{"title":"APRIX: A Master-Slave Operating System Architecture for Multiprocessor Embedded Systems","authors":"Jimin Kim, Minsoo Ryu","doi":"10.1109/FTDCS.2008.34","DOIUrl":"https://doi.org/10.1109/FTDCS.2008.34","url":null,"abstract":"The recent emergence of heterogeneous chip multiprocessors requires a different operating system organization from the usual SMP (symmetric multiprocessing) organization. Although the SMP organization has been widely adopted in modern multiprocessor operating systems, it is restricted to homogeneous processors with a global shared memory. On the other hand, the master-slave organization has little dependency upon the underlying hardware architecture, thus having great potential to cope with heterogeneous multiprocessors. This motivated us to reexamine the master-slave approach. In this paper, we attempt to address real-time and performance issues associated with the master-slave approach. Specifically, we first describe our previous design of a master-slave architecture, called APRIX. We then present an improved communication mechanism between the master and slave, which allows the master to provide priority-based system call services to slave kernels and also improves the overall multiprocessing performance.","PeriodicalId":414800,"journal":{"name":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123363119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SOV: Service Oriented Virtualization Model for Medical Image Grid","authors":"Aobing Sun, Hai Jin, Qin Zhang, Ran Zheng","doi":"10.1109/FTDCS.2008.30","DOIUrl":"https://doi.org/10.1109/FTDCS.2008.30","url":null,"abstract":"The heterogeneity, distribution and dynamicity of web services hamper WSRF (Web service resource framework) of grid to exert its excellences in resource integrations. In this paper, we propose our SOV (service orient virtualization) model for medical image grid (MedImGrid), which creates a virtual middle layer for grid to simplify the transformation from users' business aims to executable web-service instances. The layer adopts semantic based cross clustering means to support approximate optimal service selection from WSS (Web service set) to break through the hard-encoded mode of web-service based applications. It provides service-independent composition mechanism and can adjust a service composition path even during runtime. SOV utilizes the web services as the joint-point of grid, semantic and virtualization technologies so as to conceal the heterogeneities of low-level resources and surpass the limits of tightly-coupled mode to service composition within grid environment.","PeriodicalId":414800,"journal":{"name":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129685647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Role-Based Authorization for OSGi Service Environments","authors":"Gail-Joon Ahn, Hongxin Hu, Jing Jin","doi":"10.1109/FTDCS.2008.43","DOIUrl":"https://doi.org/10.1109/FTDCS.2008.43","url":null,"abstract":"OSGi framework enables diverse devices to conveniently establish a local area network environment such as homes, offices, and automobiles. Access control is one of the crucial parts which should be considered in such emerging environments. However, the current OSGi authorization mechanism is not rigorous enough to fulfill security requirements involved in dynamic and open OSGi environments. This paper provides a systematic way to adopt a role-based access control approach in OSGi environments. We demonstrate how our authorization framework can achieve important RBAC features and enhance existing primitive access control modules in OSGi service environments.","PeriodicalId":414800,"journal":{"name":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131118190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ERAP: ECC Based RFID Authentication Protocol","authors":"Sheikh Iqbal Ahamed, F. Rahman, Md. Endadul Hoque","doi":"10.1109/FTDCS.2008.20","DOIUrl":"https://doi.org/10.1109/FTDCS.2008.20","url":null,"abstract":"RFID tags are a new generation of small devices used for identification in many applications today. RFID authentication plays an important role in applications where security and privacy is a major concern. As an example, RFID has gained appreciation as an emerging technology to thwart counterfeiting problems. Public key cryptography (PKC) provides an impeccable solution to the counterfeiting problem. One recent family of public key cryptosystem is elliptic curve cryptography (ECC) which is a better choice than RSA cryptographic system because of its shorter key length. In this paper, we propose a secure, mutual offline authentication protocol which is based on ECC. Finally, we present security analysis of our proposed authentication protocol.","PeriodicalId":414800,"journal":{"name":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134083017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Delegation Framework for Access Control in WfMS Based on Tasks and Roles","authors":"Pu Jian, Hwai-Jung Hsu, Feng-Jian Wang","doi":"10.1109/FTDCS.2008.13","DOIUrl":"https://doi.org/10.1109/FTDCS.2008.13","url":null,"abstract":"Access control is important for protecting the information integrities in WfMS's. Compared to conventional access control models such as discretionary, mandatory, and role-based access control models, an access-control model based on both tasks and roles meets more requirements for modern enterprise environments. However, there are no discussions on delegation mechanisms for such a model. In this paper, we propose a new delegation framework to support the access control associated with the model. Among various delegations, two typical cases and their solution algorithms are presented to indicate the usability of the framework.","PeriodicalId":414800,"journal":{"name":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122068497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Architecture for Guaranteeing Real-Time Databases Available Ceaselessly","authors":"Ying-yuan Xiao","doi":"10.1109/FTDCS.2008.12","DOIUrl":"https://doi.org/10.1109/FTDCS.2008.12","url":null,"abstract":"Real-time