64,629 Hits in 7.8 sec

Resource Usage Analysis and Its Application to Resource Certification [chapter]

Elvira Albert, Puri Arenas, Samir Genaim, Germán Puebla, Damiano Zanardini
2009 Lecture Notes in Computer Science  
We also discuss the application of resource-usage information for code certification, whereby code not guaranteed to run within certain user-specified bounds is rejected.  ...  Automatically generated information about resource usage can be used in multiple ways, both during program development and deployment.  ...  Among all possible applications of resource analysis, in this work we describe its application to resource certification, whereby programs are coupled with information about their resource usage.  ... 
doi:10.1007/978-3-642-03829-7_9 fatcat:xqjizk4bc5gr3fjyhfavrnsfya

TINMAN: A Resource Bound Security Checking System for Mobile Code [chapter]

Aloysius K. Mok, Weijiang Yu
2002 Lecture Notes in Computer Science  
TIN-MAN uses resource-usage checking tools to generate proof obligations required of the resource usage certificate and provides full coverage by monitoring any essential property not guaranteed by the  ...  Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information.  ...  It pertains to the authorization of resource usage and the limitation of actual resource usage by a program.  ... 
doi:10.1007/3-540-45853-0_11 fatcat:wk5pytp7tffojoe23iv2k5q6ta

Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems

Jan Nowotsch, Michael Paulitsch, Arne Henrichsen, Werner Pongratz, Andreas Schacht
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014  
Considering the requirements for re-usability and incremental development and certification, we use this model to describe our integrated analysis approach.  ...  The performance and power efficiency of multi-core processors are attractive features for safety-critical applications, for example in avionics.  ...  We target the independent analysis of applications in order to reduce analysis complexity and enable incremental development and certification.  ... 
doi:10.7873/date.2014.080 dblp:conf/date/NowotschPHPS14 fatcat:7xcu6gi2pjg7jnbgknqogs5yjq

GreenBrowsing: Towards Energy Efficiency in Browsing Experience [chapter]

Gonçalo Avelar, Luís Veiga
2014 Lecture Notes in Computer Science  
A system that proposes the provision of (i) a Google Chrome extension to monitor, rationalize and reduce the energy consumption of the browsing experience and (ii) a Certification Scheme for dynamic web  ...  pages, based on web-page performance counter statistics and analysis, performed on the cloud.  ...  It takes into account relative efficiency of scheduled resources usage, with application progress monitoring, factoring in perceived utility depreciation by users when resources are sub-allocated [14,  ... 
doi:10.1007/978-3-662-43352-2_10 fatcat:r75sfonygnb5fkehzfuukolrbu

Multi-core Interference-Sensitive WCET Analysis Leveraging Runtime Resource Capacity Enforcement

Jan Nowotsch, Michael Paulitsch, Daniel Buhler, Henrik Theiling, Simon Wegener, Michael Schmidt
2014 2014 26th Euromicro Conference on Real-Time Systems  
In particular, we introduce additional phases to state-of-the-art timing analysis techniques to analyse an applications resource usage and compute an interference delay.  ...  We further complement the offline analysis with a runtime monitoring concept to enforce resource usage guarantees.  ...  Based on the approach, scheduling solution will be developed to select applications that should be scheduled in parallel to optimise system resource utilisation. IX.  ... 
doi:10.1109/ecrts.2014.20 dblp:conf/ecrts/NowotschPBTWS14 fatcat:5iohewfkyje65houqemaqzok4y

Energy Analysis of Services through Green Metrics: Towards Green Certificates [chapter]

Mariagrazia Fugini, José Antonio Parejo Maestre
2012 Communications in Computer and Information Science  
A service is annotated in terms of its structure, of the used IT platform, and of development costs, human resources, and environment impact.  ...  GPIs relate to service development, deployment, and maintenance. An approach is proposed based on monitoring the GPIs so as to enable the analysis of services from their energy consumption viewpoint.  ...  This work expresses the opinions of the authors and not necessarily those of the European Commission.  ... 
doi:10.1007/978-3-642-29166-1_22 fatcat:24b7gal24vdftosjl23ixdu5a4

Quality measures for embedded systems and their application to control and certification

Kurt Rohloff, Joseph Loyall, Richard Schantz
2006 ACM SIGBED Review  
This paper describes the real-time utility measures we have developed for ARMS and their use as feedback signals to a control system that manages the dynamic allocation of resources to applications in  ...  It is a challenge to develop ways to measure and evaluate the quality, or utility, of DRE system performance in the context of the dynamic, unpredictable environments in which they operate.  ...  Traditionally, certification has involved a combination of adherence to documented processes, testing, and formal analysis.  ... 
doi:10.1145/1183088.1183095 fatcat:23fek5f6o5ed5nn5d4regmw7ay

The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects

Andrey Melenets
2012 Information & Security An International Journal  
Special attention is paid to the issue of information protection in cloud computing and the implementation of the hybrid cloud model for maintaining information resources of the state.  ...  In particular, it examines a scheme for maintaining the state register of potentially dangerous objects on the basis of cloud computing technology.  ...  The technology offered to usage allows reducing expenses for creation and system service of information resources, doing it by more flexible, to simplify the order of provision of the information.  ... 
doi:10.11610/isij.2804 fatcat:4kotaaxy2vh3thlemvmofkmz3i

