1,111 research outputs found
Implementing Session Centered Calculi
Recently, specific attention has been devoted to the development of service oriented process calculi. Besides the foundational aspects, it is also interesting to have prototype implementations for them in order to assess usability and to minimize the gap between theory and practice. Typically, these implementations are done in Java taking advantage of its mechanisms supporting network applications. However, most of the recurrent features of service oriented applications are re-implemented from scratch. In this paper we show how to implement a service oriented calculus, CaSPiS (Calculus of Services with Pipelines and Sessions) using the Java framework IMC, where recurrent mechanisms for network applications are already provided. By using the session oriented and pattern matching communication mechanisms provided by IMC, it is relatively simple to implement in Java all CaSPiS abstractions and thus to easily write the implementation in Java of a CaSPiS process
Encrypted Shared Data Spaces
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approaches focus on access control mechanisms that protect the data space from untrusted agents. The basic assumption is that the hosts (and their administrators) where the data space is deployed have to be trusted. Encryption schemes can be used to protect the data space content from malicious hosts. However, these schemes do not allow searching on encrypted data. In this paper we present a novel encryption scheme that allows tuple matching on completely encrypted tuples. Since the data space does not need to decrypt tuples to perform the search, tuple confidentiality can be guaranteed even when the data space is deployed on malicious hosts (or an adversary gains access to the host). Our scheme does not require authorised agents to share keys for inserting and retrieving tuples. Each authorised agent can encrypt, decrypt, and search encrypted tuples without having to know other agents’ keys. This is beneficial inasmuch as it simplifies the task of key management. An implementation of an encrypted data space based on this scheme is described and some preliminary performance results are given
Network-aware Evaluation Environment for Reputation Systems
Parties of reputation systems rate each other and use ratings to compute reputation scores that drive their interactions. When deciding which reputation model to deploy in a network environment, it is important to find the
most suitable model and to determine its right initial configuration. This calls for an engineering approach for describing, implementing and evaluating reputation
systems while taking into account specific aspects of both the reputation systems and the networked environment where they will run. We present a software tool (NEVER) for network-aware evaluation of reputation systems and their rapid prototyping through experiments performed according to user-specified parameters. To demonstrate effectiveness of NEVER, we analyse reputation models based on the beta distribution and the maximum likelihood estimation
A Java Middleware for Guaranteeing Privacy of Distributed Tuple Spaces
The tuple space communication model, such as the one used in Linda, provides great flexibility for modeling concurrent, distributed and mobile processes. In a distributed setting with mobile agents, particular attention is needed for protecting sites and information. We have designed and developed a Java middleware, Klava, for implementing distributed tuple spaces and operations to support agent interaction and mobility. In this paper, we extend the Klava middleware with cryptographic primitives that enable encryption and decryption of tuple fields. We describe the actual implementation of the new primitives and provide a few examples. The proposed extension is general enough to be applied to similar Java frameworks using multiple distributed tuples spaces possibly dealing with mobility
A Taxonomy of Workflow Management Systems for Grid Computing
With the advent of Grid and application technologies, scientists and
engineers are building more and more complex applications to manage and process
large data sets, and execute scientific experiments on distributed resources.
Such application scenarios require means for composing and executing complex
workflows. Therefore, many efforts have been made towards the development of
workflow management systems for Grid computing. In this paper, we propose a
taxonomy that characterizes and classifies various approaches for building and
executing workflows on Grids. We also survey several representative Grid
workflow systems developed by various projects world-wide to demonstrate the
comprehensiveness of the taxonomy. The taxonomy not only highlights the design
and engineering similarities and differences of state-of-the-art in Grid
workflow systems, but also identifies the areas that need further research.Comment: 29 pages, 15 figure
Predicting global usages of resources endowed with local policies
The effective usages of computational resources are a primary concern of
up-to-date distributed applications. In this paper, we present a methodology to
reason about resource usages (acquisition, release, revision, ...), and
therefore the proposed approach enables to predict bad usages of resources.
Keeping in mind the interplay between local and global information occurring in
the application-resource interactions, we model resources as entities with
local policies and global properties governing the overall interactions.
