{"title":"正在进行的工作:具有容错约束的安全关键型分布式实时应用的设计","authors":"Wei Jiang, Haibo Hu, Jinyu Zhan, Ke Jiang","doi":"10.1109/EMSOFT.2018.8537217","DOIUrl":null,"url":null,"abstract":"We approach the design of security-critical distributed applications with task-level fault-tolerant techniques. We focus on the impact of fault tolerance on secure message communication, which was seriously overlooked before. Fault-tolerant techniques, e.g., task re-execution and active replica, are leveraged to tolerate faults in task executions, while cryptography is deployed to protect the confidentiality of messages delivered over the communication media. The design problem is to minimize the schedule length and security vulnerability of the application, subject to given fault-tolerant constraints. We then propose a multi-objective optimization method to find the best solutions. Initial experiments indicated the efficiency.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Work-in-Progress: Design of Security-Critical Distributed Real-Time Applications with Fault-Tolerant Constraint\",\"authors\":\"Wei Jiang, Haibo Hu, Jinyu Zhan, Ke Jiang\",\"doi\":\"10.1109/EMSOFT.2018.8537217\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We approach the design of security-critical distributed applications with task-level fault-tolerant techniques. We focus on the impact of fault tolerance on secure message communication, which was seriously overlooked before. Fault-tolerant techniques, e.g., task re-execution and active replica, are leveraged to tolerate faults in task executions, while cryptography is deployed to protect the confidentiality of messages delivered over the communication media. The design problem is to minimize the schedule length and security vulnerability of the application, subject to given fault-tolerant constraints. We then propose a multi-objective optimization method to find the best solutions. Initial experiments indicated the efficiency.\",\"PeriodicalId\":375994,\"journal\":{\"name\":\"2018 International Conference on Embedded Software (EMSOFT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Embedded Software (EMSOFT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EMSOFT.2018.8537217\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Embedded Software (EMSOFT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EMSOFT.2018.8537217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Work-in-Progress: Design of Security-Critical Distributed Real-Time Applications with Fault-Tolerant Constraint
We approach the design of security-critical distributed applications with task-level fault-tolerant techniques. We focus on the impact of fault tolerance on secure message communication, which was seriously overlooked before. Fault-tolerant techniques, e.g., task re-execution and active replica, are leveraged to tolerate faults in task executions, while cryptography is deployed to protect the confidentiality of messages delivered over the communication media. The design problem is to minimize the schedule length and security vulnerability of the application, subject to given fault-tolerant constraints. We then propose a multi-objective optimization method to find the best solutions. Initial experiments indicated the efficiency.