10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems最新文献

筛选
英文 中文
Concurrency control on distributed objects using role ordering (RO) scheduler 使用角色排序(RO)调度程序对分布式对象进行并发控制
T. Enokido, M. Takizawa
{"title":"Concurrency control on distributed objects using role ordering (RO) scheduler","authors":"T. Enokido, M. Takizawa","doi":"10.1109/WORDS.2005.22","DOIUrl":"https://doi.org/10.1109/WORDS.2005.22","url":null,"abstract":"A concept of role is significant to design and implement a secure information system. A role concept shows a job function in an enterprise. A role-based access control (RBAC) model is used to make a system secure. In addition to keeping systems secure, objects have to be consistent in presence of multiple transactions. Traditional locking protocols and timestamp ordering schedulers are based on principles \"first-comer-winner\" and \"timestamp order\" to make multiple conflicting transactions serializable, respectively. In this paper, we discuss concurrency control algorithms based on the significancy of roles assigned to transactions. We first define a significantly dominant relation on roles. We discuss a role ordering (RO) scheduler so that multiple conflicting transactions are serializable in a significant dominant relation of roles. We evaluate the RO scheduler compared with the two-phase locking (2PL) protocol.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122694909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Delay analysis for statistical real-time channels in mobile ad hoc networks 移动自组网中统计实时信道的时延分析
Min-Gu Lee, Sunggu Lee
{"title":"Delay analysis for statistical real-time channels in mobile ad hoc networks","authors":"Min-Gu Lee, Sunggu Lee","doi":"10.1109/WORDS.2005.23","DOIUrl":"https://doi.org/10.1109/WORDS.2005.23","url":null,"abstract":"Wireless devices that communicate using the IEEE 802.11 protocol can be used to create mobile ad-hoc networks (MANETs). Many interesting applications using MANETs are realizable if real-time channels can be supported on such networks. However, frames are commonly dropped (and thus must be retransmitted) in wireless networks due to interference from other wireless devices and transmission range problems. To provide real-time communication in such networks, statistical real-time channels can be used. This paper proposes an analysis of the end-to-end network delay for two nodes in a MANET using the IEEE 802.11 DCF mode. This delay analysis can serve as the basis for the creation of statistical real-time channels in IEEE 802.11 MANETs.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126213500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing DNS security using the SSL trust infrastructure 使用SSL信任基础设施增强DNS安全性
C. Fetzer, G. Pfeifer, T. Jim
{"title":"Enhancing DNS security using the SSL trust infrastructure","authors":"C. Fetzer, G. Pfeifer, T. Jim","doi":"10.1109/WORDS.2005.33","DOIUrl":"https://doi.org/10.1109/WORDS.2005.33","url":null,"abstract":"The main functionality of the domain name system (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, many improvements have been proposed for DNS in terms of security and dependability. However, the current secure DNS (DNSSEC) standard has still several problems that need further consideration. For example, online updates and denial of service attacks are not sufficiently addressed. These problems are serious obstacles that might prevent DNSSEC from replacing the traditional DNS. In this paper we discuss several of these technical and economic problems. To address these issues, we propose a simple extension to the existing DNS. It is SSL based and individual domains can decide independently of each other if and when to adopt the extensions. We show how to implement these extensions with the help of a simple proxy DNS server.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128743187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Evaluation of fault-tolerant distributed Web systems 容错分布式Web系统的评估
Y. Hong, J. No, In Han
{"title":"Evaluation of fault-tolerant distributed Web systems","authors":"Y. Hong, J. No, In Han","doi":"10.1109/WORDS.2005.35","DOIUrl":"https://doi.org/10.1109/WORDS.2005.35","url":null,"abstract":"Replication of information among multiple servers is necessary to service requests for Web application such as Internet banking. A dispatcher in distributed Web systems distributes client requests among Web application servers and multiple dispatchers are also needed for fault-tolerant Web services. In this paper, we describe issues related to building fault-tolerant distributed Web systems. We evaluate the performance of fault-tolerant distributed Web systems based on replication. Our evaluation is conducted on LVS (Linux Virtual Server) and the Apache Web server using the request generator, LoadCube. We show some performance measurements for the systems.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126356697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An adaptable security framework for service-based systems 用于基于服务的系统的适应性安全框架