Formally, our model takes the shape of an extension of pi-calculus with
primitives to manage resources. We develop a Control Flow Analysis computing a
static approximation of process behaviour and therefore of the resource usages.Comment: In Proceedings FOCLASA 2011, arXiv:1107.584
Design hazard identification and the link to site experience
The training, development and routes to charteredship of building design engineers have undergone a major transformation in recent years. Additionally, the duration and quality of site experience being gained by designers is reducing. While accident causation is often complex, previous research shows a potential link between design and construction accidents. The effectiveness of the UK’s Construction (Design and Management) (CDM) Regulations is being questioned, and designers regularly do not recognise the impact they can make on site safety. A newly developed hazard perception test was used to determine if students and design practitioners are able to identify hazards in designs and to establish if site experience impacts hazard identification. The results of the tests show an association between the ability to identify and mitigate hazards and possession of site experience. The results provide empirical evidence that supports previous anecdotal evidence. The results also question if the design engineers of today are suitably equipped to fulfil the designer’s responsibilities under the CDM Regulations
History-sensitive versus future-sensitive approaches to security in distributed systems
We consider the use of aspect-oriented techniques as a flexible way to deal
with security policies in distributed systems. Recent work suggests to use
aspects for analysing the future behaviour of programs and to make access
control decisions based on this; this gives the flavour of dealing with
information flow rather than mere access control. We show in this paper that it
is beneficial to augment this approach with history-based components as is the
traditional approach in reference monitor-based approaches to mandatory access
control. Our developments are performed in an aspect-oriented coordination
language aiming to describe the Bell-LaPadula policy as elegantly as possible.
Furthermore, the resulting language has the capability of combining both
history- and future-sensitive policies, providing even more flexibility and
power.Comment: In Proceedings ICE 2010, arXiv:1010.530
Flexible and dynamic replication control for interdependent distributed real-time embedded systems
Replication is a proven concept for increasing the availability of distributed
systems. However, actively replicating every software component in distributed
embedded systems may not be a feasible approach. Not only the available
resources are often limited, but also the imposed overhead could significantly degrade
the system’s performance.
This paper proposes heuristics to dynamically determine which components to
replicate based on their significance to the system as a whole, its consequent
number of passive replicas, and where to place those replicas in the network. The
activation of passive replicas is coordinated through a fast convergence protocol
that reduces the complexity of the needed interactions among nodes until a new
collective global service solution is determined
Genome-wide association study identifies loci associated with liability to alcohol and drug dependence that is associated with variability in reward-related ventral striatum activity in African- and European-Americans.
Genetic influences on alcohol and drug dependence partially overlap, however, specific loci underlying this overlap remain unclear. We conducted a genome-wide association study (GWAS) of a phenotype representing alcohol or illicit drug dependence (ANYDEP) among 7291 European-Americans (EA; 2927 cases) and 3132 African-Americans (AA: 1315 cases) participating in the family-based Collaborative Study on the Genetics of Alcoholism. ANYDEP was heritable (h 2 in EA = 0.60, AA = 0.37). The AA GWAS identified three regions with genome-wide significant (GWS; P < 5E-08) single nucleotide polymorphisms (SNPs) on chromosomes 3 (rs34066662, rs58801820) and 13 (rs75168521, rs78886294), and an insertion-deletion on chromosome 5 (chr5:141988181). No polymorphisms reached GWS in the EA. One GWS region (chromosome 1: rs1890881) emerged from a trans-ancestral meta-analysis (EA + AA) of ANYDEP, and was attributable to alcohol dependence in both samples. Four genes (AA: CRKL, DZIP3, SBK3; EA: P2RX6) and four sets of genes were significantly enriched within biological pathways for hemostasis and signal transduction. GWS signals did not replicate in two independent samples but there was weak evidence for association between rs1890881 and alcohol intake in the UK Biobank. Among 118 AA and 481 EA individuals from the Duke Neurogenetics Study, rs75168521 and rs1890881 genotypes were associated with variability in reward-related ventral striatum activation. This study identified novel loci for substance dependence and provides preliminary evidence that these variants are also associated with individual differences in neural reward reactivity. Gene discovery efforts in non-European samples with distinct patterns of substance use may lead to the identification of novel ancestry-specific genetic markers of risk
- …
