Bytecode fault injection for Java software.docx
- 文档编号:17963636
- 上传时间:2023-08-05
- 格式:DOCX
- 页数:21
- 大小:39.98KB
Bytecode fault injection for Java software.docx
《Bytecode fault injection for Java software.docx》由会员分享,可在线阅读,更多相关《Bytecode fault injection for Java software.docx(21页珍藏版)》请在冰点文库上搜索。
BytecodefaultinjectionforJavasoftware
Asoftwareengineeringapproachforthedevelopmentofheterogeneousroboticapplications OriginalResearchArticle
RoboticsandComputer-IntegratedManufacturing
JavaTestDriverGenerationfromObject-OrientedInteractionTraces OriginalResearchArticle
ElectronicNotesinTheoreticalComputerScience
CMSsoftwarearchitecture:
Softwareframework,servicesandpersistencyinhighleveltrigger,reconstructionandanalysis OriginalResearchArticle
ComputerPhysicsCommunications
ThispaperdescribesthedesignofaresilientandflexiblesoftwarearchitecturethathasbeendevelopedtosatisfythedataprocessingrequirementsofalargeHEPexperiment,CMS,currentlybeingconstructedattheLHCmachineatCERN.Wedescribevariouscomponentsofasoftwareframeworkthatallowsintegrationofphysicsmodulesandwhichcanbeeasilyadaptedforuseindifferentprocessingenvironmentsbothreal-time(onlinetrigger)andoffline(eventreconstructionandanalysis).Featuressuchasthemechanismsforschedulingalgorithms,configuringtheapplicationandmanagingthedependencesamongmodulesaredescribedindetail.Inparticular,amajorefforthasbeenplacedonprovidingaserviceformanagingpersistentdataandtheexperienceusingacommercialODBMS(Objectivity/DB)isthereforedescribedindetail.
JOLIE:
aJavaOrchestrationLanguageInterpreterEngine OriginalResearchArticle
ElectronicNotesinTheoreticalComputerScience
Serviceorientedcomputingisanemergingparadigmforprogrammingdistributedapplicationsbasedonservices.Servicesaresimplesoftwareelementsthatsupplytheirfunctionalitiesbyexhibitingtheirinterfacesandthatcanbeinvokedbyexploitingsimplecommunicationprimitives.Theemergingmechanismexploitedinserviceorientedcomputingforcomposingservices–inordertoprovidemorecomplexfunctionalities–isbymeansoforchestrators.Anorchestratorisabletoinvokeandcoordinateotherservicesbyexploitingtypicalworkflowpatternssuchasparallelcomposition,sequencingandchoices.ExamplesoforchestrationlanguagesareXLANG[IBM,“XLANG:
WebServicesforBusinessProcessDesign,”andWS-BPEL[OASIS,“WebServicesBusinessProcessExecutionLanguageVersion2.0,WorkingDraft,”http:
//www.oasis-open.org/committees/download.php/10347/wsbpel-specification-draft-120204.htm].InthispaperwepresentJOLIE,aninterpreterandenginefororchestrationprograms.ThemainnoveltiesofJOLIEarethatitprovidesaneasytousedevelopmentenvironment(becauseitsupportsamoreprogrammerfriendlyC/Java-likesyntaxinsteadofanXML-basedsyntax)anditisbasedonasolidmathematicalunderlyingmodel(developedinpreviousworksoftheauthors[N.Busi,R.Gorrieri,C.Guidi,R.LucchiandG.Zavattaro,TowardsaformalframeworkforChoreography,in:
Proc.of3rdInternationalWorkshoponDistributedandMobileCollaboration(DMC2005)(2005),N.Busi,R.Gorrieri,C.Guidi,R.LucchiandG.Zavattaro,Choreographyandorchestrationconformanceforsystemdesign,in:
Proc.of8thInternationalConferenceonCoordinationModelsandLanguages(COORDINATION'06),LNCStoappear,2006,C.GuidiandR.Lucchi,Mobilitymechanismsinserviceorientedcomputing,in:
Proc.of8thInternationalConferenceononFormalMethodsforOpenObject-BasedDistributedSystems(FMOODS'06),LNCStoappear,2006]).
Securemobilebusinessapplications–framework,architectureandimplementation OriginalResearchArticle
InformationSecurityTechnicalReport
EmergingmobiletechnologiessuchasPDAs,laptopsandsmartphonestogetherwithwirelessnetworkingtechnologiessuchasWLANandUMTSpromisetoempowermobileemployeestobecomebetterintegratedintotheircompanies'businessprocesses.However,theactualuptakeofthesetechnologiesisstilltocome;onehindranceissecurityofmobiledevicesandapplications.
Inthiscontributionwepresentanin-depthanalysisofthecurrentsituationenterprisesarefacedwithinthemobilearena,bothfromasecurityandamanagementperspective.Wearguethatthecurrentlypredominantmodelofperimetersecuritywillnotscaleforfuturemobilebusinessapplicationsthatwillrequireappropriateapplication-levelsecuritymechanismstobeinplace.
Wepresentaframeworkofferingsolutionsforthedevelopmentofsecuremobilebusinessapplicationsthattakesintoaccounttheneedforstrongsecuritycredentials,e.g.basedonsmartcards.Thisframeworkconsistsofsoftwareandabstractionsthatallowfortheseparationofthecorebusinesslogicfromthesecuritylogicinapplications.Securitymanagementinstrumentsintheformofenforceableenterprisepoliciesaredefinedwhichtargetthesecurityandtrust-relateddeploymentandconfigurationofmobiledevicesandbusinessapplications.
