Nowadays chipped based sensors and RFID tags are widely employed in Internet of Things;however, for those devices, effective and flexible security mechanisms lack. In this paper we study the security requirement and p...
详细信息
ISBN:
(纸本)9783319122854
Nowadays chipped based sensors and RFID tags are widely employed in Internet of Things;however, for those devices, effective and flexible security mechanisms lack. In this paper we study the security requirement and propose an adaptive security framework for sensors in Internet of things, which provides dynamic confidentiality, authenticity and integrity in the networks with relative suitable overhead by context aware computing, decision making and dynamic enforcement of policies. We employ Markov Decision Process to make the decisions of security actions and adopt aspect-oriented programming technique to enforce the security policies dynamically in the working networks. We made simulations of our framework, and the performance is encouraging.
In Software Product Lines (SPL), we can bind reusable features to compose a product at different times, which in general are static or dynamic. The former allows customizability without any overhead at runtime. On the...
详细信息
ISBN:
(纸本)9781479925315
In Software Product Lines (SPL), we can bind reusable features to compose a product at different times, which in general are static or dynamic. The former allows customizability without any overhead at runtime. On the other hand, the latter allows feature activation or deactivation while running the application with the cost of performance and memory consumption. To implement features, we might use aspect-oriented programming (AOP), in which aspects enable a clear separation between base code and variable code. In this context, recent work provides aspectJ-based idioms to implement flexible feature binding. However, we identified some design deficiencies. Thus, to solve the issues of these idioms, we incrementally create three new aspectJ-based idioms. Moreover, to evaluate our new idioms, we quantitatively analyze them with respect to code cloning, scattering, tangling, and size by means of software metrics. Besides that, we qualitatively discuss our new idioms in terms of code reusability, changeability, and instrumentation overhead.
Concurrency and failures are fundamental problems in distributed computing. One likes to think that the mechanisms needed to address these problems can be separated from the rest of the distributed application: in mod...
详细信息
ISBN:
(纸本)3540437592
Concurrency and failures are fundamental problems in distributed computing. One likes to think that the mechanisms needed to address these problems can be separated from the rest of the distributed application: in modern words, these mechanisms could be aspectized. Does this however make sense? This paper relates an experience that conveys our initial and indeed biased intuition that the answer is in general no. Except for simple academic examples, it is hard and even potentially dangerous to separate concurrency control and failure management from the actual application. We point out the very facts that (1) an aspect-oriented language can, pretty much like a macro language, be beneficial for code factorization (but should be reserved to experienced programmers), and (2) concurrency and failures are particularly hard to aspectize because they are usually par. of the phenomenon that objects should simulate. They are in this sense different than other concerns, like for instance tracing, which might be easier to aspectize.
This paper proposes a novel hardware compilation approach targeting dataflow designs. This approach is based on aspect-oriented programming to decouple design development from design optimisation, thus improving porta...
详细信息
ISBN:
(纸本)9781479904945;9781479904938
This paper proposes a novel hardware compilation approach targeting dataflow designs. This approach is based on aspect-oriented programming to decouple design development from design optimisation, thus improving portability and developer productivity while enabling automated exploration of design trade-offs to enhance performance. We introduce FAST, a language for specifying dataflow designs that supports our approach. Optimisation strategies for the generated designs are specified in FAST, making use of facilities in the domain-specific aspect-oriented language, LARA. Our approach is demonstrated by implementing various seismic imaging designs for Reverse-Time Migration (RTM), which have performance comparable to state-of-the-art FPGA implementations while being produced with improved developer productivity.
To reduce the manual effort of assessing potential affected program parts during software evolution, we develop a tool, called Celadon, which automates the change impact analysis for aspectJ programs. Celadon is imple...
详细信息
ISBN:
(纸本)9781605580791
To reduce the manual effort of assessing potential affected program parts during software evolution, we develop a tool, called Celadon, which automates the change impact analysis for aspectJ programs. Celadon is implemented in the context of the Eclipse environment and designed as a plugin. It analyzes the source code of two aspectJ software versions, and decomposes their differences into a set of atomic changes together with their dependence relationships. The analysis result is reported in terms of impacted program parts and affected tests. For each affected test, Celadon also identifies a subset of affecting changes that are responsible for the test's behavior change. In particular, as one of its applications, Celadon helps facilitate fault localization by isolating failure-inducing changes for one specific affected test from other irrelevant changes.
This paper aims to present an awareness service, named Aw2SOA, which was developed in order to support distributed groupware design in WGWSOA environment. It is a middleware specific service which was implemented acco...
