Search For:

Displaying 1-50 out of 111 total
Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade
Found in: Foundations of Intrusion Tolerant Systems
By Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, Jonathan Walpole
Issue Date:December 2003
pp. 227
Buffer overflows have been the most common form of security vulnerability for the last ten years. More over, buffer overflow vulnerabilities dominate the area of remote network penetration vulnerabilities, where an anonymous Internet user seeks to gain par...
 
Services Computing in Daily Work: Service Engineering vs. Software Engineering
Found in: Web Services, IEEE International Conference on
By Hemant Jain, Calton Pu, Sridhar Iyengar, Brian Blake, Carl K. Chang
Issue Date:July 2007
pp. xxxii
Today, more and more software are augmented with service-oriented packaging. At the same time, more and more business and government services are provided and offered in the form of software. However, there are debates on whether and how much service engin...
   
Categorization and Optimization of Synchronization Dependencies in Business Processes
Found in: Data Engineering, International Conference on
By Qinyi Wu, Calton Pu, Akhil Sahai, Roger Barga
Issue Date:April 2007
pp. 306-315
The current approach for modeling synchronization in business processes relies on sequencing constructs, such as sequence, parallel etc. However, sequencing constructs obfuscate the true source of dependencies in a business process. Moreover, because of th...
 
Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade
Found in: DARPA Information Survivability Conference and Exposition,
By Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, Jonathan Walpole
Issue Date:January 2000
pp. 1119
Buffer overflows have been the most common form of security vulnerability for the last ten years. More over, buffer overflow vulnerabilities dominate the area of remote network penetration vulnerabilities, where an anonymous Internet user seeks to gain par...
 
A Secure Information Flow Architecture for Web Service Platforms
Found in: IEEE Transactions on Services Computing
By Jinpeng Wei, Lenin Singaravelu, Calton Pu
Issue Date:April 2008
pp. 75-87
Current web service platforms (WSPs) often perform all web services-related processing, including security-sensitive information handling, in the same protection domain. Consequently, the entire WSP may have access to security-sensitive information, forcin...
 
An Observation-Based Approach to Performance Characterization of Distributed n-Tier Applications
Found in: IEEE Workload Characterization Symposium
By Calton Pu, Akhil Sahai, Jason Parekh, Gueyoung Jung, Ji Bae, You-Kyung Cha, Timothy Garcia, Danesh Irani, Jae Lee, Qifeng Lin
Issue Date:September 2007
pp. 161-170
The characterization of distributed n-tier application performance is an important and challenging problem due to their complex structure and the significant variations in their workload. Theoretical models have difficulties with such wide range of environ...
 
AESON: A Model-Driven and Fault Tolerant Composite Deployment Runtime for IaaS Clouds
Found in: 2013 IEEE International Conference on Services Computing (SCC)
By Deepal Jayasinghe,Calton Pu,Fabio Oliveira,Florian Rosenberg,Tamar Eilam
Issue Date:June 2013
pp. 575-582
Infrastructure-as-a-Service (IaaS) cloud environments expose to users the infrastructure of a data center while relieving them from the burden and costs associated with its management and maintenance. IaaS clouds provide an interface by means of which user...
 
Variations in Performance Measurements of Multi-core Processors: A Study of n-Tier Applications
Found in: 2013 IEEE International Conference on Services Computing (SCC)
By Junhee Park,Qingyang Wang,Deepal Jayasinghe,Jack Li,Yasuhiko Kanemasa,Masazumi Matsubara,Daisaku Yokoyama,Masaru Kitsuregawa,Calton Pu
Issue Date:June 2013
pp. 336-343
The prevalence of multi-core processors has raised the question of whether applications can use the increasing number of cores efficiently in order to provide predictable quality of service (QoS). In this paper, we study the horizontal scalability of n-tie...
 
Web Services Composition through Data Events Approach
Found in: 2013 IEEE International Conference on Services Computing (SCC)
By Mauricio Chui Rodrigues,Joao Eduardo Ferreira,Calton Pu
Issue Date:June 2013
pp. 320-327
Despite the success of orchestration and choreography for Web services composition, there are still challenges to be overcome such as the difficulty for management of complex control-flow executions, the communication cost associated with service interacti...
 
Revisiting Performance Interference among Consolidated n-Tier Applications: Sharing is Better Than Isolation
Found in: 2013 IEEE International Conference on Services Computing (SCC)
By Yasuhiko Kanemasa,Qingyang Wang,Jack Li,Masazumi Matsubara,Calton Pu
Issue Date:June 2013
pp. 136-143
Performance unpredictability is one of the major concerns slowing down the migration of mission-critical applications into cloud computing infrastructures. An example of non-intuitive result is the measured n-tier application performance in a virtualized e...
 
