{"title":"Security Fault Tolerance for Access Control","authors":"Dongsoo Jang, Michael Shin, Don Pathirage","doi":"10.1109/ACSOS-C51401.2020.00058","DOIUrl":"https://doi.org/10.1109/ACSOS-C51401.2020.00058","url":null,"abstract":"This paper describes an approach to the security fault tolerance of access control in which the security breaches of an access control are tolerated by means of a security fault tolerant (SFT) access control. Though an access control is securely designed and implemented, it can contain faults in development or be contaminated in operation. The threats to an access control are analyzed to identify possible security breaches. To tolerate the security breaches, an SFT access control is made to be semantically identical to an access control. Our approach is described using role-based access control (RBAC) and extended access control list (EACL). A healthcare system is used to demonstrate our approach.","PeriodicalId":143169,"journal":{"name":"2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114433940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACSOS-C 2020 Index","authors":"","doi":"10.1109/acsos-c51401.2020.00073","DOIUrl":"https://doi.org/10.1109/acsos-c51401.2020.00073","url":null,"abstract":"","PeriodicalId":143169,"journal":{"name":"2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128066145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACSOS-C 2020 TOC","authors":"Yoonhee Kim Sookmyung","doi":"10.1109/acsos-c51401.2020.00004","DOIUrl":"https://doi.org/10.1109/acsos-c51401.2020.00004","url":null,"abstract":"Message from the General Chairs xi Message from the Program Committee Chairs xiv Message from the Workshops and Tutorials Chairs xvi Message from the Doctoral Symposium Chairs xviii Keynotes xix Organizing Committee xxi Steering Committee xxii Advisory Board xxiii Program Committee xxiv AMGCC 2020 Organizing Committee xxvii SISSY 2020 Organizing Committee xxviii eCAS 2020 Organizing Committee xxix SeAC 2020 Organizing Committee xxx SPS 2020 Organizing Committee xxxi Tutorials xxxii","PeriodicalId":143169,"journal":{"name":"2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134448333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2020 Hindsight: Systems Need to Determine Whether or Not They Did Their Best","authors":"K. Bellman","doi":"10.1109/ACSOS-C51401.2020.00033","DOIUrl":"https://doi.org/10.1109/ACSOS-C51401.2020.00033","url":null,"abstract":"The purpose of this position paper is to present the need for hindsight in SISSY systems and to suggest some initial starting points to incorporate these challenging capabilities into our systems. After discussing the characteristics of human hindsight, as seen in After Action Reviews, reflection in education, and “lessons learned” activities in corporations, we present what we believe are three doable steps towards incorporating hindsight into SISSY systems. First we discuss the need to develop systems that can reason about “situations” and then describe how this folds into the management of uncertainty and identifying knowledge gaps. We second briefly summarize the implications of hindsight for uncertainty management, especially drawing on the strategies that intelligent animals do in regards to unknown environments and how that leads to some of the products we want to produce when adding hindsight to a SISSY system. Lastly we discuss how hindsight requires new types of social processes and what types of information will be important for systems to share.","PeriodicalId":143169,"journal":{"name":"2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122036458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nigel Greenwood, Brruntha Sundaram, Alexander Muirhead, James Copperthwaite
{"title":"Awareness without Neural Networks: Achieving Self-Aware AI via Evolutionary and Adversarial Processes","authors":"Nigel Greenwood, Brruntha Sundaram, Alexander Muirhead, James Copperthwaite","doi":"10.1109/ACSOS-C51401.2020.00047","DOIUrl":"https://doi.org/10.1109/ACSOS-C51401.2020.00047","url":null,"abstract":"A key difficulty in achieving self-aware artificial intelligence (AI) is the achievement of epistemological knowledge, i.e. a machine that “knows what it knows” and “knows what it does not know” with respect to some model of itself or its surroundings. Given a nonlinear dynamical system with known algebraic structure expressible as differential equations, with sensors able to create a time-series of measurements of sufficient variables to create a suitable partial state vector, then novel forms of evolutionary machine learning and adversarial processes are sufficient to create a form of AI that is “aware” of its knowledge set regarding this system, and can use a form of differential Game Theory and adversarial processes to “think” about its knowledge set to address ambiguities and achieve objectives, including moving beyond its original training data. This may itself constitute a form of “self-awareness”. Results from successful use of these techniques in medical and engineering problems are outlined. This AI architecture does not involve neural networks or their derivative architectures, but instead is inspired by evolutionary ecosystems. Implications for self-aware operating systems are discussed.","PeriodicalId":143169,"journal":{"name":"2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127082098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive Autonomous Runtime Modeling for Interwoven Systems","authors":"Phyllis R. Nelson","doi":"10.1109/ACSOS-C51401.2020.00040","DOIUrl":"https://doi.org/10.1109/ACSOS-C51401.2020.00040","url":null,"abstract":"The explosion in connectivity of devices and systems which is being enabled by information and communications technologies has created ultra-complex constructs. Managing such systems is