2010 IEEE 34th Annual Computer Software and Applications Conference Workshops最新文献

筛选
英文 中文
Permission Management System: Permission as a Service in Cloud Computing 权限管理系统:云计算中的权限即服务
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.71
Victor T. E. Echeverria, L. Liebrock, Dongwan Shin
{"title":"Permission Management System: Permission as a Service in Cloud Computing","authors":"Victor T. E. Echeverria, L. Liebrock, Dongwan Shin","doi":"10.1109/COMPSACW.2010.71","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.71","url":null,"abstract":"One of the challenging problems cloud computing is facing today is the security of data in the cloud. Since the physical location of user data in the cloud is unknown and the data are often distributed across multiple cloud services, a user controllable and privacy preserving access control mechanism is necessary for the success of cloud computing in general and for the protection of user data in specific. In this paper, we discuss a novel approach to controlling access to user data in the cloud; the concept is called Permission as a Service (PaaS). Specifically, PaaS separates access control from other services to provide a separate service in the cloud. This allows users to set permissions for all data in a single location. In PaaS, user data are encrypted to maintain confidentiality and permissions are managed via decryption keys. As a proof-of-concept, we discuss the design and implementation of our prototype leveraging attribute based encryption (ABE).","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"55 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127659109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Context-Aware Meeting Room: Mobile Interaction and Collaboration Using Android, Java ME and Windows Mobile 上下文感知会议室:使用Android、Java ME和Windows Mobile的移动交互和协作
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.61
Tor-Morten Grønli, Jarle Hansen, G. Ghinea
{"title":"A Context-Aware Meeting Room: Mobile Interaction and Collaboration Using Android, Java ME and Windows Mobile","authors":"Tor-Morten Grønli, Jarle Hansen, G. Ghinea","doi":"10.1109/COMPSACW.2010.61","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.61","url":null,"abstract":"Smart-meeting rooms constitute an interesting and realistic application area of context-aware technologies. In this paper, we present the development and evaluation of a prototypical smart-meeting room that, through embracing different mobile technological platforms, endows context aware abilities to meetings. Here, both participants and presenters share information through the Google cloud architecture across a heterogeneous group of mobile devices, running on popular platforms such as Java ME, Windows Mobile, and Android. Results show that the smart room successfully facilitates user participation and interaction, as well as information exchange, in the meeting room environment, irrespective of the mobile platform employed.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130422101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling and Verification of an Automatic Train Protection System 列车自动保护系统的建模与验证
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.46
Xijiao Xiong, Jing Liu, Miaomiao Zhang, Zuohua Ding
{"title":"Modeling and Verification of an Automatic Train Protection System","authors":"Xijiao Xiong, Jing Liu, Miaomiao Zhang, Zuohua Ding","doi":"10.1109/COMPSACW.2010.46","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.46","url":null,"abstract":"Advances in automatic control technologies have made society extremely dependent on control software used in train operation and many other applications. Consequently, the trust ability of control software is crucial. This has led to an increased emphasis on setting up a mechanism that can be used to guarantee the correctness of the models. In this paper, we proposed a process to integrate the modeling and verification techniques in Model Driven Architecture (MDA) and reported a successful application of the method to Automatic Train Protection (ATP) system. The ATP models are constructed and refined based on Refinement Calculus of Object Systems (rCOS). A modeling and verification trustable MDA tool is developed to facilitate the process.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Parallel Implementation Strategy of Adaptive Testing 自适应测试的并行实现策略
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.44
Hai Hu, Chang-Hai Jiang, Feng Ye, K. Cai, Dazhi Huang, S. Yau
{"title":"A Parallel Implementation Strategy of Adaptive Testing","authors":"Hai Hu, Chang-Hai Jiang, Feng Ye, K. Cai, Dazhi Huang, S. Yau","doi":"10.1109/COMPSACW.2010.44","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.44","url":null,"abstract":"Software testing is an important part of software development and can account for more than 50% of the development cost. In order to shorten the testing time and reduce cost, parallel mechanism is introduced to handle multiple testing tasks on the same or different software under tests (SUTs) simultaneously. On the other hand, advanced testing techniques, such as Adaptive Testing (AT) have been proposed to improve the efficiency of traditional random/partition testing. Inspired by the parallel computing technique, we present a parallel implementation of the Adaptive Testing techniques, namely the AT-P strategy. Experiments on the Space program are conducted and data indicates that the AT-P strategy can notably improve the defect detection efficiency of the original adaptive testing technique, whereas providing stable performance enhancement over multiple testing runs.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116912177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Delegation Pattern in Workflow System 工作流系统中的委托模式
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.75
Hwai-Jung Hsu, Feng-Jian Wang
{"title":"Delegation Pattern in Workflow System","authors":"Hwai-Jung Hsu, Feng-Jian Wang","doi":"10.1109/COMPSACW.2010.75","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.75","url":null,"abstract":"The best practices in workflow techniques might be constructed as workflow patterns. Van der Aalst and Russel categorized and discussed workflow patterns about several perspectives such as control flow, data, resources and exception handling. Delegation behavior is an important issue in modern workflow system. Although Russel described “resource delegation pattern” in his work, more patterns about delegation need be studied. In this paper, we present eleven basic and seven advanced delegation patterns extracted from current delegation mechanisms in RBAC and workflow systems. All the patterns are clarified with examples; on the other hand, the issues along with the patterns such as restrictions, the delegation operation adopted, etc. are also discussed.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115403627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint 基于i*的服务安全分析:一种攻击者视角的方法
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.98
Tong Li, Lin Liu, G. Elahi, E. Yu, B. Bryant
