G. Avrunin, L. Clarke, L. Osterweil, J. Goldman, T. Rausch
{"title":"Smart checklists for human-intensive medical systems","authors":"G. Avrunin, L. Clarke, L. Osterweil, J. Goldman, T. Rausch","doi":"10.1109/DSNW.2012.6264661","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264661","url":null,"abstract":"Human-intensive cyber-physical systems involve software applications and hardware devices, but also depend upon the expertise of human participants to achieve their goal. In this paper. we describe a project we have started to improve the effectiveness of such systems by providing Smart Checklists to support and guide human participants in carrying out their tasks, including their interactions with the devices and software applications.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117250635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Invited talk: Virtual coaches in health care","authors":"D. Siewiorek","doi":"10.1109/DSNW.2012.6264659","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264659","url":null,"abstract":"Summary form only given. With health care costs raising astronomically and the number of aging increasing, there are not enough economic or human resources in the way of care givers to meet society's needs. A confluence of technologies including miniature electronics, digital communications, human-computer interaction, robotics, and machine learning makes possible the creation of intelligent assistants that monitor and communicate with users, understand their needs and goals, and compensate for diminished capabilities as we age or suffer a disability. This talk will highlight some of the results from the Quality of Life Technology Center (a NSF Engineering Research Center) in creating virtual coaches that monitor user activities providing reminders and advice to reach personal and caregiver goals.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129519404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dependability as a cloud service - a modular approach","authors":"Jan S. Rellermeyer, S. Bagchi","doi":"10.1109/DSNW.2012.6264688","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264688","url":null,"abstract":"Failures of services on cloud platforms are only to be expected. To deal with such failures, one is naturally inclined to use the traditional measure of replication. However, replication of services on distributed cloud platforms poses several challenges that are not well met by today's Java middleware systems. These challenges are the need to isolate state in the application components so that easy migration and recovery are possible and the requirement for client transparency when dealing with different replicated service instances. For example, Java Enterprise Edition (JEE) makes it difficult to have transparent replication of services due to the above two reasons plus the fine-grained nature of interactions between its components (the Enterprise Java Beans). In this paper, we show parts of the design of OSGi, a specification defining a dynamic component system in Java, that make it suitable for the above task. We then propose two extensions to OSGi which will allow exposing and exporting application component state and transparent invocation of service instances. These two together can enable easy replication and recovery from failures in cloud environments. We show through experiments that our prototype can migrate a failed service quickly enough to a new machine so that a client experiences only a moderate increase in service invocation time during system recovery.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121181314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards incorporating human intelligence into online security solutions","authors":"S. Zonouz, R. Berthier, Negin Arhami","doi":"10.1109/DSNW.2012.6264684","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264684","url":null,"abstract":"The design of automated online security and intrusion tolerance solutions for computer systems and networks is a theoretically achievable objective. However, after two decades of research, this objective has still not yet successfully passed the practicality test to become widely adopted. We believe that the main reason behind this gap lies in the misleading definition of autonomous security that precludes human intervention in trying to achieve unrealistic level of full automation. In this position paper, we discuss a novel research direction to address this challenge through a coherent integration of human intelligence. In particular, we identify the key questions to be answered in order to enable human intelligence to be leveraged in a seamless manner and without requiring explicit heavy human involvements. We illustrate our discussion through the preliminary design of a semi-automated intrusion detection and response system that incorporates reasonable human input to achieve higher levels of intrusion tolerance efficiency.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125984723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Invited talk: A model and simulation for user-centric automation devices and systems","authors":"J. W. Liu","doi":"10.1109/DSNW.2012.6264660","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264660","url":null,"abstract":"Summary form only given. This talk will present an environment and an executable model that support simulation of user-centric automation devices and systems (UCADS), human users and user-device interactions. The underlying UCADS combines workflow and GOMS model elements. The combination makes it possible to leverage GOMS interface evaluation techniques in experimentation with deviceuser interactions and assessment of actions and behavior of different human user(s) under different operating conditions, while applying workflow technologies to specify device operations and user-device interactions formally in a coherent, easy-to-understand way. The model and UCADS simulation environment enable experimentation with and the evaluation of device prototypes and their interactions with diverse, multiple users, for the purpose of identifying design and implementation flaws in a new device (or system) and assessing the degree to which the device is usable and safe.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123446465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kevin Mueller, M. Paulitsch, S. Tverdyshev, Holger Blasum
