72,925 research outputs found
The Management and Security Expert (MASE)
The Management and Security Expert (MASE) is a distributed expert system that monitors the operating systems and applications of a network. It is capable of gleaning the information provided by the different operating systems in order to optimize hardware and software performance; recognize potential hardware and/or software failure, and either repair the problem before it becomes an emergency, or notify the systems manager of the problem; and monitor applications and known security holes for indications of an intruder or virus. MASE can eradicate much of the guess work of system management
Proxy dynamic delegation in grid gateway
Nowadays one of the main obstacles the research comes up against is the
difficulty in accessing the required computational resources. Grid is able to
offer the user a wide set of resources, even if they are often too hard to
exploit for non expert end user. Use simplification has today become a common
practice in the access and utilization of Cloud, Grid, and data center
resources. With the launch of L-GRID gateway, we introduced a new way to deal
with Grid portals. L-GRID is an extremely light portal developed in order to
access the EGI Grid infrastructure via Web, allowing users to submit their jobs
from whatever Web browser in a few minutes, without any knowledge about the
underlying Grid infrastructure.Comment: 6 page
PCLIPS: Parallel CLIPS
PCLIPS (Parallel CLIPS) is a set of extensions to the C Language Integrated Production System (CLIPS) expert system language. PCLIPS is intended to provide an environment for the development of more complex, extensive expert systems. Multiple CLIPS expert systems are now capable of running simultaneously on separate processors, or separate machines, thus dramatically increasing the scope of solvable tasks within the expert systems. As a tool for parallel processing, PCLIPS allows for an expert system to add to its fact-base information generated by other expert systems, thus allowing systems to assist each other in solving a complex problem. This allows individual expert systems to be more compact and efficient, and thus run faster or on smaller machines
Explaining Violation Traces with Finite State Natural Language Generation Models
An essential element of any verification technique is that of identifying and
communicating to the user, system behaviour which leads to a deviation from the
expected behaviour. Such behaviours are typically made available as long traces
of system actions which would benefit from a natural language explanation of
the trace and especially in the context of business logic level specifications.
In this paper we present a natural language generation model which can be used
to explain such traces. A key idea is that the explanation language is a CNL
that is, formally speaking, regular language susceptible transformations that
can be expressed with finite state machinery. At the same time it admits
various forms of abstraction and simplification which contribute to the
naturalness of explanations that are communicated to the user
The Value of User-Visible Internet Cryptography
Cryptographic mechanisms are used in a wide range of applications, including
email clients, web browsers, document and asset management systems, where
typical users are not cryptography experts. A number of empirical studies have
demonstrated that explicit, user-visible cryptographic mechanisms are not
widely used by non-expert users, and as a result arguments have been made that
cryptographic mechanisms need to be better hidden or embedded in end-user
processes and tools. Other mechanisms, such as HTTPS, have cryptography
built-in and only become visible to the user when a dialogue appears due to a
(potential) problem. This paper surveys deployed and potential technologies in
use, examines the social and legal context of broad classes of users, and from
there, assesses the value and issues for those users
Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption
Nowadays, advanced security mechanisms exist to protect data, systems, and
networks. Most of these mechanisms are effective, and security experts can
handle them to achieve a sufficient level of security for any given system.
However, most of these systems have not been designed with focus on good
usability for the average end user. Today, the average end user often struggles
with understanding and using security mecha-nisms. Other security mechanisms
are simply annoying for end users. As the overall security of any system is
only as strong as the weakest link in this system, bad usability of IT security
mechanisms may result in operating errors, resulting in inse-cure systems.
Buying decisions of end users may be affected by the usability of security
mechanisms. Hence, software provid-ers may decide to better have no security
mechanism then one with a bad usability. Usability of IT security mechanisms is
one of the most underestimated properties of applications and sys-tems. Even IT
security itself is often only an afterthought. Hence, usability of security
mechanisms is often the after-thought of an afterthought. This paper presents
some guide-lines that should help software developers to improve end user
usability of security-related mechanisms, and analyzes com-mon applications
based on these guidelines. Based on these guidelines, the usability of email
encryption is analyzed and an email encryption solution with increased
usability is presented. The approach is based on an automated key and trust
man-agement. The compliance of the proposed email encryption solution with the
presented guidelines for usable security mechanisms is evaluated
Decibell: A novel approach to the ORM software in Java
DeciBell is an open source and free tool developed to tackle in a uniform and structured way the problem of Java and SQL cooperation (available at http://github.com/hampos/DeciBell). In DeciBell, Java classes are related to relational database entities automatically and in a transparent way as far as the background operations are concerned. So, on one hand, non-expert users can work on Java code exclusively while expert ones are able to focus on more algorithmic aspects of the problem they try to solve rather than be wasted with trivial database management issues. In contrast to the existing O.R.M. programs, DeciBell does not require any configuration files or composite query structures, but only a proper annotation of certain fields of the classes. This annotation is carried out by means of the Java Annotations which is a modern trend in Java programming. Among its supported facilities, DeciBell supports primary keys (single and multiple), foreign keys, constraints, one-to-one, one- to-many, and many-to-many relations and all these using pure Java predicates and no SQL or other Query Languages
- …