{"title":"Adapting encrypted data streams in open architectures","authors":"P. Reiher, Kevin Eustice, Kai-Min Sung","doi":"10.1109/AMS.2001.993719","DOIUrl":"https://doi.org/10.1109/AMS.2001.993719","url":null,"abstract":"Open architectures meet the demands of increasingly complex and diverse networks by adding programmability to some or all components of the network infrastructure. The effectiveness of this programmability, however, is severely reduced in the domain of encrypted data streams. Because encrypted streams are opaque, existing solutions to adapting encrypted data are limited to either performing link-level encryption across each node, or restricting adaptations to those that do not require knowledge of the content. These restrictions either reduce the functionality of the system or compromise the security of the data stream. This research examines an alternative method of adapting encrypted streams through intelligent tagging and layering of the data content. Sending separately encrypted layers of the data allows for adaptation of the data stream without actually decrypting the data along any point of the connection.","PeriodicalId":134986,"journal":{"name":"Proceedings Third Annual International Workshop on Active Middleware Services","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132123282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Fukuda, Y. Tanaka, L. M. Campos, Shin-ya Kobayashi
{"title":"Inter-cluster job coordination using mobile agents","authors":"M. Fukuda, Y. Tanaka, L. M. Campos, Shin-ya Kobayashi","doi":"10.1109/AMS.2001.993727","DOIUrl":"https://doi.org/10.1109/AMS.2001.993727","url":null,"abstract":"Cluster computing is becoming increasingly popular among users of parallel and distributed applications. However since few clusters are solely dedicated to run individual user jobs, it is necessary to coordinate those jobs among independently administered clusters effectively and with less user interaction. For this purpose, we have developed an infrastructure for inter-cluster job coordination using Voyager mobile agents. Once a user submits a job request, which is converted into XML, a mobile agent searches for the most available cluster establishes a job execution environment, executes the job, and reports its results back to the client. Using Voyager's dynamic aggregation feature, we also plan to make such job coordination agents to evolve themselves as to be suitable to be deployed in dynamic cluster environments. This paper presents the design principles and the latest implementation status of our infrastructure as well as advanced services using evolvable agents.","PeriodicalId":134986,"journal":{"name":"Proceedings Third Annual International Workshop on Active Middleware Services","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129993397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security as a dimension of quality of service in active service environments","authors":"Tim Levin, Evie Spyropoulou","doi":"10.1109/AMS.2001.993724","DOIUrl":"https://doi.org/10.1109/AMS.2001.993724","url":null,"abstract":"Presents our approach to handling security as a QoS dimension and discusses how variability in network security services and their associated costs can be managed in a middleware environment. We present our \"quality of security service\" (QoSS) concepts in terms of various security mechanisms and dynamic security policies. We also briefly describe our QoSS costing framework and demonstration, which illustrate how costs associated with network security services can be calculated and supplied to a middleware resource management system (RMS). Finally, we discuss our experiments on linking QoSS conditions to an underlying security mechanism, such as IPsec. Our aim is to demonstrate an approach through which security can be treated as a QoS dimension. We have illustrated that a security mechanism like IPsec can be modulated to provide levels of security that are in harmony with QoSS requests.","PeriodicalId":134986,"journal":{"name":"Proceedings Third Annual International Workshop on Active Middleware Services","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131250147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Galtier, K. Mills, Y. Carlinet, S. Bush, A. Kulkarni
{"title":"Predicting and controlling resource usage in a heterogeneous active network","authors":"V. Galtier, K. Mills, Y. Carlinet, S. Bush, A. Kulkarni","doi":"10.1109/AMS.2001.993718","DOIUrl":"https://doi.org/10.1109/AMS.2001.993718","url":null,"abstract":"Active network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, inhomogeneous processing can be applied to network traffic. To use such technology safely and efficiently, individual nodes must provide mechanisms to enforce resource limits. This implies that each node must understand the varying resource requirements for specific network traffic. This paper presents an approach to model the CPU time requirements of active applications in a form that can be interpreted among heterogeneous nodes. Further, the paper demonstrates how this approach can be used successfully to control resources consumed at an active-network node and to predict load among nodes in an active network, when integrated within the Active Virtual Network Management Prediction system.","PeriodicalId":134986,"journal":{"name":"Proceedings Third Annual International Workshop on Active Middleware Services","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122617170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Beynon, A. Sussman, Ümit V. Çatalyürek, T. Kurç, J. Saltz
{"title":"Performance optimization for data intensive grid applications","authors":"M. Beynon, A. Sussman, Ümit V. Çatalyürek, T. Kurç, J. Saltz","doi":"10.1109/AMS.2001.993725","DOIUrl":"https://doi.org/10.1109/AMS.2001.993725","url":null,"abstract":"The ability to effectively use computational grids for data intensive applications is becoming increasingly important. The distributed, heterogeneous, shared nature of the computing resources provides a significant challenge in developing support for computationally demanding applications. In this paper we describe several performance optimization techniques we have developed for the filter-stream programming framework that we have designed and implemented for programming data intensive applications on the Grid. We present performance results for multiple versions of a medical imaging application on various distributed machine configurations that show the benefits of the optimizations, and also provide evidence that filter-stream programming can be implemented to both efficiently utilize available Grid resources and to provide scalable application performance as additional resources are made available.","PeriodicalId":134986,"journal":{"name":"Proceedings Third Annual International Workshop on Active Middleware Services","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115737136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Zeigler, H. Sarjoughian, Sunwoo Park, J. S. Lee, Young Kwan Cho, J. Nutaro
