Filters








18,068 Hits in 9.0 sec

Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies

Nataliia Bielova, Fabio Massacci
2011 2011 IEEE International Symposium on Policies for Distributed Systems and Networks  
Given a global bound on the amount of errors in a trace that can be tolerated for each workflow execution, we can automatically generate an edit-automata that can provably enforce the policy with a sufficient  ...  degree of predictability (a policy metric for error correction).  ...  Marino from HSR for many helpful discussions. This work has been partly supported by the EU under the projects EU-IP-MASTER, EU-FET-IP-SecureChange and EU-NoE-NESSoS.  ... 
doi:10.1109/policy.2011.41 dblp:conf/policy/BielovaM11 fatcat:gwzv2fjb5rcctd7w4u4k2pgxcy

Gaining confidence in scientific applications through executable interface contracts

T L Dahlgren, D E Bernholdt, L C McInnes
2008 Journal of Physics, Conference Series  
Research into techniques for performance-driven contract enforcement pursues practical solutions to adapting the level of contract enforcement to performance constraints.  ...  Unfamiliar components present increased risk of incorrect or unanticipated usage patterns and unexpected component behavior.  ...  Scientific computing software environments traditionally provide few facilities for aiding the V&V process, leading developers to build and rely on sets of tests.  ... 
doi:10.1088/1742-6596/125/1/012086 fatcat:4oqcp6ticzfj5cuu43vdturl7i

Improving scientific software component quality through assertions

Tamara L. Dahlgren, Premkumar T. Devanbu
2005 Proceedings of the second international workshop on Software engineering for high performance computing system applications - SE-HPCS '05  
We are proposing research on self-adaptive interface assertion enforcement for the purposes of improving scientific software component quality.  ...  In order to determine if partial enforcement based on adaptive sampling is a viable solution in performance critical environments, we are pursuing research on mechanisms combining static and dynamic analyses  ...  Department of Energy's Center for Component Technology for Terascale Simulation Software (CCTTSS) of the Scientific Discovery through Advanced Computing (SciDAC) program by the University of California  ... 
doi:10.1145/1145319.1145341 fatcat:cytcz2wu5jhwhc6r77bhzqtgk4

Enforcing constraints for time series prediction in supervised, unsupervised and reinforcement learning [article]

Panos Stinis
2019 arXiv   pre-print
For the case of unsupervised learning, in particular generative adversarial networks, the constraints are introduced by augmenting the input of the discriminator.  ...  In particular, we provide ways to enforce constraints during training for all three major modes of learning, namely supervised, unsupervised and reinforcement learning.  ...  The tolerance for the relative error was set to T OL = 1/ N/3 = 1/ 20 4 /3 ≈ 0.0122. (see [24] for more details about T OL).  ... 
arXiv:1905.07501v1 fatcat:kbbvtsx2fjctnfb3oumegcr5je

ORAID: An Intelligent and Fault-Tolerant Object Storage Device [chapter]

Dan Feng, Lingfang Zeng, Fang Wang, Shunda Zhang
2005 Lecture Notes in Computer Science  
RAID (redundant arrays of independent disks) is a popular mechanism to offer fault-tolerance storage. But RAID based on file or block interface has very limited intelligence.  ...  ORAID consolidates disk space of individual disk into a single storage spool and implements object-sharing and fault-tolerance through the object-interface.  ...  Users can measure and enforce both changes and policy-generated reactions from a user interface.  ... 
doi:10.1007/11596042_42 fatcat:euu42kvjvbar3bxp6fk42dfjfy

Securing untrusted code via compiler-agnostic binary rewriting

Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin
2012 Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12  
However, production-level VMs can be extremely large relative to the untrusted processes they guard, introducing significant computational overhead when they are applied to enforce finegrained policies  ...  Instead, VMs dynamically translate binary code with the aid of just-in-time binary translation [13, 32, 25, 18] .  ...  Thus, our rewriting algorithm's tolerance of disassembly errors is critical for success. Our system architecture is illustrated in Fig. 1 .  ... 
doi:10.1145/2420950.2420995 dblp:conf/acsac/WartellMHL12 fatcat:zdze6nmbwzfvtkwoeonw6ytwvi

Low-cost error containment and recovery for onboard guarded software upgrading and beyond

A.T. Tai, K.S. Tso, L. Alkalai, S.N. Chau, W.H. Sanders
2002 IEEE transactions on computers  
Finally, we discuss the advantages of the MDCD approach and its potential utility as a general-purpose, low-cost software fault tolerance technique for distributed embedded computing.  ...  AbstractÐMessage-driven confidence-driven (MDCD) error containment and recovery, a low-cost approach to mitigating the effect of software design faults in distributed embedded systems, is developed for  ...  a general-purpose low-cost software fault tolerance technique for distributed computing.  ... 
doi:10.1109/12.980004 fatcat:q2ljiyn6jfe6jeinmnwx4giiia