{"title":"MILS-related information flow control in the avionic domain: A view on security-enhancing software architectures","authors":"Kevin Mueller, M. Paulitsch, S. Tverdyshev, Holger Blasum","doi":"10.1109/DSNW.2012.6264665","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264665","url":null,"abstract":"Electronic architectures in the aerospace domain get more and more integrated and interconnected due to functional and architectural reasons. Such a tight integration raises the need to control information flows between different security domains on-board and off-board aircraft. This paper presents and discusses the specification and implementation of a software architecture of a security gateway integrated into avionics architectures. The paper shows that such a software architecture can be based on the current architectural principles and implementations in the avionics domain. We show that the embedded operating system PikeOS is a possible foundation for such a gateway architecture.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126890143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On limitations of using cloud storage for data replication","authors":"C. Cachin, Birgit Junker, A. Sorniotti","doi":"10.1109/DSNW.2012.6264683","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264683","url":null,"abstract":"Cloud storage services often provide a key-value store (KVS) functionality, an object-based interface for accessing a collection of unstructured data items or blobs. Every blob is associated with a key that serves as identifier to access the blob. In the simplest form, a key-value store provides only methods for writing and reading an entire blob, for removing blobs, and for listing all defined keys. On the other hand, many existing schemes for replicating data with the goal of enhancing resilience (e.g., based on quorum systems) associate logical timestamps with the stored values, in order to distinguish multiple versions of the same data item. This paper uses the consensus number of a shared storage abstraction as a measure for its power to facilitate the implementation of data replication. It is demonstrated that a KVS is a very simple primitive, not different from read/write registers in this sense, and that a replica capable of the typical operations on timestamped data is fundamentally more powerful than a KVS. Hence, data replication schemes over storage providers with a KVS interface are inherently more difficult to realize than replication schemes over providers with richer interfaces.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126918112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Casimiro, P. Veríssimo, D. Kreutz, Filipe Araújo, R. Barbosa, Samuel Neves, B. Sousa, M. Curado, Carlos Silva, R. Gandhi, P. Narasimhan
{"title":"TRONE: Trustworthy and Resilient Operations in a Network Environment","authors":"A. Casimiro, P. Veríssimo, D. Kreutz, Filipe Araújo, R. Barbosa, Samuel Neves, B. Sousa, M. Curado, Carlos Silva, R. Gandhi, P. Narasimhan","doi":"10.1109/DSNW.2012.6264694","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264694","url":null,"abstract":"Cloud infrastructures play an increasingly important role for telecom operators, because they enable internal consolidation of resources with the corresponding savings in hardware and management costs. However, this same consolidation exposes core services of the infrastructure to very disruptive attacks. This is indeed the case with monitoring, which needs to be dependable and secure to ensure proper operation of large datacenters and cloud infrastructures. We argue that currently existing centralized monitoring approaches (e.g., relying on a single solution provider, using single point of failure components) represent a huge risk, because a single vulnerability may compromise the entire monitoring infrastructure. In this paper, we describe the TRONE approach to trustworthy monitoring, which relies on multiple components to achieve increased levels of reliance on the monitoring data and hence increased trustworthiness. In particular, we focus on the TRONE framework for event dissemination, on security-oriented diagnosis based on collected events and on fast network adaptation in critical situations based on multi-homing application support. To validate our work, we will deploy and demonstrate our solutions in a live environment provided by Portugal Telecom.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132191237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of fault-tolerance characteristics of data center networks","authors":"Yang Liu, Dong Lin, J. Muppala, M. Hamdi","doi":"10.1109/DSNW.2012.6264696","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264696","url":null,"abstract":"We present an evaluation of the fault-tolerance characteristics of several important data center network topologies, including Fat-tree, DCell, HyperBCube and BCube using several metrics, including average path length, aggregated bottleneck throughput and connection failure ratio. These enable us to present an objective comparison of the network topologies under faulty conditions.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114663901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scalable double in-memory checkpoint and restart scheme towards exascale","authors":"G. Zheng, Xiang Ni, L. Kalé","doi":"10.1109/DSNW.2012.6264677","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264677","url":null,"abstract":"As the size of supercomputers increases, the probability of system failure grows substantially, posing an increasingly significant challenge for scalability. It is important to provide resilience for long running applications. Checkpoint-based fault tolerance methods are effective approaches at dealing with faults. With these methods, the state of the entire parallel application is checkpointed to reliable storage. When a failure occurs, the application is restarted from a recent checkpoint. In previous work, we have demonstrated an efficient double in-memory checkpoint and restart fault tolerance scheme, which leverages Charm++'s parallel objects for checkpointing. In this paper, we further optimize the scheme by eliminating several bottlenecks caused by serialized communication. We extend the in-memory checkpointing scheme to work on MPI communication layer, and demonstrate the performance on very large scale supercomputers. For example, when running a one million atom molecular dynamics simulation on up to 64K cores of a BlueGene/P machine, the checkpoint time was in milliseconds. The restart time was measured to be less than 0.15 seconds on 64K cores.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124827910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}