A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
Resource Usage Analysis and Its Application to Resource Certification
[chapter]
2009
Lecture Notes in Computer Science
We also discuss the application of resource-usage information for code certification, whereby code not guaranteed to run within certain user-specified bounds is rejected. ...
Automatically generated information about resource usage can be used in multiple ways, both during program development and deployment. ...
Among all possible applications of resource analysis, in this work we describe its application to resource certification, whereby programs are coupled with information about their resource usage. ...
doi:10.1007/978-3-642-03829-7_9
fatcat:xqjizk4bc5gr3fjyhfavrnsfya
TINMAN: A Resource Bound Security Checking System for Mobile Code
[chapter]
2002
Lecture Notes in Computer Science
TIN-MAN uses resource-usage checking tools to generate proof obligations required of the resource usage certificate and provides full coverage by monitoring any essential property not guaranteed by the ...
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. ...
It pertains to the authorization of resource usage and the limitation of actual resource usage by a program. ...
doi:10.1007/3-540-45853-0_11
fatcat:wk5pytp7tffojoe23iv2k5q6ta
Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems
2014
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014
Considering the requirements for re-usability and incremental development and certification, we use this model to describe our integrated analysis approach. ...
The performance and power efficiency of multi-core processors are attractive features for safety-critical applications, for example in avionics. ...
We target the independent analysis of applications in order to reduce analysis complexity and enable incremental development and certification. ...
doi:10.7873/date.2014.080
dblp:conf/date/NowotschPHPS14
fatcat:7xcu6gi2pjg7jnbgknqogs5yjq
GreenBrowsing: Towards Energy Efficiency in Browsing Experience
[chapter]
2014
Lecture Notes in Computer Science
A system that proposes the provision of (i) a Google Chrome extension to monitor, rationalize and reduce the energy consumption of the browsing experience and (ii) a Certification Scheme for dynamic web ...
pages, based on web-page performance counter statistics and analysis, performed on the cloud. ...
It takes into account relative efficiency of scheduled resources usage, with application progress monitoring, factoring in perceived utility depreciation by users when resources are sub-allocated [14, ...
doi:10.1007/978-3-662-43352-2_10
fatcat:r75sfonygnb5fkehzfuukolrbu
Multi-core Interference-Sensitive WCET Analysis Leveraging Runtime Resource Capacity Enforcement
2014
2014 26th Euromicro Conference on Real-Time Systems
In particular, we introduce additional phases to state-of-the-art timing analysis techniques to analyse an applications resource usage and compute an interference delay. ...
We further complement the offline analysis with a runtime monitoring concept to enforce resource usage guarantees. ...
Based on the approach, scheduling solution will be developed to select applications that should be scheduled in parallel to optimise system resource utilisation.
IX. ...
doi:10.1109/ecrts.2014.20
dblp:conf/ecrts/NowotschPBTWS14
fatcat:5iohewfkyje65houqemaqzok4y
Energy Analysis of Services through Green Metrics: Towards Green Certificates
[chapter]
2012
Communications in Computer and Information Science
A service is annotated in terms of its structure, of the used IT platform, and of development costs, human resources, and environment impact. ...
GPIs relate to service development, deployment, and maintenance. An approach is proposed based on monitoring the GPIs so as to enable the analysis of services from their energy consumption viewpoint. ...
This work expresses the opinions of the authors and not necessarily those of the European Commission. ...
doi:10.1007/978-3-642-29166-1_22
fatcat:24b7gal24vdftosjl23ixdu5a4
Quality measures for embedded systems and their application to control and certification
2006
ACM SIGBED Review
This paper describes the real-time utility measures we have developed for ARMS and their use as feedback signals to a control system that manages the dynamic allocation of resources to applications in ...
It is a challenge to develop ways to measure and evaluate the quality, or utility, of DRE system performance in the context of the dynamic, unpredictable environments in which they operate. ...
Traditionally, certification has involved a combination of adherence to documented processes, testing, and formal analysis. ...
doi:10.1145/1183088.1183095
fatcat:23fek5f6o5ed5nn5d4regmw7ay
The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects
2012
Information & Security An International Journal
Special attention is paid to the issue of information protection in cloud computing and the implementation of the hybrid cloud model for maintaining information resources of the state. ...
In particular, it examines a scheme for maintaining the state register of potentially dangerous objects on the basis of cloud computing technology. ...