databases are widely applied in time-critical applications, such as autopilot systems, robot navigation, real-time monitoring, programmed stock trading, etc. These applications usually require real-time databases can provide 7times24times60times60s' ceaseless service weekly. However, real-time databases cannot completely avoid all kinds of failures. The traditional recovery-processing scheme cannot already satisfy the requirement for the above applications. In this paper, we present a fault tolerant architecture based on self-perceptive, self-diagnosing and self-adaptive recovery mechanisms. This architecture can prevent or delay failures effectively. On the basis of this architecture, we propose a novel prediction recovery scheme. The prediction recovery scheme allows the execution of transactions during recovery by providing predictive values of damaged data items to these transactions that need immediate access to those data items.","PeriodicalId":414800,"journal":{"name":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116882516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structured Service Composition Execution for Mobile Web Applications","authors":"H. Pfeffer, Louay Bassbouss, S. Steglich","doi":"10.1109/FTDCS.2008.37","DOIUrl":"https://doi.org/10.1109/FTDCS.2008.37","url":null,"abstract":"Service orchestration languages such as BPEL have been established as de facto standard for the composition of Web services within service oriented architectures (SOA). Nevertheless, Web applications following the same principle of combining already existing services are still created as Mashups by coding against open 3rd party APIs. Within this paper, we build on a formal model for the representation of Web Service workflows based on timed automata. Here, we introduce a runtime environment and management console for those Web Service compositions, highlighting its feasibility to support mobile devices by the additional consideration of realtime constraints.","PeriodicalId":414800,"journal":{"name":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127803010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human-Intention Driven Self Adaptive Software Evolvability in Distributed Service Environments","authors":"Ming Hua, K. Oyama, Carl K. Chang","doi":"10.1109/FTDCS.2008.40","DOIUrl":"https://doi.org/10.1109/FTDCS.2008.40","url":null,"abstract":"Evolvability is essential to adapting to the dynamic and changing requirements in response to the feedback from context awareness systems. However, most of current context models have limited capability in exploring human intentions that often drive system evolution. To support service requirements analysis of real-world applications in distributed service environments, this paper focuses on human-intention driven software evolvability. In our approach, requirements analysis via an evolution cycle provides the means of speculating requirement changes, predicting possible new generations of system behaviors, and assessing the corresponding quality impacts. Furthermore, we also discuss evolvability metrics by observing intentions from user contexts.","PeriodicalId":414800,"journal":{"name":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117209913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yinong Chen, S. Abhyankar, L. Xu, W. Tsai, M. Garcia-Acosta
{"title":"Developing a Security Robot in Service-Oriented Architecture","authors":"Yinong Chen, S. Abhyankar, L. Xu, W. Tsai, M. Garcia-Acosta","doi":"10.1109/FTDCS.2008.28","DOIUrl":"https://doi.org/10.1109/FTDCS.2008.28","url":null,"abstract":"Service-oriented computing (SOC) has been traditionally applied in Web-based applications. The recent development shows that SOC can play an important role in embedded systems and robotics applications to address their limitations in capacity, versatility of application fields, and extensibility in requirements of such systems. This paper presents the design, implementation, and simulation results of an autonomous security robot based on SOC and event-driven programming. The floor exploration unit is the focus of this paper. Each component of the robot is wrapped as a service and all these services are distributed on different computer and they collaborate in a loosely coupled fashion. All the services are orchestrated by a coordination service, so that the mission is well coordinated and efficient. The objectives of the project are threefold: to prove the suitability of SOC concepts in such systems; the compatibility of the board to off-the-shelf sensors and actuators; and the energy effectiveness and performance of the new embedded system hardware developed by Intel.","PeriodicalId":414800,"journal":{"name":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122584427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Scientific Workflow Management for Data-Intensive Applications","authors":"S. Shumilov, Y. Leng, M. El-Gayyar, A. Cremers","doi":"10.1109/FTDCS.2008.39","DOIUrl":"https://doi.org/10.1109/FTDCS.2008.39","url":null,"abstract":"Grids and service-oriented technologies are emerging as dominant approaches for distributed systems. Rising complexity of grid applications places new requirements and increases needs to improve the design and reusability of grid workflow systems. In particular, scientific data-intensive workflows require new approaches for integration and coordination of distributed resources. Traditional centralized approaches for workflow execution can be quite inefficient for such workflows. In order to clarify these issues, the paper surveys existing workflow management systems evaluating them practically on some use cases for management of natural resources from the multidisciplinary research project GLOWA Volta. Subsequently, the most important obstacles are identified and a new approach facilitating semantic oriented composition, reuse and distributed execution of workflows is proposed.","PeriodicalId":414800,"journal":{"name":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128236414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}