Performance Analysis of Parallel Processing Systems with Horizontal Decomposition
Found in: 2012 IEEE International Conference on Cluster Computing (CLUSTER)
By Hanwei Chen,Jianwei Yin,Calton Pu
Issue Date:September 2012
pp. 220-229
Parallel processing is an important pattern in cluster systems. To analyze the performance of parallel processing systems, we leveraged the fork-join queueing network (FJQN) models. However, there are no easy solutions to these models, especially for the m...
 
Expertus: A Generator Approach to Automate Performance Testing in IaaS Clouds
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Deepal Jayasinghe,Galen Swint,Simon Malkowski,Jack Li,Qingyang Wang,Junhee Park,Calton Pu
Issue Date:June 2012
pp. 115-122
Cloud computing is an emerging technology paradigm that revolutionizes the computing landscape by providing on-demand delivery of software, platform, and infrastructure over the Internet. Yet, architecting, deploying, and configuring enterprise application...
 
Challenges and Opportunities in Consolidation at High Resource Utilization: Non-monotonic Response Time Variations in n-Tier Applications
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Simon Malkowski,Yasuhiko Kanemasa,Hanwei Chen,Masao Yamamoto,Qingyang Wang,Deepal Jayasinghe,Calton Pu,Motoyuki Kawaba
Issue Date:June 2012
pp. 162-169
A central goal of cloud computing is high resource utilization through hardware sharing; however, utilization often remains modest in practice due to the challenges in predicting consolidated application performance accurately. We present a thorough experi...
 
Transactional Recovery Support for Robust Exception Handling in Business Process Services
Found in: 2012 IEEE 19th International Conference on Web Services (ICWS)
By Joao E. Ferreira,Kelly R. Braghetto,Osvaldo K. Takai,Calton Pu
Issue Date:June 2012
pp. 303-310
Building mission critical applications and services (e.g. e-commerce) using process-oriented approaches has had successes and difficulties. These applications automated successfully the important frequent cases such as purchases, but the code needed for ha...
 
Modeling the Runtime Integrity of Cloud Servers: A Scoped Invariant Perspective
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Jinpeng Wei, Calton Pu, Carlos V. Rozas, Anand Rajan, Feng Zhu
Issue Date:December 2010
pp. 651-658
One of the underpinnings of Cloud Computing security is the runtime integrity of individual Cloud servers. Due to the on-going discovery of runtime software vulnerabilities like buffer overflows, it is critical to be able to gauge the integrity of a Cloud ...
 
A Summary of Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities
Found in: Granular Computing, IEEE International Conference on
By Steve Webb, James Caverlee, Calton Pu
Issue Date:August 2010
pp. 39-40
Online social networking communities are connecting hundreds of millions of individuals across the globe and facilitating new modes of interaction. Due to their immense popularity, an important question is whether these communities are safe for their users...
 
Towards Flexible Event-Handling in Workflows through Data States
Found in: Services, IEEE Congress on
By João E. Ferreira, Qinyi Wu, Simon Malkowski, Calton Pu
Issue Date:July 2010
pp. 344-351
Despite recent advances in many real-time and workflow management systems (WFMS), event-handling is still a manual or semi-automated task. The integration of automated event processing with workflows remains an open research challenge to both academic and ...
 
A Link Obfuscation Service to Detect Webbots
Found in: Services Computing, IEEE International Conference on
By Douglas Brewer, Kang Li, Laksmish Ramaswamy, Calton Pu
Issue Date:July 2010
pp. 433-440
Web bot fraud activity currently accounts for a large number of web accesses. Current resistance methods such as CAPTCHA are not applicable for bot detection at the granularity of each click. In this paper, we propose a service that counters web bots which...
 
Performance and availability aware regeneration for cloud based multitier applications
Found in: Dependable Systems and Networks, International Conference on
By Gueyoung Jung, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, Calton Pu
Issue Date:July 2010
pp. 497-506
Virtual machine technology enables agile system deployments in which software components can be cheaply moved, replicated, and allocated hardware resources in a controlled fashion. This paper examines how these facilities can be used to provide enhanced so...
 
A partial persistent data structure to support consistency in real-time collaborative editing
Found in: Data Engineering, International Conference on
By Qinyi Wu, Calton Pu, Joao Eduardo Ferreira
Issue Date:March 2010
pp. 776-779
Co-authored documents are becoming increasingly important for knowledge representation and sharing. Tools for supporting document co-authoring are expected to satisfy two requirements: 1) querying changes over editing histories; 2) maintaining data consist...
 
A Petri Net Siphon Based Solution to Protocol-Level Service Composition Mismatches
Found in: Web Services, IEEE International Conference on
By Pengcheng Xiong, Mengchu Zhou, Calton Pu
Issue Date:July 2009
pp. 952-958
Protocol-level mismatch is one of the most important problems in service composition. The commonly used reachability exploration method focuses on verifying deadlock-freeness. When this property is violated, the states and traces in the reachability graph ...
 
