2,657 research outputs found
Recommended from our members
An architecture for certification-aware service discovery
Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust domain (e.g., a single organization). Also, some of the key promises of service-orientation - such as the dynamic orchestration of externally provided software services, using runtime service discovery and deployment - are still unachieved. One of the main reasons for this is the trust gap that normally arises when software services, offered by previously unknown providers, are to be selected at run-time, without any human intervention. To close this gap, the concept of machine-readable security certificates (called asserts) has been recently introduced, which paves the way to automated processing about security properties of services. Similarly to current security certification schemes, the assessment of the security properties of a service is delegated to an independent third party (certification authority), who issues a corresponding assert, bound to the service. In this paper, we propose an architecture, which exploits the assert concept to realise a certification-aware service discovery framework. The architecture supports the discovery of single services based on certified security properties (in additional to the usual functional properties), as well as the dynamic synthesis of service compositions, that satisfy the given security properties. The architecture is extensible, thus allowing for a range of domain specific matchmaking components, to cover dimensions related to, e.g., performance, cost and other non-functional characteristics
Impact assessment for vulnerabilities in open-source software libraries
Software applications integrate more and more open-source software (OSS) to
benefit from code reuse. As a drawback, each vulnerability discovered in
bundled OSS potentially affects the application. Upon the disclosure of every
new vulnerability, the application vendor has to decide whether it is
exploitable in his particular usage context, hence, whether users require an
urgent application patch containing a non-vulnerable version of the OSS.
Current decision making is mostly based on high-level vulnerability
descriptions and expert knowledge, thus, effort intense and error prone. This
paper proposes a pragmatic approach to facilitate the impact assessment,
describes a proof-of-concept for Java, and examines one example vulnerability
as case study. The approach is independent from specific kinds of
vulnerabilities or programming languages and can deliver immediate results
Vulnerable Open Source Dependencies: Counting Those That Matter
BACKGROUND: Vulnerable dependencies are a known problem in today's
open-source software ecosystems because OSS libraries are highly interconnected
and developers do not always update their dependencies. AIMS: In this paper we
aim to present a precise methodology, that combines the code-based analysis of
patches with information on build, test, update dates, and group extracted from
the very code repository, and therefore, caters to the needs of industrial
practice for correct allocation of development and audit resources. METHOD: To
understand the industrial impact of the proposed methodology, we considered the
200 most popular OSS Java libraries used by SAP in its own software. Our
analysis included 10905 distinct GAVs (group, artifact, version) when
considering all the library versions. RESULTS: We found that about 20% of the
dependencies affected by a known vulnerability are not deployed, and therefore,
they do not represent a danger to the analyzed library because they cannot be
exploited in practice. Developers of the analyzed libraries are able to fix
(and actually responsible for) 82% of the deployed vulnerable dependencies. The
vast majority (81%) of vulnerable dependencies may be fixed by simply updating
to a new version, while 1% of the vulnerable dependencies in our sample are
halted, and therefore, potentially require a costly mitigation strategy.
CONCLUSIONS: Our case study shows that the correct counting allows software
development companies to receive actionable information about their library
dependencies, and therefore, correctly allocate costly development and audit
resources, which is spent inefficiently in case of distorted measurements.Comment: This is a pre-print of the paper that appears, with the same title,
in the proceedings of the 12th International Symposium on Empirical Software
Engineering and Measurement, 201
Étude exploratoire sur le vécu et les besoins de la famille du patient suivi en psychiatrie 1
Modernità, storia, libertà e gracia. Ciò che mi ha insegnato (sino ad ora) Vico
Traducción del italiano por María José Rebollo Espinosa.Esta contribución evidencia algunos aspectos del pensamiento de Vico que han marcado al Autor: el rol
de iniciador de una “diversa modernidad”, la historia como único lugar para una “teología filosófica”, y la relación
entre libertad y providencia. Para el Autor el pensamiento viquiano se presenta antimonolítico, rico, compuesto y
variado como para huir de toda reconducción dentro de estrecheces historiográficas fijas.This contribution highlights some aspects of Vico’s thought that have marked the author: the role of initiator
of a “diverse modernity”, history as the only place for a “philosophical theology”, and the relationship
between freedom and providence. According to the Author, Viquian thought shows up as antimonolitic, rich, composed
and varied, escaping any reconduction within fixed historiographic constraints.In questo contributo si evidenziano alcuni aspetti del pensiero di Vico che hanno profondamente segnato
l’Autore: il ruolo di iniziatore di una “modernità altra”, la storia come unico luogo per una “teologia filosofica”
e il rapporto tra libertà e provvidenza. Per l’Autore, il pensiero vichiano appare antimonolitico, ricco, articolato
e vario, tanto da sfuggire a qualsiasi tentativo di riconduzione entro limiti storiografici prestabiliti
Numerical and experimental analysis of the leaning Tower of Pisa under earthquake
Twenty years have passed from the most recent studies about the dynamic behavior of the leaning Tower of Pisa. Significant changes have occurred in the meantime, the most important ones concerning the soil-structure interaction. From 1999 to 2001, the foundation of the monument was consolidated through under-excavation, and the "Catino" at the basement was rigidly connected to the foundation. Moreover, in light of the recent advances in the field of earthquake engineering, past studies about the Tower must be revised. Therefore, the present research aims at providing new data and results about the structural response of the Tower under earthquake. As regards the experimental assessment of the Tower, the dynamic response of the structure recorded during some earthquakes has been analyzed in the time- and frequency-domain. An Array 2D test has been performed in the Square of Miracles to identify a soil profile suitable for site response analyses, thus allowing the definition of the free-field seismic inputs at the base of the Tower. On the other hand, a synthetic evaluation of the seismic input in terms of response spectra has been done by means of a hybrid approach that combines Probabilistic and Deterministic Seismic Hazard Assessment methods. Furthermore, natural accelerograms have been selected and scaled properly. A finite element model that takes into account the inclination of the structure has been elaborated, and it has been updated taking into account the available experimental results. Finally, current numerical and experimental efforts for enhancing the seismic characterization of the Tower have been illustrated
- …