Security Model for Scady Grid Toolkit – Analysis and Implementation

Dr. Jayeshkumar Madhubhai Patel
2019 Figshare  
security approaches and proposes the security mechanism for tasks of SCADY based on the X.509 certification so that high performance applications can be catered.  ...  Grid computing shares and use resources in dynamic distributed environments. The dynamic nature of Grid environments results in security concerns in high performance applications.  ...  Enhanced Key Usage Extension Enhance key usage extension provided with X.509 certificate generation indicates the use of certificate's public key.  ... 
doi:10.6084/m9.figshare.7823273 fatcat:imn3w72pqnht5i6tpaje2mqh24

Finding the PKI needles in the Internet haystack

Massimiliano Pala, Sean W. Smith
2010 Journal of Computer Security  
repositories and certificate validation servers relevant to that certificate -and all the others the trust path she builds for it.  ...  PKIs have become a central asset for many organizations, due to distributed IT and users.  ...  Acknowledgments The authors would like to thank Stephen Kent, Frank Pooth, Ashad Noor, Sravan Maringanti, the anonymous reviewers and all the PKIX WG for several discussions and comments.  ... 
doi:10.3233/jcs-2010-0401 fatcat:toixn6rwnjh6xgfm6pova5ksle

On the tailoring of CAST-32A certification guidance to real COTS multicore architectures

Irune Agirre, Jaume Abella, Mikel Azkarate-Askasua, Francisco J. Cazorla
2017 2017 12th IEEE International Symposium on Industrial Embedded Systems (SIES)  
the difficulties of the application of CAST-32A to a real multicore processor, the NXP P4080.  ...  Yet, the unpredictable impact on timing of contention in shared hardware resources challenges certification.  ...  ACKNOWLEDGEMENTS This work has been partially supported by the Spanish Ministry of Economy and Competitiveness (MINECO) under grant TIN2015-65316-P and the HiPEAC Network of Excellence.  ... 
doi:10.1109/sies.2017.7993376 dblp:conf/sies/AgirreAAC17 fatcat:kzuqu6bqercmjleerp5sfrtwl4

A Certification Framework for Cloud Security Properties: The Monitoring Path [chapter]

Marina Egea, Khaled Mahbub, George Spanoudakis, Maria Rosa Vieira
2015 Lecture Notes in Computer Science  
In this paper we will focus only on the monitoring case and will illustrate its use.  ...  Such framework will bring service users, service providers and cloud suppliers to work together with certification authorities in order to ensure security properties and certificates validity in the continuously  ...  It watches hosts (processor load, disk usage, . . . ), applications, services, OS, network protocols and is able to provide notifications.  ... 
doi:10.1007/978-3-319-17199-9_3 fatcat:52uv3paybrhdrnjwle5dcil2ca

A review of tools to assess the sustainability in building construction

Abhilash Vijayan, Ashok Kumar
2005 Environmental progress  
Economic Benefits • Reduce operating costs • Enhance asset value and profits • Improve employee productivity and satisfaction • Optimize life-cycle economic performance  ...  ACKNOWLEDGMENTS The authors thank the following people for their guidance and help: Dara Zycherman and the team of LEED; Thomas Piper and the team of Envest; and Rob Nicoll and the team of BASIX.  ...  Figure 1 presents the varied sections in LEED analysis. The certification review process includes the following: 1. Application Submittal.  ... 
doi:10.1002/ep.10065 fatcat:mdo776gwcrgndckbu36jclgkia

HotGrid: Graduated Access to Grid-Based Science Gateways [chapter]

Roy Williams, Conrad Steenberg, Julian Bunn
2005 Lecture Notes in Computer Science  
The secondary purpose of HotGrid is to acclimate a science community to the concepts of certificate use.  ...  Our system provides these weakly authenticated users with immediate power to use the Grid resources for science, but without the dangerous power of running arbitrary code.  ...  The database is also used by the server to enforce certificate time limits. Other resource limits can be enforced e.g. CPU time, disk usage and network bandwidth usage. Fig. 2 .  ... 
doi:10.1007/11508380_10 fatcat:62u7ucjbmbbvhjiii3wjvp5vze

CrowdShare: Secure Mobile Resource Sharing [chapter]

N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, Stanislaus Stelle
2013 Lecture Notes in Computer Science  
In this paper, we present CrowdShare, a complete framework and its (Android) implementation for secure and private resource sharing among nearby devices.  ...  Mobile smart devices and services have become an integral part of our daily life. In this context there are many compelling scenarios for mobile device users to share resources.  ...  This work was supported in part by the German Federal Ministry of Education and Research (BMBF) within EC SPRIDE, and by the Hessian LOEWE excellence initiative within CASED.  ... 
doi:10.1007/978-3-642-38980-1_27 fatcat:lyxz4z35lndfza4an565snrl4i
« Previous Showing results 1 — 15 out of 64,629 results