2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops最新文献

筛选
英文 中文
A Survey of Security Concepts for Common Operating Environments 通用操作环境的安全概念综述
J. Loyall, K. Rohloff, P. Pal, M. Atighetchi
{"title":"A Survey of Security Concepts for Common Operating Environments","authors":"J. Loyall, K. Rohloff, P. Pal, M. Atighetchi","doi":"10.1109/ISORCW.2011.31","DOIUrl":"https://doi.org/10.1109/ISORCW.2011.31","url":null,"abstract":"As newer software engineering technologies, such as Service-Oriented Architecture (SOA), become the basis for mission-critical systems, they must include security as a foundational capability. This paper highlights security concepts relevant to using SOA as a foundation for a Common Operating Environment (COE), i.e., a set of infrastructure and common services for developing and executing applications across multiple platforms. We present and motivate security needs, tradeoffs, and solutions in the various layers of a SOA-based COE, including 1) the network, 2) computational platforms, and 3) the common software infrastructure consisting of a SOA stack, common services, and applications. We also discuss cross cutting aspects of security such as survivability, transparency, flexibility, specificity, reuse, and assurance. We then explore security standards and requirements for mission-critical systems developed on top of a SOA-based COE and security technologies that are candidates for satisfying the requirements. The paper closes with a set of recommendations and steps forward for both research into and implementation of security in a SOA-based COE.","PeriodicalId":126022,"journal":{"name":"2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122041899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Task-Level Probabilistic Scheduling Guarantees for Dependable Real-Time Systems - A Designer Centric Approach 可靠实时系统的任务级概率调度保证——以设计者为中心的方法
Hüseyin Aysan, R. Dobrin, S. Punnekkat
{"title":"Task-Level Probabilistic Scheduling Guarantees for Dependable Real-Time Systems - A Designer Centric Approach","authors":"Hüseyin Aysan, R. Dobrin, S. Punnekkat","doi":"10.1109/ISORCW.2011.34","DOIUrl":"https://doi.org/10.1109/ISORCW.2011.34","url":null,"abstract":"Dependable real-time systems typically consist of tasks of mixed-criticality levels with associated fault tolerance (FT) requirements and scheduling them in a fault-tolerant manner to efficiently satisfy these requirements is a challenging problem. From the designers' perspective, the most natural way to specify the task criticalities is by expressing the reliability requirements at task level, without having to deal with low level decisions, such as deciding on which FT method to use, where in the system to implement the FT and the amount of resources to be dedicated to the FT mechanism. Hence, it is extremely important to devise methods for translating the high-level requirement specifications for each task into the low-level scheduling decisions needed for the FT mechanism to function efficiently and correctly. In this paper, we focus achieving FT by redundancy in the temporal domain, as it is the commonly preferred method in embedded applications to recover from transient and intermittent errors, mainly due to its relatively low cost and ease of implementation. We propose a method which allows the system designer to specify task-level reliability requirements and provides a priori probabilistic scheduling guarantees for real-time tasks with mixed-criticality levels in the context of preemptive fixed-priority scheduling. We illustrate the method on a running example.","PeriodicalId":126022,"journal":{"name":"2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114399861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimization of Time-Partitions for Mixed-Criticality Real-Time Distributed Embedded Systems 混合临界实时分布式嵌入式系统的时间分区优化
D. Tamas-Selicean, P. Pop
{"title":"Optimization of Time-Partitions for Mixed-Criticality Real-Time Distributed Embedded Systems","authors":"D. Tamas-Selicean, P. Pop","doi":"10.1109/ISORCW.2011.11","DOIUrl":"https://doi.org/10.1109/ISORCW.2011.11","url":null,"abstract":"In this paper we are interested in mixed-criticality embedded real-time applications mapped on distributed heterogeneous architectures. The architecture provides both spatial and temporal partitioning, thus enforcing enough separation for the critical applications. With temporal partitioning, each application is allowed to run only within predefined time slots, allocated on each processor. The sequence of time slots for all the applications on a processor are grouped within a Major Frame, which is repeated periodically. We assume that the safety-critical applications (on all criticality levels) are scheduled using static-cyclic scheduling and the non-critical applications are scheduled using fixed-priority preemptive scheduling. We consider that each application runs in a separate partition, and each partition is allocated several time slots on the processors where the application is mapped. We are interested to determine the sequence and size of the time slots within the Major Frame on each processor such that both the safety-critical and non-critical applications are schedulable. We have proposed a Simulated Annealing-based approach to solve this optimization problem. The proposed algorithm has been evaluated using several synthetic and real-life benchmarks.","PeriodicalId":126022,"journal":{"name":"2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121981557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A Service Discovery Approach for Testing Dynamic SOAs 用于测试动态soa的服务发现方法
A. Ceccarelli, M. Vieira, A. Bondavalli