The technology offered to usage allows reducing expenses for creation and system service of information resources, doing it by more flexible, to simplify the order of provision of the information. ...
doi:10.11610/isij.2804
fatcat:4kotaaxy2vh3thlemvmofkmz3i
Security Model for Scady Grid Toolkit – Analysis and Implementation
2019
Figshare
security approaches and proposes the security mechanism for tasks of SCADY based on the X.509 certification so that high performance applications can be catered. ...
Grid computing shares and use resources in dynamic distributed environments. The dynamic nature of Grid environments results in security concerns in high performance applications. ...
Enhanced Key Usage Extension Enhance key usage extension provided with X.509 certificate generation indicates the use of certificate's public key. ...
doi:10.6084/m9.figshare.7823273
fatcat:imn3w72pqnht5i6tpaje2mqh24
Finding the PKI needles in the Internet haystack
2010
Journal of Computer Security
repositories and certificate validation servers relevant to that certificate -and all the others the trust path she builds for it. ...
PKIs have become a central asset for many organizations, due to distributed IT and users. ...
Acknowledgments The authors would like to thank Stephen Kent, Frank Pooth, Ashad Noor, Sravan Maringanti, the anonymous reviewers and all the PKIX WG for several discussions and comments. ...
doi:10.3233/jcs-2010-0401
fatcat:toixn6rwnjh6xgfm6pova5ksle
On the tailoring of CAST-32A certification guidance to real COTS multicore architectures
2017
2017 12th IEEE International Symposium on Industrial Embedded Systems (SIES)
the difficulties of the application of CAST-32A to a real multicore processor, the NXP P4080. ...
Yet, the unpredictable impact on timing of contention in shared hardware resources challenges certification. ...
ACKNOWLEDGEMENTS This work has been partially supported by the Spanish Ministry of Economy and Competitiveness (MINECO) under grant TIN2015-65316-P and the HiPEAC Network of Excellence. ...
doi:10.1109/sies.2017.7993376
dblp:conf/sies/AgirreAAC17
fatcat:kzuqu6bqercmjleerp5sfrtwl4
A Certification Framework for Cloud Security Properties: The Monitoring Path
[chapter]
2015
Lecture Notes in Computer Science
In this paper we will focus only on the monitoring case and will illustrate its use. ...
Such framework will bring service users, service providers and cloud suppliers to work together with certification authorities in order to ensure security properties and certificates validity in the continuously ...
It watches hosts (processor load, disk usage, . . . ), applications, services, OS, network protocols and is able to provide notifications. ...
doi:10.1007/978-3-319-17199-9_3
fatcat:52uv3paybrhdrnjwle5dcil2ca
A review of tools to assess the sustainability in building construction
2005
Environmental progress
Economic Benefits • Reduce operating costs • Enhance asset value and profits • Improve employee productivity and satisfaction • Optimize life-cycle economic performance ...
ACKNOWLEDGMENTS The authors thank the following people for their guidance and help: Dara Zycherman and the team of LEED; Thomas Piper and the team of Envest; and Rob Nicoll and the team of BASIX. ...
Figure 1 presents the varied sections in LEED analysis. The certification review process includes the following: 1. Application Submittal. ...
doi:10.1002/ep.10065
fatcat:mdo776gwcrgndckbu36jclgkia
HotGrid: Graduated Access to Grid-Based Science Gateways
[chapter]
2005
Lecture Notes in Computer Science
The secondary purpose of HotGrid is to acclimate a science community to the concepts of certificate use. ...
Our system provides these weakly authenticated users with immediate power to use the Grid resources for science, but without the dangerous power of running arbitrary code. ...
The database is also used by the server to enforce certificate time limits. Other resource limits can be enforced e.g. CPU time, disk usage and network bandwidth usage. Fig. 2 . ...
doi:10.1007/11508380_10
fatcat:62u7ucjbmbbvhjiii3wjvp5vze
CrowdShare: Secure Mobile Resource Sharing
[chapter]
2013
Lecture Notes in Computer Science
In this paper, we present CrowdShare, a complete framework and its (Android) implementation for secure and private resource sharing among nearby devices. ...
Mobile smart devices and services have become an integral part of our daily life. In this context there are many compelling scenarios for mobile device users to share resources. ...
This work was supported in part by the German Federal Ministry of Education and Research (BMBF) within EC SPRIDE, and by the Hessian LOEWE excellence initiative within CASED. ...
doi:10.1007/978-3-642-38980-1_27
fatcat:lyxz4z35lndfza4an565snrl4i
« Previous
Showing results 1 — 15 out of 64,629 results