MPM '12最新文献

筛选
英文 中文
An overseer control methodology for data adaptable embedded systems 数据适应性嵌入式系统的监督控制方法
MPM '12 Pub Date : 2012-10-01 DOI: 10.1145/2508443.2508448
Sean Whitsitt, J. Sprinkle, Roman L. Lysecky
{"title":"An overseer control methodology for data adaptable embedded systems","authors":"Sean Whitsitt, J. Sprinkle, Roman L. Lysecky","doi":"10.1145/2508443.2508448","DOIUrl":"https://doi.org/10.1145/2508443.2508448","url":null,"abstract":"The performance of software algorithms can be improved by performing those algorithms on specialized embedded hardware. However, complex algorithms that rely on input data at runtime for configuration have a combinatorial explosion of possible configurations, which has historically put hardware acceleration out of reach for applications wishing to serve large configuration spaces. Data adaptable embedded systems overcome this limitation by allowing for hardware reconfiguration during runtime, but the complexity of the specification of these systems is difficult to manage with traditional techniques. In this paper, a modeling approach is discussed in order to concurrently model two aspects of the final system: dependencies between algorithm tasks, and desired hardware configurations for each task. The contribution of the work is the model-based generation of hardware and software tasks, as well as a control scheme customized to each model that oversees the dynamic reconfiguration process.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128522916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A build server for model-driven engineering 用于模型驱动工程的构建服务器
MPM '12 Pub Date : 2012-10-01 DOI: 10.1145/2508443.2508455
Henrik Steudel, R. Hebig, H. Giese
{"title":"A build server for model-driven engineering","authors":"Henrik Steudel, R. Hebig, H. Giese","doi":"10.1145/2508443.2508455","DOIUrl":"https://doi.org/10.1145/2508443.2508455","url":null,"abstract":"Model-driven engineering (MDE) is more and more used in collaborative settings. Therefore, the usage of build servers to gain early integration of different system parts is desirable. Current build server technologies only consider fully automated operations. Further, the availability of all described artifacts is necessary for a correct run. However, in MDE manual activities can occur in between automated operations, which also prevents that all necessary artifacts are already available when the build starts. Therefore, state of the art build techniques are not sufficient to support MDE development. In this paper, we present a build server prototype which is designed to fit the needs of development with multiple paradigms and languages.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
QAML: a multi-paradigm DSML for quantitative analysis of embedded system architecture models QAML:用于嵌入式系统架构模型定量分析的多范式DSML
MPM '12 Pub Date : 2012-09-30 DOI: 10.1145/2508443.2508450
Dominique Blouin, E. Senn, K. Roussel, Olivier Zendra
{"title":"QAML: a multi-paradigm DSML for quantitative analysis of embedded system architecture models","authors":"Dominique Blouin, E. Senn, K. Roussel, Olivier Zendra","doi":"10.1145/2508443.2508450","DOIUrl":"https://doi.org/10.1145/2508443.2508450","url":null,"abstract":"In this paper, the QAML (Quantitative Analysis Modeling Language) DSML is presented. It is a formalism for representing quantitative analysis models applied to embedded system architecture models. Issued from the need to standardize the representation of heterogeneous power consumption analysis models, QAML has been generalized to support the analysis of arbitrary physical quantities. Following a Multi-Paradigm Modeling (MPM) approach and the principle of separation of concerns, QAML combines a set of DSMLs such as the SysML QUDV annex, the W3C MathML and other custom DSMLs to favor interoperability and reuse. Using an enhanced Atlas Model Weaving language, embedded systems architecture models of arbitrary languages such as AADL can be annotated with quantitative estimation models issued from measurements campaigns, numerical simulations or other means. The complete set of models in the MPM environment is interpretable to provide analysis results in system architecture models.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131237995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A model of information flow control to determine whether malfunctions cause the privacy invasion 一个信息流控制模型,用于确定故障是否导致隐私侵犯
MPM '12 Pub Date : 2012-04-10 DOI: 10.1145/2181196.2181198
David Evans, D. Eyers, J. Bacon
