These threshold-based adaptation approaches result in late adaptations as they wait until violations have occurred. This may lead to undesired consequences such as late response to critical events. In this paper we introduce a statistical approach CREQA - Control Charts for the Runtime Evaluation of QoS Attributes. This approach estimates at runtime capability of a system, and then it monitors and provides early detection of any changes in QoS values allowing timely intervention in order to prevent undesired consequences. We validated our approach using a series of experiments and response time datasets from real world web services.
由于现代软件系统在高度动态的环境中运行,它们必须调整自己的行为以响应其操作环境或/和需求的变化。触发自适应依赖于通过将观察到的QoS值与预定义阈值进行比较来检测服务质量(QoS)违规。这些基于阈值的适应方法导致了较晚的适应,因为它们要等到违规发生时才进行适应。这可能会导致意想不到的后果,例如对关键事件的延迟响应。本文介绍了一种用于QoS属性运行时评估的统计方法CREQA -控制图。这种方法估计系统的运行时能力,然后监视并提供QoS值的任何变化的早期检测,从而允许及时干预,以防止不希望的后果。我们使用一系列实验和来自真实世界web服务的响应时间数据集验证了我们的方法。
{"title":"Using Automated Control Charts for the Runtime Evaluation of QoS Attributes","authors":"Ayman A. Amin, A. Colman, Lars Grunske","doi":"10.1109/HASE.2011.20","DOIUrl":"https://doi.org/10.1109/HASE.2011.20","url":null,"abstract":"As modern software systems operate in a highly dynamic context, they have to adapt their behaviour in response to changes in their operational environment or/and requirements. Triggering adaptation depends on detecting quality of service (QoS) violations by comparing observed QoS values to predefined thresholds. These threshold-based adaptation approaches result in late adaptations as they wait until violations have occurred. This may lead to undesired consequences such as late response to critical events. In this paper we introduce a statistical approach CREQA - Control Charts for the Runtime Evaluation of QoS Attributes. This approach estimates at runtime capability of a system, and then it monitors and provides early detection of any changes in QoS values allowing timely intervention in order to prevent undesired consequences. We validated our approach using a series of experiments and response time datasets from real world web services.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133534508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Ensemble Coordination for Discrete Event Control 离散事件控制的集成协调
J. Sloan, T. Khoshgoftaar
An ensemble is a collection of independent processes, each tasked with drawing potentially differing conclusions about the same data. Using Petri nets, this paper formally describes how ensembles are organized and their behavior coordinated to effect distributed discrete event control of an ocean turbine prototype. Compositions, duals, reverses, and cliques formed over known Petri net graphs comprise the building blocks of the proposed ensemble coordination strategy. The behavior of an ensemble of controllers tasked with fault triage are subject to constraints formulated herein. The controller tasked with prognosis and health management (PHM) itself uses an ensemble of classifiers to detect faults. This ensemble is subject to constraints imposed by stream processing, which require a non-blocking form of rendezvous synchronization. Furthermore, results from each classifier must be fused in a manner that rewards that classifier's ability to predict faults. We identify two competing merit schemes -- one based on individual classifier performance and the other on performance of the sub-ensembles to which that classifier participates. Finally, we model check these Petri nets and report their results.