{"title":"Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint","authors":"Tong Li, Lin Liu, G. Elahi, E. Yu, B. Bryant","doi":"10.1109/COMPSACW.2010.98","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.98","url":null,"abstract":"Security analysis is a knowledge intensive process, in which the attackers and the system owners are competing with their knowledge about how the system is built, what are the weakest points of the system, and how to exploit or to protect them. In other words, it is a race of knowledge. In this paper, we present a service security modeling approach based on the agent-oriented requirement modeling framework, i*. In this approach, we first model system actors’ rationale for delivery of the service function. Then, we model a malicious actor whose intention is to disable the system functionality by exploiting their knowledge about the service and potential attacks. We assume that attackers have full knowledge about the system, which is the worst case scenario. Finally, the method automatically identifies attack routes across the actors’ dependency network based on the available knowledge. We use a recent network attack event to a major Internet service provider to illustrate the approach.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems 计算云系统自主管理的异常检测框架
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.72
Derek Smith, Qiang Guan, Song Fu
{"title":"An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems","authors":"Derek Smith, Qiang Guan, Song Fu","doi":"10.1109/COMPSACW.2010.72","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.72","url":null,"abstract":"In large-scale compute cloud systems, component failures become norms instead of exceptions. Failure occurrence as well as its impact on system performance and operation costs are becoming an increasingly important concern to system designers and administrators. When a system fails to function properly, health-related data are valuable for troubleshooting. However, it is challenging to effectively detect anomalies from the voluminous amount of noisy, high-dimensional data. The traditional manual approach is time-consuming, error-prone, and not scalable. In this paper, we present an autonomic mechanism for anomaly detection in compute cloud systems. A set of techniques is presented to automatically analyze collected data: data transformation to construct a uniform data format for data analysis, feature extraction to reduce data size, and unsupervised learning to detect the nodes acting differently from others. We evaluate our prototype implementation on an institute-wide compute cloud environment. The results show that our mechanism can effectively detect faulty nodes with high accuracy and low computation overhead.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123744025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
A Model Expansion Method in Schema-Based Model Evolution 基于模式的模型演化中的模型展开方法
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.23
Tsung Lee, J. Hou
{"title":"A Model Expansion Method in Schema-Based Model Evolution","authors":"Tsung Lee, J. Hou","doi":"10.1109/COMPSACW.2010.23","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.23","url":null,"abstract":"In this research, we designed a model expansion method that is used in a new methodology of model composition and evolution for broad design domains. In the methodology, hierarchical model compositional relationships are captured in a model composition graph (MCG) as a schema of designs. An MCG schema can be used as a blueprint for systematic and flexible evolution of designs with three hierarchical model refinement operations: expansion, synthesis, and configuration. In this research, due to the need of hierarchical sharing in software and hardware domains, we designed an algorithm to achieve conditional and recursive model expansion with hierarchical model instance sharing that is not achievable in other expansion methods. Hierarchical model instance sharing complicates the design structure from tree structures to graph structures. We thus design the model expansion algorithm with enhanced features of maintenance of MCG instance consistency, path-based search of shared submodel instances, and dependency preserving expansion ordering. The expansion specification and the expansion process are integrated with the MCG-based methodology. Model parameters set by designers and other refinement operations can be used to guide each expansion step of design models iteratively.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131607087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Reusing ESB Services in Different ESB Architectures 如何在不同的ESB架构中重用ESB服务
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.15
I. Kumara, C. Gamage
{"title":"Towards Reusing ESB Services in Different ESB Architectures","authors":"I. Kumara, C. Gamage","doi":"10.1109/COMPSACW.2010.15","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.15","url":null,"abstract":"Enterprise Service Bus is an Enterprise Application Integration middleware. Although ESB products are heterogeneous in terms of architectures, most often, they provide the same set of ESB services such as message routing, security, etc. This emphasizes the fact that it should be possible to derive all ESB products from a single ESB service library, and we present an approach to realize it. In this paper, we present two main ingredients of our solution, namely an ESB service library and a service assembler. The ESB service library consists with ESB services, which are adaptable for most ESB architectures and designed to provide quality requirements such as performance, reusability, extensibility, etc. The service assembler enables a software architect to use most ESB architectures “as is” or further enhance the quality they already provide. Our approach for building the service assembler leverages Aspect Oriented Programming.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133298994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Requirements Maturity Measurement Approach Based on SKLSEWiki 基于SKLSEWiki的需求成熟度度量方法
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.51
Rong Peng, Qiang Ye, Mao Ye
{"title":"A Requirements Maturity Measurement Approach Based on SKLSEWiki","authors":"Rong Peng, Qiang Ye, Mao Ye","doi":"10.1109/COMPSACW.2010.51","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.51","url":null,"abstract":"With the development of IT, the scale and complexity of information system has been dramatically increased. Followed is that the related stakeholders’ size increases sharply. How to promote the requirements negotiation of large scale stakeholders becomes a focus of attention. Wiki, as a lightweight documentation and distributed collaboration platform, has demonstrated its capability in distributed requirements elicitation and documentation. Most efforts are paid to construct friendly user interface and collaborative editing capabilities. In this paper, a new concept, requirement maturity, is proposed to represent the stable degree of requirement reached through the negotiation process. A Requirement Maturity Measurement Approach based on Wiki uses the requirement maturity as a threshold to select requirements. Thus, the requirements, which reach a stable status through full negotiation, can be found out. A platform SKLSEWiki is developed to validate the approach.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124670665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信