13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)最新文献

筛选
英文 中文
Resilient Intrusion Tolerance through Proactive and Reactive Recovery 通过主动和被动恢复实现弹性入侵容忍
Paulo Sousa, A. Bessani, M. Correia, N. Neves, P. Veríssimo
{"title":"Resilient Intrusion Tolerance through Proactive and Reactive Recovery","authors":"Paulo Sousa, A. Bessani, M. Correia, N. Neves, P. Veríssimo","doi":"10.1109/PRDC.2007.52","DOIUrl":"https://doi.org/10.1109/PRDC.2007.52","url":null,"abstract":"Previous works have studied how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as recoveries are faster than an upper-bound on fault production assumed at system deployment time. In this paper, we propose a complementary approach that combines proactive recovery with services that allow correct replicas to react and recover replicas that they detect or suspect to be compromised. One key feature of our proactive-reactive recovery approach is that, despite recoveries, it guarantees the availability of the minimum amount of system replicas necessary to sustain system's correct operation. We design a proactive-reactive recovery service based on a hybrid distributed system model and show, as a case study, how this service can effectively be used to augment the resilience of an intrusion-tolerant firewall adequate for the protection of critical infrastructures.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124259494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Applying a Threshold Scheme to the Pseudonymization of Health Data 阈值方案在健康数据假名化中的应用
Bernhard Riedl, V. Grascher, T. Neubauer
{"title":"Applying a Threshold Scheme to the Pseudonymization of Health Data","authors":"Bernhard Riedl, V. Grascher, T. Neubauer","doi":"10.1109/PRDC.2007.24","DOIUrl":"https://doi.org/10.1109/PRDC.2007.24","url":null,"abstract":"Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade because EHRs promise massive savings by digitizing and centrally providing medical data. As highly sensitive patient information is exchanged and stored within such a system, legitimate concerns about the privacy of the stored data occur, as the lifelong storage of medical data is a promising target for attackers. These concerns and the lack of existing approaches that provide a sufficient level of security raise the need for a system that guarantees data privacy and keeps the access to health data under strict control of the patient. This paper introduces PIPE (Pseudonymization of Information for Privacy in e-Health), a new EHR architecture for primary and secondary usage of health data. PIPE's security model is based on pseudonymization instead of encryption.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121631942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Self-Adjusting Indexing Techniques for Communication-Induced Checkpointing Protocols 通信诱导检查点协议的自调整索引技术
Jichiang Tsai, Chia-Yang Chen, Ming-Fa Hu, Jenn-Wei Lin
{"title":"Self-Adjusting Indexing Techniques for Communication-Induced Checkpointing Protocols","authors":"Jichiang Tsai, Chia-Yang Chen, Ming-Fa Hu, Jenn-Wei Lin","doi":"10.1109/PRDC.2007.8","DOIUrl":"https://doi.org/10.1109/PRDC.2007.8","url":null,"abstract":"Communication-induced checkpointing (CIC) protocols can be used to prevent the domino effect. Among such protocols, those belonging to the index-based category associate checkpoints with sequence numbers in a way that checkpoints with an equal sequence number are ensured to be consistent. Specifically, index-based protocols must cooperate with their underlying indexing methods to achieve their goal. The adopted indexing scheme makes a great impact on the number of forced checkpoint the protocol will take. Moreover, an indexing method exhibit different performance for different degrees of heterogeneity imposed on a distributed system. All existing index-based protocols only employ a fixed indexing scheme, however, and thus cannot suit themselves well for all kinds of computing environments. In this paper, we propose two new indexing techniques that can adjust themselves according to the extent of present system heterogeneity. Those new methods are also justified by a simulation study in the text.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Accurate Model of Software Reliability 软件可靠性的精确模型
Shiyi Xu