集成是独立过程的集合,每个过程的任务是对相同的数据得出可能不同的结论。本文利用Petri网,形式化地描述了如何组织和协调集成以实现海洋水轮机原型的分布式离散事件控制。在已知的Petri网图上形成的组合、对偶、反转和团块构成了所提出的集成协调策略的构建块。负责故障分类的控制器集合的行为受本文制定的约束。负责预测和健康管理(PHM)的控制器本身使用分类器集合来检测故障。这种集成受到流处理施加的约束,流处理需要非阻塞形式的集合同步。此外,每个分类器的结果必须以一种奖励分类器预测故障的能力的方式融合。我们确定了两个相互竞争的绩效方案——一个基于单个分类器的绩效,另一个基于该分类器参与的子集成的绩效。最后,我们对这些Petri网进行模型检查并报告其结果。
{"title":"Ensemble Coordination for Discrete Event Control","authors":"J. Sloan, T. Khoshgoftaar","doi":"10.1109/HASE.2011.26","DOIUrl":"https://doi.org/10.1109/HASE.2011.26","url":null,"abstract":"An ensemble is a collection of independent processes, each tasked with drawing potentially differing conclusions about the same data. Using Petri nets, this paper formally describes how ensembles are organized and their behavior coordinated to effect distributed discrete event control of an ocean turbine prototype. Compositions, duals, reverses, and cliques formed over known Petri net graphs comprise the building blocks of the proposed ensemble coordination strategy. The behavior of an ensemble of controllers tasked with fault triage are subject to constraints formulated herein. The controller tasked with prognosis and health management (PHM) itself uses an ensemble of classifiers to detect faults. This ensemble is subject to constraints imposed by stream processing, which require a non-blocking form of rendezvous synchronization. Furthermore, results from each classifier must be fused in a manner that rewards that classifier's ability to predict faults. We identify two competing merit schemes -- one based on individual classifier performance and the other on performance of the sub-ensembles to which that classifier participates. Finally, we model check these Petri nets and report their results.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131300237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Relationship between Preprocessor-Based Software Variability and Software Defects 基于预处理器的软件可变性与软件缺陷的关系研究
Kunming Nie, Li Zhang
The importance of the relationship between the software variability and defect proneness of software modules is well recognized. The utilization of variability can strengthen the software versatile, but as the software variability increases, the software complexity can increase correspondingly. Most variability realization techniques are based on configuration, and that the variability realization code correlate with one configuration options may scatter across many software modules, which could easily induce defect and lead to dead code. This paper analyzes the preprocessor based realization of the variability, series of variability metrics are defined and the variability from different granulites is analyzed to verify whether the high variability can cause high defect. Experimental result shows that the software variability and the defect have statistically significant relationship.
软件可变性与软件模块缺陷倾向之间关系的重要性已得到充分认识。可变性的利用可以增强软件的通用性,但随着软件可变性的增加,软件的复杂性也相应增加。大多数可变性实现技术是基于配置的,并且与一个配置选项相关的可变性实现代码可能分散在许多软件模块中,这很容易引起缺陷并导致死代码。本文分析了基于预处理的变异性实现方法,定义了一系列变异性指标,并对不同麻粒岩的变异性进行了分析,验证了高变异性是否会导致高缺陷。实验结果表明,软件可变性与缺陷之间存在显著的统计关系。
{"title":"On the Relationship between Preprocessor-Based Software Variability and Software Defects","authors":"Kunming Nie, Li Zhang","doi":"10.1109/HASE.2011.44","DOIUrl":"https://doi.org/10.1109/HASE.2011.44","url":null,"abstract":"The importance of the relationship between the software variability and defect proneness of software modules is well recognized. The utilization of variability can strengthen the software versatile, but as the software variability increases, the software complexity can increase correspondingly. Most variability realization techniques are based on configuration, and that the variability realization code correlate with one configuration options may scatter across many software modules, which could easily induce defect and lead to dead code. This paper analyzes the preprocessor based realization of the variability, series of variability metrics are defined and the variability from different granulites is analyzed to verify whether the high variability can cause high defect. Experimental result shows that the software variability and the defect have statistically significant relationship.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116488257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enumerating Software Failures to Build Dependable Distributed Applications 列举软件故障以构建可靠的分布式应用程序
Ingrid A. Buckley, E. Fernández
We are proposing a systematic approach to building reliable distributed applications. The main objective of this approach is to consider reliability from application inception to completion, adding reliability patterns along the lifecycle and in all architectural layers. We start by enumerating the possible failures of the application, considering every activity in the use cases of the application. The identified failures are then handled by applying reliability policies. We evaluate the benefits of this approach and compare our approach to others.