beyond the capabilities of traditional systems engineering approaches. This article explores results from social and cognitive psychology which describe how humans manage the informational chaos of daily life using schemas, frames, scripts, and stereotypes to aid processing. This exploration provides a framework for considering possible means, methods, and processes by which an entity could successfully engage in autonomous runtime modeling to extend its self-and worldrepresentations and thus enable participation in an autonomously created interwoven system.","PeriodicalId":143169,"journal":{"name":"2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129918884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"I’m already optimal: the Dunning-Kruger Effect, Sociogenesis, and Self-Integration","authors":"John N. A. Brown, Lukas Esterle","doi":"10.1109/ACSOS-C51401.2020.00035","DOIUrl":"https://doi.org/10.1109/ACSOS-C51401.2020.00035","url":null,"abstract":"As novel connections between heterogenous systems becomes the norm, and these self-integrated systems aspire to being robust enough to incorporate previously-isolated entities with varying degrees of natural and artificial intelligence, we would do well to re-examine our foundational assumptions about the models of the human brain upon which our AIs are based. This position paper proposes that the human brain is actually a small, network of heterogenous processors. We further propose that the manner in which mature humans integrate these processors, both individually and in cooperation with others, may provide valuable insights into possible paths forward in the development of systems of systems that can learn how to improve themselves and the ways in which they integrate with others.","PeriodicalId":143169,"journal":{"name":"2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Prediction of Sparse Matrix Multiplication on a Distributed BigData Processing Environment","authors":"Jueon Park, Kyungyong Lee","doi":"10.1109/ACSOS-C51401.2020.00025","DOIUrl":"https://doi.org/10.1109/ACSOS-C51401.2020.00025","url":null,"abstract":"Sparse matrix multiplication (SPMM) is widely used for various machine learning algorithms. With advancements in big-data processing, the importance of distributed SPMM processing becomes important for handling large-scale datasets. We conducted thorough experiments using various distributed SPMM implementations and discovered considerable performance variations for distinct datasets and scenarios. To provide an optimal SPMM execution environment, we propose features that represent SPMM task characteristics. Using these features, we propose building a tree-based nonlinear gradient boosting (GB) regressor model that presents superb prediction accuracy across diverse distributed SPMM implementations and datasets.","PeriodicalId":143169,"journal":{"name":"2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114093533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anton Gulenko, Alexander Acker, Florian Schmidt, Sören Becker, O. Kao
{"title":"Bitflow: An In Situ Stream Processing Framework","authors":"Anton Gulenko, Alexander Acker, Florian Schmidt, Sören Becker, O. Kao","doi":"10.1109/ACSOS-C51401.2020.00053","DOIUrl":"https://doi.org/10.1109/ACSOS-C51401.2020.00053","url":null,"abstract":"The timely processing of continuous data streams gains increasing importance in a variety of fields. Self-healing systems depend on efficient data analysis to detect problems and apply appropriate counter measures. This paper introduces Bitflow, a stream processing framework optimized for the data analysis tasks in self-healing IT systems. Numerous algorithmic contributions allow to mine monitoring data obtained from critical system components, in order to detect and classify anomalies, and to localize their root cause. These data analysis tasks are traditionally executed on big data processing platforms, which run on dedicated hosts and assume complete ownership over the occupied resources. Bitflow takes a different approach by analyzing the monitoring data directly at its source – i.e., in situ. We exploit the fact that IT systems are usually over-provisioned and a fraction of the computational resources can be allocated for self-healing functionality. Bitflow implements a dynamic modeling approach for dataflow graphs, which adapts to varying environments, such as changing data sources, or system components. Further, we describe Bitflow’s scheduling approach, which determines when it is beneficial to migrate a data analysis process to a remote host. Experimental data from practical data analysis tasks shows the applicability of our scheduling solution.","PeriodicalId":143169,"journal":{"name":"2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Similar Functions Through the Use of Dominator Information","authors":"André Schäfer, W. Amme, Thomas S. Heinze","doi":"10.1109/ACSOS-C51401.2020.00057","DOIUrl":"https://doi.org/10.1109/ACSOS-C51401.2020.00057","url":null,"abstract":"The detection of code clones is an important technique for finding malware and malicious code. Many existing methods work on source code to detect code clones. Recent work in this area has started to focus on the analysis of compiled code to find malicious code. We introduce a new method to detect code clones using Java bytecode and control flow information from dominator trees. A prototype implementation was developed and compared with the state-of-the-art clone detector NiCad to evaluate the basic functionality of the method. First experiments have shown that the method can reliably find Type 1 and Type 2 clones and even find additional clones.","PeriodicalId":143169,"journal":{"name":"2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128046810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}