1,558 research outputs found

    Adaptive object management for distributed systems

    Get PDF
    This thesis describes an architecture supporting the management of pluggable software components and evaluates it against the requirement for an enterprise integration platform for the manufacturing and petrochemical industries. In a distributed environment, we need mechanisms to manage objects and their interactions. At the least, we must be able to create objects in different processes on different nodes; we must be able to link them together so that they can pass messages to each other across the network; and we must deliver their messages in a timely and reliable manner. Object based environments which support these services already exist, for example ANSAware(ANSA, 1989), DEC's Objectbroker(ACA,1992), Iona's Orbix(Orbix,1994)Yet such environments provide limited support for composing applications from pluggable components. Pluggability is the ability to install and configure a component into an environment dynamically when the component is used, without specifying static dependencies between components when they are produced. Pluggability is supported to a degree by dynamic binding. Components may be programmed to import references to other components and to explore their interfaces at runtime, without using static type dependencies. Yet thus overloads the component with the responsibility to explore bindings. What is still generally missing is an efficient general-purpose binding model for managing bindings between independently produced components. In addition, existing environments provide no clear strategy for dealing with fine grained objects. The overhead of runtime binding and remote messaging will severely reduce performance where there are a lot of objects with complex patterns of interaction. We need an adaptive approach to managing configurations of pluggable components according to the needs and constraints of the environment. Management is made difficult by embedding bindings in component implementations and by relying on strong typing as the only means of verifying and validating bindings. To solve these problems we have built a set of configuration tools on top of an existing distributed support environment. Specification tools facilitate the construction of independent pluggable components. Visual composition tools facilitate the configuration of components into applications and the verification of composite behaviours. A configuration model is constructed which maintains the environmental state. Adaptive management is made possible by changing the management policy according to this state. Such policy changes affect the location of objects, their bindings, and the choice of messaging system

    The Influence of Architectural Styles on Security, Using the Example of a Certification Authority

    Full text link
    Often, security is considered in an advanced stage of the implementation of a system, rather than integrating it into the system design. This leads to less secure systems, as the security mechanisms are only applied as an afterthought and therefore do not integrate well with the rest of the design. Also, several statistics about discovered vulnerabilities in existing systems suggest, that most of the vulnerabilities of a system are not caused by errors in the cryptographic primitives, but in other parts of the implementation. So integrating security concerns early in the design process seems a promising approach for increasing the security of the resulting system. This work evaluates how the choice of the architectural style affects the security of the resulting system. The evaluation is done on the example of an existing certification authority (CA). The requirements for the system are gathered and multiple designs according to different architectural styles are drafted and evaluated using a risk evaluation method. Then the evaluated designs are compared to find out whether there are significant differences.Comment: Study Thesi

    Resilience support in software-defined networking:a survey

    Get PDF
    Software-defined networking (SDN) is an architecture for computer networking that provides a clear separation between network control functions and forwarding operations. The abstractions supported by this architecture are intended to simplify the implementation of several tasks that are critical to network operation, such as routing and network management. Computer networks have an increasingly important societal role, requiring them to be resilient to a range of challenges. Previously, research into network resilience has focused on the mitigation of several types of challenges, such as natural disasters and attacks. Capitalizing on its benefits, including increased programmability and a clearer separation of concerns, significant attention has recently focused on the development of resilience mechanisms that use software-defined networking approaches. In this article, we present a survey that provides a structured overview of the resilience support that currently exists in this important area. We categorize the most recent research on this topic with respect to a number of resilience disciplines. Additionally, we discuss the lessons learned from this investigation, highlight the main challenges faced by SDNs moving forward, and outline the research trends in terms of solutions to mitigate these challenges

    Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection

    Get PDF
    The Federal Communications Commission (FCC) recently proposed an Internet nondiscrimination rule: Subject to reasonable network management, a provider of broadband Internet access service must treat lawful content, applications, and services in a nondiscriminatory manner. Among other requests, the FCC sought comment on whether the proposed nondiscrimination rule would promote free speech, civic participation, and democratic engagement, and whether it would impose any burdens on access providers\u27 speech that would be cognizable for purposes of the First Amendment. The purpose of this Article is to suggest that a wide range of responses to these First Amendment questions, offered by telecommunications providers and civil society groups alike, have glossed over a fundamental question: whether the activities of broadband Internet providers are sufficiently imbued with speech or expressive conduct to warrant protection under the First Amendment in the first place. Interestingly, it is not only those who argue against governmental regulation who make this threshold mistake. Those who argue for the importance of imposing nondiscrimination and common carriage rules upon telecommunications providers also, in their eagerness to open up a conversation about the values of free speech in the age of the Internet, pay little attention to this preliminary question. Yet if this question is not resolved, any subsequent analysis of those who facilitate Internet-based telecommunications will necessarily rest on an incoherent and insufficiently considered definition of the speech that is at the heart of First Amendment concerns. This Article analyzes the FCC\u27s proposed nondiscrimination rule with an eye towards whether the rule affects the speech or expressive conduct of broadband providers in a manner that is cognizable for First Amendment purposes. Discussion of the values, free speech theories, policies, investment incentives, and economic and governmental interests underlying the resolution of this claim--values emphasized by the vast majority of parties engaged in the network neutrality debate, at significant cost to the clarity of constitutional elements--are deferred pending the evaluation of this threshold question