Thepresentedarchitectureisopen,inthesensethattheactualmobilebusinessapplicationcanspanoverheterogeneousclientdevices,formingaso-calledfederation.
ArticleOutline
1.Introduction
1.1.Securitymodels
1.2.Problemstatement
1.3.Securemobilebusinessapplications
1.4.Contributionsofthiswork
1.5.Outlineofpaper
2.Federationsofmobiledevices–extendingthesecurityperimeter
2.1.Usagescenario-pervasivesalesperson
2.2.Federationsofmobiledevices-definition
2.3.Securityandfederations
3.Applicationsecurityarchitecture-designandimplementation
3.1.ComponentsoftheWiTnessframework
3.2.Applicationmanagement
3.3.Federationmanagement
3.4.Securitylibrariesandmechanisms
3.4.1.Securitylibraries
3.4.2.Securitymoduleandservices
3.5.Securitypolicies
3.5.1.Automatingsecuritypolicies
3.5.2.Attributecertificates
3.5.3.Enforcementofpolicies
3.6.Connector
3.7.Developmentoftheframework
4.Usecase–securemobileworkflow
4.1.Mobileequipmentandclientsoftware
4.2.Applicationserverandcorporateaccesspoint
5.Relatedwork
5.1.SIMcardsasubiquitouscrypto-processors
5.2.Secureplatformformobileapplications
5.3.Trustevaluationofsurroundingdevices
5.4.Securitypoliciesformobileapplications
6.Conclusion
Acknowledgements
References
Developmentofinternet-basedshiptechnicalinformationmanagementsystem
OceanEngineering
Inthispaper,internet-basedshiptechnicalinformationmanagementsystemhasbeendevelopedasameanstoaccumulate,manage,shareandutilizevariousdistributedapplicationsandinformationusedforshipdesignandbuilding.Theinformationmanagedinthesystemisdocumentsfromthewholelifecycleincludingconceptdesign,basicdesign,detaileddesign,construction,operationandmaintenance.Inaddition,usingthedevelopedsystem,integratedsystemframeworkisalsoproposedtointegrateapplicationsanddatabaseinconcurrentengineeringenvironment.
ArticleOutline
1.Introduction
2.IDEframework
2.1.Relatedsystem
2.1.1.IntegratedDataEnvironment(IDE)
2.1.2.IntegratedWeaponSystemDatabase(IWSDB)
2.2.IDEframework
2.2.1.Securitymanagement
2.2.2.Queryprocessing
2.2.3.Systemmanagement
2.2.4.Classificationstructuremanagement
3.Developmentofshiptechnicalinformationmanagementsystem
3.1.Systemconfiguration
3.2.Shiptechnicalinformationmanagementsystem
3.2.1.Developmentenvironmentandtools
3.2.2.Designsupportsystem
3.2.3.Documentmanagementsystem
3.2.4.Projectmanagementsystem
3.2.5.Knowledgemanagementsystem
4.Conclusion
Acknowledgements
References
ConceptEngineerforDSPFWArchitect2G
英飞凌科技有限公司 查看公司简介>>
粉丝团(13)|
公司行业:
电子技术/半导体/集成电路
公司规模:
150-500人
比比你的竞争力
发布日期:
2010-12-22
工作地点:
西安
招聘人数:
若干
工作年限:
三年以上
语言要求:
英语 熟练
学 历:
硕士
Makingsenseofthee-supplychainlandscape:
animplementationframework OriginalResearchArticle
InternationalJournalofInformationManagement
Aframeworkproposalforseamlessinteroperabilityinacollaborativenetworkedenvironment OriginalResearchArticle
ComputersinIndustry
FrameworkforapplicationmanagementwithdynamicaspectsJ-EARScasestudy OriginalResearchArticle
InformationandSoftwareTechnology
Aframeworktoanalyzeinformationsystemsasknowledgeflowfacilitators OriginalResearchArticle
InformationandSoftwareTechnology
AspectralestimationtoolkitforJavaapplications OriginalResearchArticle
ScienceofComputerProgramming
Evaluatingandselectinge-commercesoftwareandcommunicationsystemsforasupplychain OriginalResearchArticle
EuropeanJournalofOperationalResearch
职位描述
JobDescription:
DefinitionanddesignofDSPFirmwarefor2G(GSM,GPRS,EDGE,EDGEEvolution)wirelessbasebandapplications.
Architecturedefinitionfor2GDSPfirmware
Mappingofgiven2GfeaturesandalgorithmstoDSPFWrequirements
BreakdownofrequirementsintoFWcomponents
IdentifyallrelevantFWaspectsina2Gwirelesssystem
DefineschedulingandtaskprioritiesofFWcomponentswithrespecttogivenreal-timeconstraintsandsystemresources(MIPS,memory)ina2Gsystem
ConceptsforpartitioningbetweenHWandFW(HW/FWsplit)
InterfacedefinitionofHWacceleratorblocksforselectedDSPtasks
Planningandselectionofschedulingsoftwareforreal-timeoperationina2Gsystem
VerificationconceptsforDSPFWonblockandsystemlevel
Provideguidelinesforimplementationaspectsofmodemalgorithms(howcanthisalgorithmbeimplemented)
SupportdefinitionanddesignofHWacceleratorblocksforselectedDSPtasks
Requirements:
Ph.DormasterdegreeinElectricalEngineeringwithfocusonCommunicationsEngineering
ExpertknowledgeinDigitalSignalProcessingandCommunicationsEng
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- Bytecode fault injection for Java software