我们提出了一种系统的方法来构建可靠的分布式应用程序。此方法的主要目标是考虑从应用程序开始到完成的可靠性,并在整个生命周期和所有体系结构层中添加可靠性模式。我们首先列举应用程序可能出现的故障,考虑应用程序用例中的每个活动。然后通过应用可靠性策略来处理已识别的故障。我们评估这种方法的好处,并将我们的方法与其他方法进行比较。
{"title":"Enumerating Software Failures to Build Dependable Distributed Applications","authors":"Ingrid A. Buckley, E. Fernández","doi":"10.1109/HASE.2011.35","DOIUrl":"https://doi.org/10.1109/HASE.2011.35","url":null,"abstract":"We are proposing a systematic approach to building reliable distributed applications. The main objective of this approach is to consider reliability from application inception to completion, adding reliability patterns along the lifecycle and in all architectural layers. We start by enumerating the possible failures of the application, considering every activity in the use cases of the application. The identified failures are then handled by applying reliability policies. We evaluate the benefits of this approach and compare our approach to others.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122440490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards a Security Domain Model for Embedded Systems 面向嵌入式系统的安全域模型
S. Nadjm-Tehrani, Maria Vasilevskaya
The need for efficient processes for implementing security properties in systems that are made of networked embedded devices motivates a fresh look at how security is "added" to embedded components at late development stages. In this short paper we propose a security domain model intended for considering security aspects at early embedded systems design stages. It consists of two components: (1) An interface to the system engineering models in which aspects that are relevant to security are extracted, and (2) Elements that are specific to known security solutions and realisable in collections or libraries. The paper shows that what this security domain model has in common with other software security models is the need for representation of security properties, and what it has in common with other embedded systems models is the need for representation of resources. The proposed model is described and illustrated by application to a mesh communication for crisis management scenario.
对于在由联网嵌入式设备组成的系统中实现安全属性的高效流程的需求,促使人们重新审视如何在开发后期将安全性“添加”到嵌入式组件中。在这篇短文中,我们提出了一个安全领域模型,用于在嵌入式系统的早期设计阶段考虑安全方面。它由两个组件组成:(1)系统工程模型的接口,其中提取与安全性相关的方面,以及(2)特定于已知安全性解决方案并在集合或库中可实现的元素。该安全域模型与其他软件安全模型的共同之处在于需要对安全属性进行表示,与其他嵌入式系统模型的共同之处在于需要对资源进行表示。本文以危机管理场景下的网格通信为例,对所提出的模型进行了描述和说明。
{"title":"Towards a Security Domain Model for Embedded Systems","authors":"S. Nadjm-Tehrani, Maria Vasilevskaya","doi":"10.1109/HASE.2011.19","DOIUrl":"https://doi.org/10.1109/HASE.2011.19","url":null,"abstract":"The need for efficient processes for implementing security properties in systems that are made of networked embedded devices motivates a fresh look at how security is \"added\" to embedded components at late development stages. In this short paper we propose a security domain model intended for considering security aspects at early embedded systems design stages. It consists of two components: (1) An interface to the system engineering models in which aspects that are relevant to security are extracted, and (2) Elements that are specific to known security solutions and realisable in collections or libraries. The paper shows that what this security domain model has in common with other software security models is the need for representation of security properties, and what it has in common with other embedded systems models is the need for representation of resources. The proposed model is described and illustrated by application to a mesh communication for crisis management scenario.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131272730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GUI Software Fault Localization Using N-gram Analysis 基于n图分析的GUI软件故障定位
Zhongxing Yu, Hai Hu, Chenggang Bai, K. Cai, W. E. Wong
Graphical User Interfaces (GUIs) have become an important and accepted way of interacting with today's software. Fault localization is considered to be one of the most expensive program debugging activities. This paper presents a fault localization technique designed for GUI software. Unlike traditional software, GUI test cases usually are event sequences and each individual event has a unique corresponding event handler. We apply data mining techniques to the event sequences and their output data in terms of failure detections collected in the testing phase to rank the fault proneness of the event handlers for fault localization. Our method applies N-gram analysis to rank the event handlers of GUI programs and data collected from case studies on four real life GUI programs demonstrate the effectiveness of the proposed technique.