{"title":"A Service Discovery Approach for Testing Dynamic SOAs","authors":"A. Ceccarelli, M. Vieira, A. Bondavalli","doi":"10.1109/ISORCW.2011.23","DOIUrl":"https://doi.org/10.1109/ISORCW.2011.23","url":null,"abstract":"Service Oriented Architectures (SOAs) are composed of distributed services that interact through standard interfaces, and evolve transparently to other services and users. Although such dynamicity makes SOA a promising architectural style, it prevents organizations from having complete knowledge of the SOA and of its (possibly untrusted) services. This constitutes an important restriction to the applicability of the SOA architectural style to real-time and (business-)critical services, consequently requiring new solutions to automatically discover the services that compose the SOA and to assess their behavior during execution. In this paper we present an approach for services discovery in dynamic SOAs. The discovery algorithm we propose merges information provided by different services providers and is implemented in a testing service that becomes an intrinsic part of the SOA. The practical case study presented shows the effectiveness of the solution.","PeriodicalId":126022,"journal":{"name":"2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126325026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Abstract Infrastructure for Real Systems: Reflection and Autonomy in Real Time 真实系统的抽象基础结构:实时的反射和自治
C. Landauer
{"title":"Abstract Infrastructure for Real Systems: Reflection and Autonomy in Real Time","authors":"C. Landauer","doi":"10.1109/ISORCW.2011.44","DOIUrl":"https://doi.org/10.1109/ISORCW.2011.44","url":null,"abstract":"CARS (Computational Architecture for Reflective Systems) is a low-cost test bed for studying self-organization and real-time distributed behavior, using cars with on-board computers as autonomous agents, in an uncontrolled and largely unpredictable environment. This paper describes the software infrastructure for CARS, based on our Wrapping approach to knowledge-based integration. It allows us to share code between simulations for algorithm development and instrumented experiments with the real cars in a real environment. It also allows us to use many computational resources during algorithm development, and then to ``compile-out'' all resources that will not be needed, and all decision processes that have only one choice, in a given real environment. The instrumented experiment is run in parallel with the simulation, and the differences can be used to adjust the models. We describe the autonomic agent infrastructure, i.e., the ``enabling software'' processes: health and status, local activity maintenance, and fault management. These processes can be very resource-hungry in any agent, and our use of simulations allows us to study trade-offs directly between safety and capability in the agents, to tune the trade-off at deployment time, based on what we know or expect of the environment, and to monitor and change those assumptions when necessary.","PeriodicalId":126022,"journal":{"name":"2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133797967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analyzing Embedded Systems Code for Mixed-Critical Systems Using Hybrid Memory Representations 用混合存储器表示分析混合关键系统的嵌入式系统代码
Eva Beckschulze, Jörg Brauer, André Stollenwerk, S. Kowalewski
{"title":"Analyzing Embedded Systems Code for Mixed-Critical Systems Using Hybrid Memory Representations","authors":"Eva Beckschulze, Jörg Brauer, André Stollenwerk, S. Kowalewski","doi":"10.1109/ISORCW.2011.40","DOIUrl":"https://doi.org/10.1109/ISORCW.2011.40","url":null,"abstract":"This paper presents a low-level memory and hardware model suitable for analyzing embedded systems software written in high-level languages such as C. The key feature of this approach is that it combines information that can be discovered from the C code itself with information from the executable binary program. Further, it also integrates effects caused through hardware dependencies. We describe the benefits of this model by showing its applicability to thev erification of properties related to software partitioning, which is crucial for systems of mixed criticality. Furthermore, wede monstrate that our model can easily be integrated into abstract interpretation frameworks for high-level languages so as to increase analysis precision.","PeriodicalId":126022,"journal":{"name":"2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125082982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Invariant Preserving Transformation for PLC Models PLC 模型的不变量保留变换
J. Blech, A. Hattendorf, Jia Huang
{"title":"An Invariant Preserving Transformation for PLC Models","authors":"J. Blech, A. Hattendorf, Jia Huang","doi":"10.1109/ISORCW.2011.46","DOIUrl":"https://doi.org/10.1109/ISORCW.2011.46","url":null,"abstract":"Many applications in the industrial control domain are safety-critical. A large number of analysis techniques to guarantee safety may be applied at different levels in the development process of a Programmable Logic Controller. The development process is typically associated with a tool chain comprising model transformations. The preservation of safety properties in model transformations is necessary to achieve a safe system. Preservation can be guaranteed by showing that invariants are preserved by transformations. Adequate transformation rules and invariant specification mechanisms are needed for this. We report on a transformation from Sequential Function Charts and Function Block Diagrams of the IEC 61131 -- 3 standard to BIP. Our presentation features a description of formal syntax and semantics of the involved languages. We present transformation rules for generating BIP code out of IEC 61131 -- 3 specifications. Based on this, we establish a notion of invariant preservation between the two languages.","PeriodicalId":126022,"journal":{"name":"2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125793943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信