{"title":"A model of information flow control to determine whether malfunctions cause the privacy invasion","authors":"David Evans, D. Eyers, J. Bacon","doi":"10.1145/2181196.2181198","DOIUrl":"https://doi.org/10.1145/2181196.2181198","url":null,"abstract":"Privacy is difficult to assure in complex systems that collect, process, and store data about individuals. The problem is particularly acute when data arise from sensing physical phenomena as individuals are unlikely to realise that actions such as walking past a building generate privacy-sensitive data. Information Flow Control (IFC) is a mature technique for managing security and privacy concerns in large distributed systems. This paper describes (i) how the meta-data required by IFC, in the form of tags, can reflect the physical properties of sensors; and (ii) how the formal expression of the IFC this allows can be used to, statically, determine the proportion of the system that handles private data and how this changes in the face of software or human malfunctions.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"7 49","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131436213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
When browsing leaves footprints: automatically detect privacy violations 当浏览留下的足迹:自动检测隐私侵犯
MPM '12 Pub Date : 2012-04-10 DOI: 10.1145/2181196.2181205
H. Hofinger, Alexander Kiening, P. Schoo
{"title":"When browsing leaves footprints: automatically detect privacy violations","authors":"H. Hofinger, Alexander Kiening, P. Schoo","doi":"10.1145/2181196.2181205","DOIUrl":"https://doi.org/10.1145/2181196.2181205","url":null,"abstract":"Web sites use a number of different techniques to gather information about the behavior and interests of their visitors. In many cases this collection happens without the knowledge of the visitors and is continued across different domains in the world wide web. This allows organizations to gain a huge amount of personal information about users. We present a tool named PRIVIDOR (PRIvacy VIolation DetectOR) that allows to detect potential privacy violations on web sites and create reports containing its findings. The design goal of PRIVIDOR is to integrate as many as possible evaluations into one server based tool. The tool helps to evaluate the web sites policies concerning the handling of their visitors privacy.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123845137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing secure and accountable privacy to roaming 802.11 mobile devices 为漫游802.11移动设备提供安全和可靠的隐私
MPM '12 Pub Date : 2012-04-10 DOI: 10.1145/2181196.2181204
Panagiotis Georgopoulos, B. McCarthy, C. Edwards
{"title":"Providing secure and accountable privacy to roaming 802.11 mobile devices","authors":"Panagiotis Georgopoulos, B. McCarthy, C. Edwards","doi":"10.1145/2181196.2181204","DOIUrl":"https://doi.org/10.1145/2181196.2181204","url":null,"abstract":"Nowadays, roaming individuals require ubiquitous, effortless, secure and private \"on-the-go\" connectivity for their Mobile Device (MD). At the same time, WiFi Access Networks (ANs) need to offer connectivity to MDs in an accountable and credible manner to avoid compromising their security policies. Our approach efficiently satisfies these conflicting requirements, and presents a solution where the MD does not have to disclose its identity when requesting network access. At the same time, the AN has a uniquely identifying alias for the MD, to account and profile for the connectivity it provides to it. The evaluation of our implementation on a live experimental testbed, demonstrates that our solution's overhead is remarkably low for the benefits it provides, and highlights its applicability and efficiency for real world deployment in the current Internet infrastructure.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125862643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ANOSIP: anonymizing the SIP protocol ANOSIP:匿名化SIP协议
MPM '12 Pub Date : 2012-04-10 DOI: 10.1145/2181196.2181200
Iraklis Leontiadis, C. Delakouridis, L. Kazatzopoulos, G. Marias
{"title":"ANOSIP: anonymizing the SIP protocol","authors":"Iraklis Leontiadis, C. Delakouridis, L. Kazatzopoulos, G. Marias","doi":"10.1145/2181196.2181200","DOIUrl":"https://doi.org/10.1145/2181196.2181200","url":null,"abstract":"Enhancing anonymity in the Session Initiation Protocol (SIP) is much more than sealing participants' identities. It requires methods to unlink the communication parties and relax their proximity identification. These requirements should be fulfilled under several prerequisites, such as time limitation for session establishment, involvement of several functional entities for session management, inter-domain communications and support of streaming services when the session is established. In this paper we propose the usage of a privacy enhancement framework, called Mist, as a solution to the anonymity issue in SIP. For achieving anonymity, the original Mist architecture was modified to be adapted in the SIP framework. We evaluate the adapted Mist framework to SIP and measure how efficiently it supports anonymity features.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126264232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SecureSafe: a highly secure online data safe industrial use case SecureSafe:一个高度安全的在线数据安全工业用例
