Techniques for building local area network clusters differ from those used for large scale harvesting of idle computing power. The overlapping non dedicated clusters (ONDC) architecture is trying to mix advantages of ...
详细信息
Techniques for building local area network clusters differ from those used for large scale harvesting of idle computing power. The overlapping non dedicated clusters (ONDC) architecture is trying to mix advantages of both techniques. Clusters build in ONDC style can be deployed both on small scale local networks, but as well in large scale over the Internet deployments. In this paper we analyze the security requirements of ONDC and describe our solution. The solution was implemented for the Clondike clustering system, but the same approach can be used for any other ONDC system. The proposed system is inspired by the security mechanisms of existing P2P grid systems and various trust management systems, but it is tailored to exactly match the ONDC requirements. An important aspect of the proposed solution is a combination of locally issued identity based access control and certificates based delegated authorizations. While the identity based access control is the most intuitive way how to express trust for the users of the system, delegated authorizations are an answer for more complex cases. The unique feature of the proposed system is configurable mechanism for authorization distributions and storage that enables users to trade-off a local information availability with local storage requirements.
Enterprise architectures (EA) embody the business objectives, processes and information technology infrastructure reflecting the desired incorporation and standardization requirements of a company's operating mode...
详细信息
Enterprise architectures (EA) embody the business objectives, processes and information technology infrastructure reflecting the desired incorporation and standardization requirements of a company's operating model. It is vital that during the initial design stages the software system's architecture aligns with the EA. While frameworks exist to check the alignment of enterprise and system architectures, there is an assumption of well-defined requirements derived from the EA's business objectives. This transition is non-trivial as the EA can be a significant document representing the viewpoints of the stakeholders. This paper proposes and illustrates, using the Grounded Theory Methodology, a systematic, qualitative procedure, to extract the functional and non-functional enterprise requirements from the EA and/or system description. The contribution of this work is to further systematize the alignment and traceability of EA and system architectures and provide the initial requirements and system models necessary for supporting the of enterprise systems.
To realize a practical context-aware system, we should be clearly aware of important issues in context-aware systems. In this paper, we review a wide range of existing researches and the history of context-aware syste...
详细信息
To realize a practical context-aware system, we should be clearly aware of important issues in context-aware systems. In this paper, we review a wide range of existing researches and the history of context-aware systems. We derive technical issues on realizing context-aware services based on the history and explain them. In addition, we describe seven context-aware service scenarios and discuss related issues. We believe that the derived issues from our survey and the proposed service scenarios will be used as useful reference for future researches.
This paper investigates achieving fault tolerance by adaptive remapping in the context of networks on chip. The problem of dynamic application remapping is formulated and an efficient algorithm is proposed to address ...
详细信息
This paper investigates achieving fault tolerance by adaptive remapping in the context of networks on chip. The problem of dynamic application remapping is formulated and an efficient algorithm is proposed to address single and multiple PE failures. The new algorithm can be used to dynamically react and recover from PE failures in order to maintain system functionality. The quality of results is similar to that achieved using simulated annealing but in significantly shorter runtimes.
We extend DSTM2 with a combination of two techniques: First, we applied speculative dependencies between transactions, as first introduced in. Specifically, transactions may read data of earlier transactions that have...
详细信息
We extend DSTM2 with a combination of two techniques: First, we applied speculative dependencies between transactions, as first introduced in. Specifically, transactions may read data of earlier transactions that have completed their execution, but are not yet committed. This is the case, for instance, when transactions have to commit in a certain order and must wait for the completion of earlier transactions to detect possible conflicts (e.g., in stream processing systems). Second, we expand speculation to distributed settings, by allowing not yet committed transactions to trigger execution of other speculative transactions on a remote machine. We use a simple notification mechanism to commit or abort remote speculative transactions once the outcome of all the transactions they depend on is known. In this paper we describe our extensions to the DSTM2 framework to enable distributed speculation and evaluate their performance on a simple distributed application.