S. Yau, Yisheng Yao, Zhaoji Chen, Luping Zhu
{"title":"An adaptable security framework for service-based systems","authors":"S. Yau, Yisheng Yao, Zhaoji Chen, Luping Zhu","doi":"10.1109/WORDS.2005.15","DOIUrl":"https://doi.org/10.1109/WORDS.2005.15","url":null,"abstract":"A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to achieve the system goals, regardless of the programming languages and platforms used to develop and run these services. In these large-scale service-based systems, various capabilities are provided by different organizations and interconnected by various types of networks, including wireless (infrastructure or ad hoc) and wired networks. For these systems which often involve multiple organizations, high confidence and adaptability are of prime concern to ensure that users can use these systems anywhere, any time, through various devices, knowing that their confidentiality and privacy are well protected under various situations. In this paper, an adaptable security framework for large-scale service-based systems is presented. It includes a core ontology and a logic-based situation-aware security specification language for specifying dynamic security policies for service-based systems, an approach to policy conflict detection and resolution, and tools for generating and deploying security agents to enforce security policies. With this framework, various parties of large-scale service-based systems can rapidly specify, update, verify, and enforce security policies in service-based systems to meet their security requirements under various situations.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123672817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Specification, analysis and implementation of architectural patterns for dependable software systems 对可靠软件系统的体系结构模式进行规范、分析和实现
S. Yau, S. Mukhopadhyay, Ramesh Bharadwaj
{"title":"Specification, analysis and implementation of architectural patterns for dependable software systems","authors":"S. Yau, S. Mukhopadhyay, Ramesh Bharadwaj","doi":"10.1109/WORDS.2005.50","DOIUrl":"https://doi.org/10.1109/WORDS.2005.50","url":null,"abstract":"Ensuring dependability of distributed applications is a difficult problem since developers must carefully consider issues such as network and node failures, deadlocks, live-locks, starvation, distributed coordination, and synchronization. The creation of architectural patterns for dependable software systems can provide effective guidelines, similar to design patterns, to system architects. In this paper, we present an agent specification language, associated tools, and agent-based middleware for specifying, analyzing and implementing architectural patterns for dependable software systems. The language we present is an extension of the secure operations language (SOL), which supports the behavioral specification of agents in addition to specification of agent interfaces, agent composition, and inter-agent interactions. Extended SOL can be used in the design of architectural patterns that implement the security, real-time, and fault-tolerance requirements of a given application. SOL also supports early and automated analyses of an application's functional requirements with respect to performance critical properties. Further, the language has a precisely defined semantics for composition, which enables the automated analysis of architectural designs and the impact of design choices on dependability requirements. The agent-based middleware secure infrastructure for networked systems (SINS), being developed at the Naval Research Laboratory, enables the rapid development and deployment of dependable distributed applications. Architectural patterns specified in extended SOL can be used to automatically derive an implementation, and to assign SINS agents to processors that constitute the distributed execution environment.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115022544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A framework for preparing experimental evaluation of rerouting mechanisms 准备对改道机制进行实验评估的框架
R. B. Correia, L. Carmo, L. Pirmez, L. Bacellar
{"title":"A framework for preparing experimental evaluation of rerouting mechanisms","authors":"R. B. Correia, L. Carmo, L. Pirmez, L. Bacellar","doi":"10.1109/WORDS.2005.6","DOIUrl":"https://doi.org/10.1109/WORDS.2005.6","url":null,"abstract":"Among the various QoS schemes that have already been proposed, rerouting critical flows is the most promising for its inherent ability to interface easily with management systems. To enhance the responsiveness, the operations performed by rerouting mechanisms should be done pro-actively. A pro-active network management using rerouting mechanisms was proposed by Correia et al., (2003). Recently, the proposed approach was selected to be deployed in an experimental fiber-optic gigabit backbone (GIGA project - sponsored by the Brazilian Research Network - RNP). The fundamental problem is how to specify critical factors and to develop a consistent set of tests for a complete field evaluation of the implementation. The constraints associated with this process are reduced deployment time and restricted availability of the network infrastructure for testing. This paper discusses a framework for deploying the rerouting mechanisms proposed by Correia et al. (2003) using DOE (design of experiments) analysis (Phadke). It is shown how rapidly some conclusions about performance, stability and interdependence upon the selection of design parameters can be taken through the use of DOE. Basically, MatLab models have been used to support the DOE analysis. This paper shows how the use of simple two and three-level factorial experimental designs can rapidly increase the designer's knowledge about the behavior of the mechanisms being studied.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123764767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experiments with WCET-oriented programming and the single-path architecture 实验与面向wcet的编程和单路径架构
P. Puschner
{"title":"Experiments with WCET-oriented programming and the single-path architecture","authors":"P. Puschner","doi":"10.1109/WORDS.2005.36","DOIUrl":"https://doi.org/10.1109/WORDS.2005.36","url":null,"abstract":"The single-path software/hardware architecture has been conceived with the goal to support real-time task execution with highly predictable timing. By using WCET-oriented programming (WCET... worst-case execution time) and then converting WCET-oriented code to single-path code we do not only aim at producing code with good temporal predictability but also target at a high worst-case performance. First experiments presented in this paper show that the combination of the two concepts yields indeed code with constant, hence fully predictable execution times. Further, these execution times are very competitive compared to the worst-case execution times of the alternative, non WCET-oriented solutions of the programming problems we investigated.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127165913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Design and implementation of fault-tolerant transactional agents for manipulating distributed objects 用于操作分布式对象的容错事务代理的设计和实现
Y. Tanaka, T. Enokido, M. Takizawa
{"title":"Design and implementation of fault-tolerant transactional agents for manipulating distributed objects","authors":"Y. Tanaka, T. Enokido, M. Takizawa","doi":"10.1109/WORDS.2005.24","DOIUrl":"https://doi.org/10.1109/WORDS.2005.24","url":null,"abstract":"A transactional agent is a mobile agent which manipulates objects distributed in computers. A transactional agent is composed of routing and manipulation subagent. A way to move to computers is decided in the routing agent. Objects in each computer are manipulated in a manipulation agent. After visiting computers, a routing agent makes a decision on commitment by using the commitment condition. In addition, objects obtained from a computer in the manipulation agent have to be delivered to other computers where the transactional agent is performed. A schedule to visit computers is made from the input-output relation of manipulation agents. We discuss a model of transactional agent and implementation of a transactional agent on database servers and evaluate the transactional agents. We evaluate the transactional agent model in terms of accessing time compared with the traditional client-server model.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127188838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomous agents and anticipative systems 自主代理和预期系统
M. Ramos, Félix F. Ramos
{"title":"Autonomous agents and anticipative systems","authors":"M. Ramos, Félix F. Ramos","doi":"10.1109/WORDS.2005.20","DOIUrl":"https://doi.org/10.1109/WORDS.2005.20","url":null,"abstract":"In this paper we propose an artificial intelligence approach to real time simulation of a virtual community based on a multiagent system. Our approach is based on the work of Holland and Miller (1991), in which the authors propose that the system may be viewed as a complex dynamic adaptive system with a large number of different kinds of agents. In such environment, agents may take their decisions based on the anticipation of the future state of the world (Axelrod, 1997). In this paper, we explore how useful the concept of anticipation can be for real time simulation improving and facilitating decisions of the virtual entities. In this paper, we work with real time anticipative agents and where developed situations, actions, and changes in the world. This normal context in a virtual world is taken as a framework where an agent is able to compare previous learned situations, executed actions and obtained results; with current situations in order to decide which action could lead the agent to a situation with the best utility or satisfaction degree.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书