    Keep your friends close, and your enemies closer: Turkey and Israel's approaches to incorporation of religion

    Full text link
    In contemporary world affairs, it is seemingly impossible to separate religion from politics. Turkey and Israel are often pointed to as states that still struggle with balancing religious and secular forces. Both Turkey and Israel's independence era leaders desired secular, modern republics, looking to French laicism as a method to subordinate religion from the state, but unlike France, neither was able to accomplish this goal. How did this come to be? I argue that the compromises of Turkish and Israeli independence-era secular leaders with religious advocacy coalitions which established Religious Ministries as a quick policy solution inadvertently paved the way for religion to exert a central influence. Through such ministries, religious groups were able to enshrine particular strains of Islam and Judaism along with their particular conceptions of citizenship based on ethno-religious grounds in place of initial republican ideals. This pull between rival definitions of citizenship--secular and religious--would go on to define debates for decades. Using the complementary lenses of historical and discursive institutionalism I will trace the processes by which particular conceptualizations of citizenship were reached by advocacy coalitions of secular and conservative forces, how these philosophies became the basis for institutions, and how those institutions went on to constrain future interpretations

    Frameworks for enhancing temporal interface behaviour through software architectural design

    Get PDF
    The work reported in this thesis is concerned with understanding aspects of temporal behaviour. A large part of the thesis is based on analytical studies of temporal properties and interface and architectural concerns. The main areas covered include: i. analysing long-term human processes and the impact of interruptions and delays ii. investigating how infrastructures can be designed to support synchronous fast pace activity iii.design of the Getting-to-Know (GtK) experimental notification server The work is motivated by the failure of many collaborative systems to effectively manage the temporal behaviour at the interface level, as they often assume that the interaction is taking place over fast, reliable local area networks. However, the Web has challenged this assumption and users are faced with frequent network-related delays. The nature of cooperative work increases the importance of timing issues. Collaborative users require both rapid feedback of their own actions and timely feedthrough of other actions. Although it may appear that software architectures are about the internals of system design and not a necessary concern for the user interface, internal details do show up at the surface in non-functional aspects, such as timing. The focus of this work is on understanding the behavioural aspects and how they are influenced by the infrastructure. The thesis has contributed to several areas of research: (a)the study of long-term work processes generated a trigger analysis technique for task decomposition in HCI (b)the analysis of architectures was later applied to investigate architectural options for mobile interfaces (c)the framework for notification servers commenced a design vocabulary in CSCW for the implementation of notification services, with the aim of improving design (d)the impedance matching framework facilitate both goal-directed feedthrough and awareness In particular, (c) and (d) have been exercised in the development of the GtK separable notification server

    Practical Encryption Gateways to Integrate Legacy Industrial Machinery

    Get PDF
    Future industrial networks will consist of a mixture of old and new components, due to the very long life-cycles of industrial machines on the one hand and the need to change in the face of trends like Industry 4.0 or the industrial Internet of things on the other. These networks will be very heterogeneous and will serve legacy as well as new use cases in parallel. This will result in an increased demand for network security and precisely within this domain, this thesis tries to answer one specific question: how to make it possible for legacy industrial machines to run securely in those future heterogeneous industrial networks. The need for such a solution arises from the fact, that legacy machines are very outdated and hence vulnerable systems, when assessing them from an IT security standpoint. For various reasons, they cannot be easily replaced or upgraded and with the opening up of industrial networks to the Internet, they become prime attack targets. The only way to provide security for them, is by protecting their network traffic. The concept of encryption gateways forms the basis of our solution. These are special network devices, that are put between the legacy machine and the network. The gateways encrypt data traffic from the machine before it is put on the network and decrypt traffic coming from the network accordingly. This results in a separation of the machine from the network by virtue of only decrypting and passing through traffic from other authenticated gateways. In effect, they protect communication data in transit and shield the legacy machines from potential attackers within the rest of the network, while at the same time retaining their functionality. Additionally, through the specific placement of gateways inside the network, fine-grained security policies become possible. This approach can reduce the attack surface of the industrial network as a whole considerably. As a concept, this idea is straight forward and not new. Yet, the devil is in the details and no solution specifically tailored to the needs of the industrial environment and its legacy components existed prior to this work. Therefore, we present in this thesis concrete building blocks in the direction of a generally applicable encryption gateway solution that allows to securely integrate legacy industrial machinery and respects industrial requirements. This not only entails works in the direction of network security, but also includes works in the direction of guaranteeing the availability of the communication links that are protected by the gateways, works to simplify the usability of the gateways as well as the management of industrial data flows by the gateways
    • …
    corecore