{"title":"DEVS modeling and simulation: a new layer of middleware","authors":"B. Zeigler, H. Sarjoughian, Sunwoo Park, J. S. Lee, Young Kwan Cho, J. Nutaro","doi":"10.1109/AMS.2001.993717","DOIUrl":"https://doi.org/10.1109/AMS.2001.993717","url":null,"abstract":"This paper discusses a concept of DEVS middleware that would provide a set of services for constructing discrete event models and executing them in simulation or in real-time. Although generic middleware such as CORBA and MPI supports simulation and simulation-oriented middleware such as High Level Architecture Runtime Infrastructure exists, there are many issues that either not addressed at all or have been inadequately addressed in existing systems. DEVS Middleware would improve modeling and simulations due to the beneficial formal properties of DEVS, enhance interoperability among components adhering to the DEVS protocol, and reduce programming complexity by hiding lower level Simulation and execution details. The DEVS Middleware concept includes components for model construction and for mapping models onto simulators or real-time execution engines to support the novel concept of \"distributed programming by modeling.\" This paper discusses several sub-layers that have been identified within the overall DEVS middleware concept, existing work that can be brought to bear on developing these layers and the integration needed to create a widely accepted standard.","PeriodicalId":134986,"journal":{"name":"Proceedings Third Annual International Workshop on Active Middleware Services","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122709457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile management of network files","authors":"A. Bassi, Micah Beck, T. Moore","doi":"10.1109/AMS.2001.993726","DOIUrl":"https://doi.org/10.1109/AMS.2001.993726","url":null,"abstract":"Common opinion holds that a precise definition of the concept of middleware is elusive because it is highly dependent on one's design perspective regarding application environments and system architectures. The approach to the mobile management of network files discussed in this paper, which involves issues of process mobility and architecture/OS independent execution, represents one such a perspective. Our previous work in the area of logistical networking has focused on the Internet Backplane Protocol (IBP), a technology for shared network storage that can scale in terms of the size of the user community, the aggregate quantity of storage that can be allocated, and the breadth of distribution of service nodes across network borders. To achieve this end we have followed a layered, bottom-up design philosophy that draws on the engineering principles well known from the design of the Multics operating system, RISC microprocessors, and most especially the Internet protocol stack. In this paper we introduce the exNode, a data structure intended to provide the basis for reliable and efficient implementation of a file abstraction on top of the primitive storage service defined by IBP and discuss its application in network-based file management.","PeriodicalId":134986,"journal":{"name":"Proceedings Third Annual International Workshop on Active Middleware Services","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128458897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data integrity for mildly active content","authors":"H. Orman","doi":"10.1109/AMS.2001.993722","DOIUrl":"https://doi.org/10.1109/AMS.2001.993722","url":null,"abstract":"Web pages are becoming more complicated, both in their appearance and in the underlying business models. Just as page composition for print media mixes news, advertising and regional content, Web pages are increasingly the result of many hands. The Internet facilitates a \"delayed evaluation\" model for customization, and the composition process for pages is becoming a pipelined process, with each stage controlled by a different machine, in some cases under the auspices of different authorities, such as content-delivery network operators. There is currently no formal model for defining data integrity in such an amorphous environment. An authorization and validation model can be constructed based on well-defined message parts and a simple composition language. The W3C XML signature standard serves as a base model for the definitions proposed in this paper.","PeriodicalId":134986,"journal":{"name":"Proceedings Third Annual International Workshop on Active Middleware Services","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124597090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active resource management for the differentiated services environment","authors":"A. Ramanathan, M. Parashar","doi":"10.1109/AMS.2001.993723","DOIUrl":"https://doi.org/10.1109/AMS.2001.993723","url":null,"abstract":"This paper presents a mechanism for active resource management (ARM) in a differentiated services environment.. While the differentiated services architecture and the bandwidth broker agent provide a mechanism for QoS management through resource reservation, this mechanism is based on a static provisioning of resources. As bandwidth requirements are typically dynamic, such a static reservation approach can either lead to wasted bandwidth or leave applications resource-starved. The active resource management approach presented in this paper addresses this problem by dynamically, reallocating resources based on current network state and applications requirements. An implementation and evaluation of ARM using the NS-2 simulation toolkit is also presented.","PeriodicalId":134986,"journal":{"name":"Proceedings Third Annual International Workshop on Active Middleware Services","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115638773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Micah Beck, D. Arnold, A. Bassi, F. Berman, H. Casanova, J. Dongarra, T. Moore, Graziano Obertelli, J. Plank, M. Swany, Sathish S. Vadhiyar, R. Wolski
{"title":"Logistical computing and internetworking: middleware for the use of storage in communication","authors":"Micah Beck, D. Arnold, A. Bassi, F. Berman, H. Casanova, J. Dongarra, T. Moore, Graziano Obertelli, J. Plank, M. Swany, Sathish S. Vadhiyar, R. Wolski","doi":"10.1109/AMS.2001.993716","DOIUrl":"https://doi.org/10.1109/AMS.2001.993716","url":null,"abstract":"The Logistical Computing and Internetworking (LoCI) project is a reflection of the way that the next generation internetworking fundamentally changes our definition of high performance wide area computing. A key to achieving this aim is the development of middleware that can provide reliable, flexible, scalable, and cost-effective delivery of data with quality of service (QoS) guarantees to support high performance applications of all types. The LoCI effort attacks this problem with a simple but innovative strategy. At the base of the LoCI project is a richer view of the use of storage in communication and information sharing.","PeriodicalId":134986,"journal":{"name":"Proceedings Third Annual International Workshop on Active Middleware Services","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130239249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}