图形用户界面(gui)已成为与当今软件交互的重要且公认的方式。故障定位被认为是最昂贵的程序调试活动之一。本文提出了一种面向GUI软件的故障定位技术。与传统软件不同,GUI测试用例通常是事件序列,每个单独的事件都有一个唯一的对应事件处理程序。我们将数据挖掘技术应用于事件序列及其在测试阶段收集的故障检测的输出数据,以对事件处理程序的故障倾向进行排序,以进行故障定位。我们的方法应用N-gram分析对GUI程序的事件处理程序进行排序,并且从四个实际GUI程序的案例研究中收集的数据证明了所提出技术的有效性。
{"title":"GUI Software Fault Localization Using N-gram Analysis","authors":"Zhongxing Yu, Hai Hu, Chenggang Bai, K. Cai, W. E. Wong","doi":"10.1109/HASE.2011.29","DOIUrl":"https://doi.org/10.1109/HASE.2011.29","url":null,"abstract":"Graphical User Interfaces (GUIs) have become an important and accepted way of interacting with today's software. Fault localization is considered to be one of the most expensive program debugging activities. This paper presents a fault localization technique designed for GUI software. Unlike traditional software, GUI test cases usually are event sequences and each individual event has a unique corresponding event handler. We apply data mining techniques to the event sequences and their output data in terms of failure detections collected in the testing phase to rank the fault proneness of the event handlers for fault localization. Our method applies N-gram analysis to rank the event handlers of GUI programs and data collected from case studies on four real life GUI programs demonstrate the effectiveness of the proposed technique.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131278242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Discriminatively Fortified Computing with Reconfigurable Digital Fabric 可重构数字结构的判别强化计算
Mingjie Lin, Yu Bai, J. Wawrzynek
This work proposes a novel approach -- Discriminatively Fortified Computing (DFC) -- to achievehardware-efficient reliable computing without deterministically knowing the location and occurrence time of hardware defects and design faults. The key insights behind DFC comprise:1) different system components contribute differently to the overall correctness of a target application, therefore should be treated distinctively, and 2) abundant error resilience exists inherently in many practical algorithms, such as signal processing, visual perception, and artificial learning. Such error resilience can be significantly improved with effective hardware support. The major contributions of this work include 1) the development of a complete methodology to perform sensitivity and criticality analysis of hardware redundancy, 2) a novel problem formulation and an efficient heuristic methodology to discriminatively allocate hardware redundancy among a targetdesign's key components in order to maximize its overall error resilience, 3) an academic prototype of DFC computing device that illustrates a 4 times improvement of error resilience for aH.264 encoder implemented with an FPGA device.
这项工作提出了一种新的方法——判别强化计算(DFC)——在不确定性地知道硬件缺陷和设计故障的位置和发生时间的情况下实现硬件高效可靠计算。DFC背后的关键见解包括:1)不同的系统组件对目标应用程序的整体正确性贡献不同,因此应该区别对待;2)在许多实际算法中固有地存在丰富的错误弹性,例如信号处理、视觉感知和人工学习。通过有效的硬件支持,可以显著提高这种错误恢复能力。这项工作的主要贡献包括:1)开发了一种完整的方法来执行硬件冗余的敏感性和临界性分析;2)一种新的问题公式和一种有效的启发式方法,在目标设计的关键组件之间区分地分配硬件冗余,以最大限度地提高其整体错误弹性;3)DFC计算设备的学术原型,说明了aH的错误弹性提高了4倍。264编码器实现的FPGA设备。
{"title":"Discriminatively Fortified Computing with Reconfigurable Digital Fabric","authors":"Mingjie Lin, Yu Bai, J. Wawrzynek","doi":"10.1109/HASE.2011.49","DOIUrl":"https://doi.org/10.1109/HASE.2011.49","url":null,"abstract":"This work proposes a novel approach -- Discriminatively Fortified Computing (DFC) -- to achievehardware-efficient reliable computing without deterministically knowing the location and occurrence time of hardware defects and design faults. The key insights behind DFC comprise:1) different system components contribute differently to the overall correctness of a target application, therefore should be treated distinctively, and 2) abundant error resilience exists inherently in many practical algorithms, such as signal processing, visual perception, and artificial learning. Such error resilience can be significantly improved with effective hardware support. The major contributions of this work include 1) the development of a complete methodology to perform sensitivity and criticality analysis of hardware redundancy, 2) a novel problem formulation and an efficient heuristic methodology to discriminatively allocate hardware redundancy among a targetdesign's key components in order to maximize its overall error resilience, 3) an academic prototype of DFC computing device that illustrates a 4 times improvement of error resilience for aH.264 encoder implemented with an FPGA device.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131351085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Personal Health Record System and Integration Techniques with Various Electronic Medical Record Systems 个人健康档案系统及与各种电子病历系统的集成技术
V. Ved, V. Tyagi, Ankur Agarwal, A. Pandya
This paper discusses the importance of a Patient Centric Health Record system. Such systems can empower patients to participate in improving health care quality. It would also provide an economically viable solution to the need for better healthcare without escalating costs by avoiding duplication. The proposed system is Web-based so patients and healthcare providers can access it from any location. Moreover the architecture is cloud-based so large amount of data can be stored without any restrictions. Also the use of cloud computing architecture will allow consumers to address the challenge of sharing medical data that is overly complex and highly expensive to address with traditional technologies.