{"title":"An Accurate Model of Software Reliability","authors":"Shiyi Xu","doi":"10.1109/PRDC.2007.12","DOIUrl":"https://doi.org/10.1109/PRDC.2007.12","url":null,"abstract":"Software reliability is one of the important attributions of dependable systems. However, for the time being, the assumptions that software reliability measurement makes do not deal with some important factors that influence the accuracy of the software reliability models such as the complexity of the software and the effectiveness of test suite, resulting in inaccuracy or even incorrectness in evaluating the software reliability. Therefore, in this paper, we propose some practical strategies in order to improve the accuracy of software reliability measurement. The idea of the strategies presented in this paper is to incorporate the important factors related to the precision of software reliability measurement into reliability models, which mainly include complexity of software and the test effectiveness, making the software reliability models more adequate and accurate to the real measurement. Experimental results based on five programs selected have shown the feasibility and usefulness of the new approach.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An On-Line Control Flow Checking Method for VLIW Processor VLIW处理器控制流在线检测方法
Shuming Chen, Xiao Hu, Biwei Liu, Jihua Chen
{"title":"An On-Line Control Flow Checking Method for VLIW Processor","authors":"Shuming Chen, Xiao Hu, Biwei Liu, Jihua Chen","doi":"10.1109/PRDC.2007.26","DOIUrl":"https://doi.org/10.1109/PRDC.2007.26","url":null,"abstract":"On-line control flow checking is able to detect wrong program execution paths caused by transient or intermittent hardware faults. Focusing on fault detection for YHFT-DSP, an embedded processor with very long instruction words (VLIW) structure, a hybrid control flow checking method (VLIW-CFC, V-CFC) based on signature monitoring is proposed. Signature instructions are designed for transmitting the redundancy information stored in signature and they are executed in unoccupied instruction slots to minimize the overhead of processor performance. Instruction signature is obtained by compressing instruction codes in a basic block, and it guarantees the execution integrality and correctness of this block. Branch signature is obtained from the program control flow graph (CFG) and dynamic offset signature instructions (DOSI), and it guarantees the correct execution sequences of multiple blocks. V-CFC with the two signatures is able to check control flow errors including execution sequences and bit flips of instruction codes. V-CFC reaches the high error-detection coverage, low performance loss and hardware costs, and it is well suited for embedded systems.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130106097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems 在多任务嵌入式系统中使用共享补充内存和机会性微恢复来提高可靠性
V. Sundaram, Sandip HomChaudhuri, S. Garg, C. Kintala, S. Bagchi
{"title":"Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems","authors":"V. Sundaram, Sandip HomChaudhuri, S. Garg, C. Kintala, S. Bagchi","doi":"10.1109/PRDC.2007.54","DOIUrl":"https://doi.org/10.1109/PRDC.2007.54","url":null,"abstract":"We propose a comprehensive solution to handle memory-overflow problems in multitasking embedded systems thereby improving their reliability and availability. In particular, we propose two complementary techniques to address two significant causes of memory-overflow problems. The first cause is errors in estimating appropriate stack and heap memory requirement. Our first technique, called shared supplementary memory (SSM), exploits the fact that the probability of multiple tasks requiring more than their estimated amount of memory concurrently is low. Using analytical model and simulations, we show that reliability can be considerably improved when SSM is employed. Furthermore, for the same reliability, SSM reduces total memory requirement by as much as 29.31% The second cause is the presence of coding Mandelbugs, which can cause abnormal memory requirement. To address this, we propose a novel technique, called opportunistic micro-rejuvenation, which when combined with SSM, provide several advantages: preventing critical-time outage, resource frugality and dependability enhancement.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121676547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Heterogeneous Functional Units for High Speed Fault-Tolerant Execution Stage 高速容错执行阶段的异构功能单元
Yousuke Nakamura, K. Hiraki
{"title":"Heterogeneous Functional Units for High Speed Fault-Tolerant Execution Stage","authors":"Yousuke Nakamura, K. Hiraki","doi":"10.1109/PRDC.2007.45","DOIUrl":"https://doi.org/10.1109/PRDC.2007.45","url":null,"abstract":"In modern processors it is difficult to implement a high speed and area effective fault-tolerant execution stage that can tolerate defects and hard faults. The structure of Functional Units (FU) is complicated, unlike registers or cache memory. Conventional approaches are able to tolerate faults but overhead is large. We propose Heterogeneous Functional Units (HFUs), with high speed and area effective fault-tolerant execution stages by using a combination of fast FUs and fault-tolerant FUs. Simulation results from SPEC2000 benchmarks show that HFUs have 99%(HFU-Det), 94.2%(HFU-1) of relative IPC for a simple duplication of fast FUs. HFU is faster than the simple duplication of fault-tolerant FUs, that have 84.0%.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122936558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Hybrid Redundancy Approach for Data Availability in Structured P2P Network Systems 结构化P2P网络系统中数据可用性的混合冗余方法