In information era advocating ubiquitous computing, computing resources are susceptible to attack without guaranteeing security of network system. It is necessary and desirable for network system to employ powerful sa...
详细信息
In information era advocating ubiquitous computing, computing resources are susceptible to attack without guaranteeing security of network system. It is necessary and desirable for network system to employ powerful safeguard to protect itself against diversified vulnerabilities. In this paper, we present reverse analysis and vulnerability detection for network system software (RAVDNSS), a novel approach which uses reverse analysis and vulnerability detection technologies to deal with security problems on critical network system. Adaptive reverse analysis we propose is used to dig out potential vulnerabilities, which might be abused by unauthorized and unlawful communities. A new vulnerability detection model is designed to provide safety precautions through detecting vulnerabilities and monitoring program behaviors. Our investigation aims to improve the ability to guard network system against malicious attacks. The proposed schemes demonstrate that our approach can effectively perform security detection and management of network system software.
作者:
Xavier GrehantIsabelle DemeureCNRS
LTCI and CERN openlab Institut Telecom-Telecom ParisTech LTCI France CNRS
LTCI Institut Telecom-Telecom ParisTech LTCI France
This paper presents the symmetric mapping pattern, an architectural pattern for the design of resource supply systems. The focus of symmetric mapping is on separation of concerns for cost-effective resource allocation...
详细信息
This paper presents the symmetric mapping pattern, an architectural pattern for the design of resource supply systems. The focus of symmetric mapping is on separation of concerns for cost-effective resource allocation. It divides resource supply in three functions: (1) Users and providers match and engage in resource supply agreements, (2) users place tasks on subscribed resource containers, and (3) providers place supplied resource containers on physical resources. The pattern relies on stakeholders to act for their own interest. The efficiency of the whole system is determined by the degree of freedom left to the three functions and the efficiency of the associated decision systems. We propose a formalism of the symmetric mapping pattern, we observe to what extend existing grid and cloud systems follow it, and we propose elements of an original implementation.
A deniable authentication allows the receiver to identify the source of the received messages but cannot prove it to any third party. However, the deniability of the content, which is called restricted deniability in ...
详细信息
A deniable authentication allows the receiver to identify the source of the received messages but cannot prove it to any third party. However, the deniability of the content, which is called restricted deniability in this paper, is concerned in electronic voting and some other similar application. At present, most non-interactive deniable authentication protocols cannot resist weaken key-compromise impersonation (W-KCI) attack. To settle this problem, a non-interactive identity-based restricted deniable authentication protocol is proposed. It not only can resist W-KCI attack but also has the properties of communication flexibility. It meets the security requirements such as correctness, restricted deniability as well. Therefore, this protocol can be applied in electronic voting.
The design space of emerging heterogeneous multi-core architectures with re-configurability element makes it feasible to design mixed fine-grained and coarse-grained parallel architectures. This paper presents a hiera...
详细信息
ISBN:
(纸本)9781424444106
The design space of emerging heterogeneous multi-core architectures with re-configurability element makes it feasible to design mixed fine-grained and coarse-grained parallel architectures. This paper presents a hierarchical composite array design which extends the current design space of regular array design by combining a sequence of transformations. This technique is applied to derive a new design of a pipelined parallel regular array with different dataflow between phases of computation.
The development of large-scale parallel scientific computing applications has put forward more urgent demands for powerful computing capacities and complex process managing technologies. Meanwhile, the scientific expe...
详细信息
The development of large-scale parallel scientific computing applications has put forward more urgent demands for powerful computing capacities and complex process managing technologies. Meanwhile, the scientific experiment processes become more and more complicated which makes it becomes a hard work for e-scientists to control the experiment analysis processes by hand. In this paper, we provide a scientific workflow system called EPSWFlow for the escientists in climate domain for services composition and workflow orchestration. In order to integrate the large number of the existing legacy applications into the system, we provide a service wrapping method and a unified interface for the workflow users to access to the services. The workflow system can process the experiment process dynamically and manage the heterogeneous grid resources transparently.
暂无评论