本文讨论了以患者为中心的健康记录系统的重要性。这类系统可以使患者能够参与改善卫生保健质量。它还将提供一种经济上可行的解决方案,以满足对更好的医疗保健的需求,同时又不会因避免重复而导致成本上升。拟议的系统是基于web的,因此患者和医疗保健提供者可以从任何位置访问它。此外,该架构是基于云的,因此可以不受任何限制地存储大量数据。此外,云计算架构的使用将使消费者能够应对共享医疗数据的挑战,这一挑战过于复杂且成本高昂,无法用传统技术解决。
{"title":"Personal Health Record System and Integration Techniques with Various Electronic Medical Record Systems","authors":"V. Ved, V. Tyagi, Ankur Agarwal, A. Pandya","doi":"10.1109/HASE.2011.63","DOIUrl":"https://doi.org/10.1109/HASE.2011.63","url":null,"abstract":"This paper discusses the importance of a Patient Centric Health Record system. Such systems can empower patients to participate in improving health care quality. It would also provide an economically viable solution to the need for better healthcare without escalating costs by avoiding duplication. The proposed system is Web-based so patients and healthcare providers can access it from any location. Moreover the architecture is cloud-based so large amount of data can be stored without any restrictions. Also the use of cloud computing architecture will allow consumers to address the challenge of sharing medical data that is overly complex and highly expensive to address with traditional technologies.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129985292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
VMDetector: A VMM-based Platform to Detect Hidden Process by Multi-view Comparison VMDetector:基于vmm的多视图比较检测隐藏进程的平台
Y. Wang, Chunming Hu, B. Li
Recently, "rootkit" becomes a popular hacker malware on the Internet, which controls the hosts on the Internet by hiding itself, and raises a serious security threat. Existing host-based and hardware-based solutions have some disadvantages, such as hardware overhead and being discovered by root kits, where the development of virtualization technology provides a better solution to avoid those. Virtual machine monitor has the highest authority on the virtual machine, and has the right to control the activities in the virtual machine without being found by root kits in the virtual machines. We propose VM Detector based on this hardware virtualization technology, using multi-view detection mechanism, to detect hidden processes inside the virtual machine on many aspects, then to improve the virtual machine's security. Through several experiments, VM Detector carried on the process detection effectively, and introduced less than 10% performance overhead.
最近,“rootkit”成为互联网上流行的黑客恶意软件,它通过隐藏自己来控制互联网上的主机,并提出了严重的安全威胁。现有的基于主机和基于硬件的解决方案有一些缺点,比如硬件开销和被根工具包发现,而虚拟化技术的开发提供了一个更好的解决方案来避免这些问题。虚拟机监视器对虚拟机具有最高权限,可以控制虚拟机中的活动,而不会被虚拟机中的根工具包发现。基于这种硬件虚拟化技术,我们提出了VM检测器,采用多视图检测机制,从多个方面检测虚拟机内部的隐藏进程,从而提高虚拟机的安全性。通过多次实验,VM检测器有效地进行了进程检测,并引入了小于10%的性能开销。
{"title":"VMDetector: A VMM-based Platform to Detect Hidden Process by Multi-view Comparison","authors":"Y. Wang, Chunming Hu, B. Li","doi":"10.1109/HASE.2011.41","DOIUrl":"https://doi.org/10.1109/HASE.2011.41","url":null,"abstract":"Recently, \"rootkit\" becomes a popular hacker malware on the Internet, which controls the hosts on the Internet by hiding itself, and raises a serious security threat. Existing host-based and hardware-based solutions have some disadvantages, such as hardware overhead and being discovered by root kits, where the development of virtualization technology provides a better solution to avoid those. Virtual machine monitor has the highest authority on the virtual machine, and has the right to control the activities in the virtual machine without being found by root kits in the virtual machines. We propose VM Detector based on this hardware virtualization technology, using multi-view detection mechanism, to detect hidden processes inside the virtual machine on many aspects, then to improve the virtual machine's security. Through several experiments, VM Detector carried on the process detection effectively, and introduced less than 10% performance overhead.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131084572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2011 IEEE 13th International Symposium on High-Assurance Systems Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1