Building Reliable Secure Computing Systems Out Of Unreliable Insecure Components

J.E. Dobson, B. Randell
1986 1986 IEEE Symposium on Security and Privacy  
Some limitations of the concept of a Trusted Computing Base are discussed, and an alternative approach to the design of highly secure computing systems is put forward, based on fault tolerance concepts  ...  Parallels are drawn between the problems and techniques associated with achieving high reliability, and those associated with the provision of security, in distributed computing systems.  ...  in particular, and also with Derek Barnes and Simon Wiseman of the Royal Signals and Radar Establishment (RSRE).  ... 
doi:10.1109/sp.1986.10018 dblp:conf/sp/DobsonR86 fatcat:l3m2c5tfmreplmi3yb2eccrmke

XML-Based Distributed Access Control System [chapter]

Javier López, Antonio Maña, Mariemma I. Yagüe
2002 Lecture Notes in Computer Science  
Mobile policies are attached to the data that they control and are enforced by their execution in trusted servers.  ...  In order to overcome some of the limitations of RBAC and be able to implement security requirements such as the "originator controlled" (ORCON) policy, the concept of mobile policy has been recently prop  ...  Acknowledgements The authors want to acknowledge the authors of [1] , and specially, Amgad Fayad for their help and interesting comments about the first drafts of this work.  ... 
doi:10.1007/3-540-45705-4_22 fatcat:pr7cie3s5zerxh7khnejqny3ka

A case for exceptions

Tullio Vardanega
2001 ACM SIGAda Ada Letters  
In this short paper we argue in favour of the value of language support for exceptions.  ...  Finally, we present requirements for an enhanced exception model that, we expect, would increase the confidence and the take up of users.  ...  Those who opt for the exception-based approach (and we among them), however, would require the language implementation to enforce a sharper error detection policy than ARM 13.9.1(9) allows, and to definitely  ... 
doi:10.1145/568671.568679 fatcat:u3f6nqetfrdodb2sfkcheffx5i

The front line battle against P2P

Douglas Ennis, Divyangi Anchan, Mahmoud Pegah
2004 Proceedings of the 32nd annual ACM SIGUCCS conference on User services - SIGUCCS '04  
False positives generated with the use of well-known ports for detection are another serious concern.  ...  Having a clear and concise policy restricting such use is one matter; enforcing said policy has proved to be an entirely different and complex task.  ...  The use of IDS to detect impending or successful attacks has become commonplace; today IDS are taking on a new role, that of organizational policy enforcement entity aids.  ... 
doi:10.1145/1027802.1027828 dblp:conf/siguccs/EnnisAP04 fatcat:pdlfpeszxfdntn4ybo2lqtgsya

GUARDS: a generic upgradable architecture for real-time dependable systems

D. Powell, J. Arlat, L. Beus-Dukic, A. Bondavalli, P. Coppola, A. Fantechi, E. Jenn, C. Rabejac, A. Wellings
1999 IEEE Transactions on Parallel and Distributed Systems  
AbstractÐThe development and validation of fault-tolerant computers for critical real-time applications are currently both costly and time consuming.  ...  Often, the underlying technology is out-of-date by the time the computers are ready for deployment.  ...  It must be ensured that it is not possible to by-pass the controls put into place to enforce the policy.  ... 
doi:10.1109/71.774908 fatcat:6fts7tmq5veilfhkejnm744b34

Design of environmental regulatory policies for sustainable emission reduction

Andrés Malcolm, Libin Zhang, Andreas A. Linninger
2006 AIChE Journal  
at tolerable cost to industry.  ...  The aim of this work is to furnish regulators and manufacturers with a concise tool for quantifying the impact of future regulatory scenarios.  ...  We propose to use computational models capable of generating feasible recycle and treatment options for all effluents in a chemical plant.  ... 
doi:10.1002/aic.10861 fatcat:vf3st3wsdvdx5fib73io37ozdm

A qualitative analysis of software security patterns

Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides
2006 Computers & security  
In the same way that the well-known design patterns for building well-structured software have been defined, a new kind of patterns called security patterns have emerged.  ...  An attempt to evaluate known security patterns based on how well they follow each principle, how well they encounter with possible problems in building secure software and for which of the threat categories  ...  The intent of the Policy pattern is to isolate policy enforcement to a discrete component of an information system and to ensure that policy enforcement activities are performed in the proper sequence.  ... 
doi:10.1016/j.cose.2006.03.002 fatcat:q6j2ijg2srf6lccfm4yelhv5xe

Toward a Broader View of Security Protocols [chapter]

Matt Blaze
2006 Lecture Notes in Computer Science  
Computer and network security researchers usually focus on the security of computers and networks.  ...  Although it might seem as if there is more than enough insecurity here to keep all of us fully occupied for the foreseeable future, this narrow view of our domain may actually be contributing to the very  ...  ., [Arb99] ) uses this concept for general computing, but the idea can be applied more generally.  ... 
doi:10.1007/11861386_12 fatcat:4hbupmatfnb2vcjgcjjq5dt4dm
« Previous Showing results 1 — 15 out of 18,068 results