Guangping Xu, G. Wang, Jing Liu
{"title":"A Hybrid Redundancy Approach for Data Availability in Structured P2P Network Systems","authors":"Guangping Xu, G. Wang, Jing Liu","doi":"10.1109/PRDC.2007.7","DOIUrl":"https://doi.org/10.1109/PRDC.2007.7","url":null,"abstract":"For practical deployment of peer-to-peer (P2P) systems, it is one of the most important and challengeable aspects to achieve high data availability in structured P2P systems since the environment is much scalable and dynamic. The paper utilizes the hybrid of two data redundancy schemes, namely replication and erasure coding, to improve system availability. To mask or hide the high churn from the short-lived but churn-frequent peers and permanent failure peers, we use replication among the nodes in a certain interval of the identifier space that can be considered as a virtual node. Then with an erasure-coded redundancy scheme, we consider that a set of virtual nodes that cooperatively provide guaranteed over the networks. The paper presents the hybrid redundancy prototype and protocol. The evaluation shows that the approach is effective with an empirical trace by setting different system parameters.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128561514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Failure Detectors and Extended Paxos for k-Set Agreement k-Set协议的故障检测器和扩展Paxos
Wei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu
{"title":"Failure Detectors and Extended Paxos for k-Set Agreement","authors":"Wei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu","doi":"10.1109/PRDC.2007.20","DOIUrl":"https://doi.org/10.1109/PRDC.2007.20","url":null,"abstract":"Failure detector class Omega<sub>kappa</sub> has been defined in (G. Neiger, 1995) as an extension to failure detector Omega, and an algorithm has been given in (A. Mostefaoui et al., 2005) to solve k-set agreement using Omega<sub>kappa</sub> in asynchronous message-passing systems. In this paper, we extend these previous work in two directions. First, we define two new classes of failure detectors Omega<sub>kappa</sub> <sup>'</sup> and Omega<sub>kappa</sub> <sup>\"</sup>,which are new ways of extending Omega and show that they are equivalent to Omega<sub>kappa</sub>. Class Omega<sub>kappa</sub> <sup>'</sup> is more flexible than Omega<sub>kappa</sub> in that it does not require the outputs to stabilize eventually, while class Omega<sub>kappa</sub> <sup>\"</sup> does not refer to other processes in its outputs. Second, we present a new algorithm that solves k-set agreement using Omega<sub>kappa</sub> <sup>\"</sup> when a majority of processes do not crash. The algorithm is a faithful extension of the Paxos algorithm (L. Lamport, 1998), and thus it inherits the efficiency, flexibility, and robustness of the Paxos algorithm. In particular, it has better message complexity than the algorithm in (A. Mostefaoui et al., 2005). Both the new failure detectors and the new algorithm enrich our understanding of the k-set agreement problem.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127101117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A New Concurrent Detection of Control Flow Errors Based on DCT Technique 一种新的基于DCT技术的控制流误差并发检测方法
H. Lai, S. Horng, Yong-Yuan Chen, P. Fan, Yi Pan
{"title":"A New Concurrent Detection of Control Flow Errors Based on DCT Technique","authors":"H. Lai, S. Horng, Yong-Yuan Chen, P. Fan, Yi Pan","doi":"10.1109/PRDC.2007.61","DOIUrl":"https://doi.org/10.1109/PRDC.2007.61","url":null,"abstract":"In this paper, a program is first divided into several data computing blocks (DCBs) by the branch instruction; each DCB can then be recognized as an image. We then use the one dimension discrete cosine transform (1-D DCT) to compute each DCB to generate several signatures including 5-bits relay DCT signature (R-DCT-S) and 32-bits final DCT signature (F-DCT-S). These generated signatures are embedded into the instruction memory and then used to do the run time error checking. The watchdog should not reduce the processor performance, not increase the fault detection latency and not increase the memory overhead to store the signatures; in this paper, the processor degradation can be improved by doing the whole block error checking after the branch instruction, the fault detection latency is improved by doing the intermediate error checking at the R-type instruction, and the memory overhead is reduced by storing the R-DCT-S to the R-type instruction. The experimental results show that the proposed watchdog has very high error detection coverage and shortest error detection latency to detect either single fault or multi-faults, no matter what the fault is transient or intermittent.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128262472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信