详细信息
ISBN:
(纸本)9781424416509
This paper aims to present an awareness service, named Aw2SOA, which was developed in order to support distributed groupware design in WGWSOA environment. It is a middleware specific service which was implemented according to SOA principles and aspect-oriented concepts. In groupware literature, service-oriented approach is suggested. aiming to solve reuse and evolution requirements. However, awareness support is fulfilled by similar functionalities implemented in different modules. As a result, activities related to the maintenance and evolution of this matter cannot be considered as easy tasks. WGWSOA (Web-based Groupware Service-oriented Architecture) is based on middleware services for collaborative applications.
aspect-oriented programming (AOP) makes up for the defects coming from the mode based on Object-orientedprogramming when it deals with the cross-cutting concerns. Model Driver Architecture (MDA) is a new way of writi...
详细信息
ISBN:
(纸本)9781424445189
aspect-oriented programming (AOP) makes up for the defects coming from the mode based on Object-orientedprogramming when it deals with the cross-cutting concerns. Model Driver Architecture (MDA) is a new way of writing specifications which includes platform-independent model (PIM) and platform specific model (PSM);The MDA will make it easier to integrate applications and facilities across middleware boundaries. But in MDA, it is not consider the impact of cross-cutting concerns, separation of concern mechanisms and abstractions are needed. In this paper, we will introduce aspect in the framework of MDA with Unified Modeling Language (UML) which will improve efficiency of development and reuse of the system.
To simplify the constructs that programmers have to learn for using paradigms, we extend methods to a new language construct, a method slot, to support both the event-handler paradigm and the aspect paradigm. A method...
详细信息
ISBN:
(纸本)9783642550997;9783642550980
To simplify the constructs that programmers have to learn for using paradigms, we extend methods to a new language construct, a method slot, to support both the event-handler paradigm and the aspect paradigm. A method slot is an object's property that can keep more than one function closure and be called like a method. We also propose a Java-based language, DominoJ, which replaces methods in Java with method slots, and explains the behavior of method slots and the operators. Then we evaluate the coverage of expressive ability of method slots by comparing DominoJ with other languages in detail. The feasibility of method slots is shown as well by implementing a prototype compiler and running a preliminary microbenchmark for it.
Evolution of software components may lead to compatibility problems, such as incorrect executing results, compilation errors and system crashes. Solving those problems is a big challenge in software engineering. In th...
详细信息
Evolution of software components may lead to compatibility problems, such as incorrect executing results, compilation errors and system crashes. Solving those problems is a big challenge in software engineering. In the past decade, many automatic solutions to address this issue have been proposed. However, all of them rely on extra change information (i.e., the information regarding the changes of the upgraded components). Without such information, none of the existing solutions can work. Therefore, how to fully automatically solve compatibility problems without extra information is still an important open issue. In the current study, I proposed an end-to-end solution to fully automatically adapt incompatible components without resorting to any extra information. It is composed of two parts. The first part is TARP, an AI-planning based automatic refactoring history reconstruction framework. For an upgraded component, TARP can automatically reconstruct the missing refactoring history. The second part is ALTA, an automatic load-time adaptation framework, which can adapt incompatible components on-the-fly according to the refactoring history generated from TARP. Therefore, as an integrated solution with both TARP and ALTA, compatibility problems among application and components can be fully automatically solved to a very large extent. The implementation of ALTA as ALTA*, and TARP as TARP*, were evaluated by conducting five sets of tests. The experimental results show that the TARP* + ALTA* solution can indeed fully automatically fix compatibility problems incurred to large-scale components without any additional information.
Security is a very challenging task in software engineering. Enforcing security policies should be taken care of during the early phases of the software development life cycle to prevent security breaches in the final...
详细信息
ISBN:
(纸本)9781607500490
Security is a very challenging task in software engineering. Enforcing security policies should be taken care of during the early phases of the software development life cycle to prevent security breaches in the final product. Since security is a crosscutting concern that pervades the entire software, integrating security solutions at the software design level may result in scattering and tangling security features throughout the entire design. To address this issue, we propose in this paper an aspect-oriented approach for specifying and enforcing security hardening solutions. This approach provides software designers with UML-based capabilities to perform security hardening in a clear and organized way, at the UML design level, without the need to be security experts. We also present the SHP profile, a UML-based security hardening language to describe and specify security hardening solutions at the UML design level. Finally, we explore the efficiency and the relevance of our approach by applying it to a real world case study and present the experimental results.
暂无评论