MPM '12 Pub Date : 2012-04-10 DOI: 10.1145/2181196.2181197
Marc Rennhard, M. Tschannen, T. Christen
{"title":"SecureSafe: a highly secure online data safe industrial use case","authors":"Marc Rennhard, M. Tschannen, T. Christen","doi":"10.1145/2181196.2181197","DOIUrl":"https://doi.org/10.1145/2181196.2181197","url":null,"abstract":"In this paper, we present the core security architecture of SecureSafe, a cloud service that provides a highly secure online storage for sensitive data. The architecture combines best practices in cryptography and security protocols with novel approaches to offer high security while providing good usability and performance. More than two years of successful operation with many satisfied customers and no security incidents demonstrate the soundness of the architecture. In addition to granting insight into the security architecture of a field-proven service to provide inputs for other services that have similar requirements, there's another motivation for this paper: We believe that to increase trust in cloud services, service providers should be more open about internal security details -- although this is in contrast to what typical cloud service providers do today.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131675303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The impact of trace and adversary models on location privacy provided by K-anonymity 追踪和对手模型对k -匿名提供的位置隐私的影响
MPM '12 Pub Date : 2012-04-10 DOI: 10.1145/2181196.2181202
Volkan Cambazoglu, C. Rohner, B. Victor
{"title":"The impact of trace and adversary models on location privacy provided by K-anonymity","authors":"Volkan Cambazoglu, C. Rohner, B. Victor","doi":"10.1145/2181196.2181202","DOIUrl":"https://doi.org/10.1145/2181196.2181202","url":null,"abstract":"Privacy preserving mechanisms help users of location-based services to balance their location privacy while still getting useful results from the service. The provided location privacy depends on the users' behavior and an adversary's knowledge used to locate the users. The aim of this paper is to investigate how users' mobility patterns and adversaries' knowledge affect the location privacy of users querying a location-based service. We consider three mobility trace models in order to generate user traces that cross each other, are parallel to each other and form a circular shape. Furthermore, we consider four adversary models, which are distinguished according to their level of knowledge of users. We simulate the trace and the adversary models by using Distortion-based Metric and K-anonymity. The results show that the location privacy provided by K-anonymity decreases, as users are located closer to each other in the trace models. The impact of the adversary on location privacy is reduced as more users are cloaked together.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Next place prediction using mobility Markov chains 利用移动马尔可夫链预测下一个位置
MPM '12 Pub Date : 2012-04-10 DOI: 10.1145/2181196.2181199
S. Gambs, M. Killijian, Miguel Núñez del Prado Cortez
{"title":"Next place prediction using mobility Markov chains","authors":"S. Gambs, M. Killijian, Miguel Núñez del Prado Cortez","doi":"10.1145/2181196.2181199","DOIUrl":"https://doi.org/10.1145/2181196.2181199","url":null,"abstract":"In this paper, we address the issue of predicting the next location of an individual based on the observations of his mobility behavior over some period of time and the recent locations that he has visited. This work has several potential applications such as the evaluation of geo-privacy mechanisms, the development of location-based services anticipating the next movement of a user and the design of location-aware proactive resource migration. In a nutshell, we extend a mobility model called Mobility Markov Chain (MMC) in order to incorporate the n previous visited locations and we develop a novel algorithm for next location prediction based on this mobility model that we coined as n-MMC. The evaluation of the efficiency of our algorithm on three different datasets demonstrates an accuracy for the prediction of the next location in the range of 70% to 95% as soon as n = 2.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 499
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信