A Dependable ESB Framework for Service Integration
Found in: IEEE Internet Computing
By Jianwei Yin, Hanwei Chen, Shuiguang Deng, Zhaohui Wu, Calton Pu
Issue Date:March 2009
pp. 26-34
Service integration is an important issue in service-oriented computing. As an infrastructure for service-oriented architectures, the enterprise service bus (ESB) has been regarded as a promising way to support dynamic and agile service integration in dist...
 
A General Proximity Privacy Principle
Found in: Data Engineering, International Conference on
By Ting Wang, Shicong Meng, Bhuvan Bamba, Ling Liu, Calton Pu
Issue Date:April 2009
pp. 1279-1282
As an important privacy threat in anonymized data publication, the proximity breach is gaining increasing attention recently. Such breach occurs when an adversary concludes with high confidence that the sensitive value of a victim individual falls in a set...
 
A Secure Information Flow Architecture for Web Services
Found in: Services Computing, IEEE International Conference on
By Lenin Singaravelu, Jinpeng Wei, Calton Pu
Issue Date:July 2008
pp. 182-189
Current web service platforms (WSPs) often perform all web services-related processing, including security-sensitive information handling, in the same protection domain. Consequently, the entire WSP may have access to security-sensitive information such as...
 
Fine-Grain, End-to-End Security for Web Service Compositions
Found in: Services Computing, IEEE International Conference on
By Lenin Singaravelu, Calton Pu
Issue Date:July 2007
pp. 212-219
Web service composition introduces two research challenges to end-to-end integrity and confidentiality of information flow. First, component services need the ability to selectively read or modify information flows. Second, component web services may or ma...
 
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks
Found in: Dependable Systems and Networks, International Conference on
By Jinpeng Wei, Calton Pu
Issue Date:June 2007
pp. 358-367
Attacks exploiting race conditions have been considered rare and
 
A Multimedia-Specific Approach to WS-Agreement
Found in: Web Services, European Conference on
By Wilfried Jouve, Julien Lancia, Charles Consel, Calton Pu
Issue Date:December 2006
pp. 44-52
WS-Agreement offers a general language and protocol to establish agreements between two parties. In principle, this generality enables a wide variety of domains to be covered. Yet, agreement terms need to be developed for each domain, to allow specific req...
 
DSCWeaver: Synchronization-Constraint Aspect Extension to Procedural Process Specification Languages
Found in: Web Services, IEEE International Conference on
By Qinyi Wu, Calton Pu, Akhil Sahai, Roger Barga, Gueyoung Jung
Issue Date:September 2006
pp. 320-330
BPEL is emerging as an open-standards language for Web service composition. However, its procedural style can lead to inflexible and tangled code for managing a crosscutting aspect ? synchronization constraints that define permissible sequences of executio...
 
Large Scale Order Processing through Navigation Plan Concept
Found in: Services Computing, IEEE International Conference on
By Joao Eduardo Ferreira, Osvaldo K. Takai, Kelly R. Braghetto, Calton Pu
Issue Date:September 2006
pp. 297-300
Order processing is an important application on Services Computing. On the conceptual side, business process management helps model such applications. On the practical side, workflow systems help implement such systems. We propose the Navigation Plan conce...
 
Achieving Efficiency and Portability in Systems Software: A Case Study on POSIX-Compliant Multithreaded Programs
Found in: IEEE Transactions on Software Engineering
By Yasushi Shinjo, Calton Pu
Issue Date:September 2005
pp. 785-800
Portable (standards-compliant) systems software is usually associated with unavoidable overhead from the standards-prescribed interface. For example, consider the POSIX Threads standard facility for using thread-specific data (TSD) to implement multithread...
 
Resilient Trust Management for Web Service Integration
Found in: Web Services, IEEE International Conference on
By Sungkeun Park, Ling Liu, Calton Pu, Mudhakar Srivatsa, Jianjun Zhang
Issue Date:July 2005
pp. 499-506
In a distributed web service integration environment, the selection of web services should be based on their reputation and quality-of- service (QoS). Various trust models for web services have been proposed to evaluate the reputation of web services/servi...
 
Integration of Business Processes with Autonomous Information Systems: A Case Study in Government Services
Found in: E-Commerce Technology, IEEE International Conference on
By João Eduardo Ferreira, Osvaldo Kotaro Takai, Calton Pu
Issue Date:July 2005
pp. 471-474
This research addresses the problem of business process integration in autonomous information systems. The unified control unit defines the navigation plan for each electronic service requisition belonging to the autonomous information systems. Each electr...
 
Comparison of Approaches to Service Deployment
Found in: Distributed Computing Systems, International Conference on
By Vanish Talwar, Qinyi Wu, Calton Pu, Wenchang Yan, Gueyoung Jung, Dejan Milojicic
Issue Date:June 2005
pp. 543-552
<p>IT today is driven by the trend of increasing scale and complexity. Utility and Grid computing models, PlanetLab, and traditional data centers, are reaching the scale of thousands of computers. Installed software consists of dozens of interdepende...
 
Fine-Grain Adaptive Compression in Dynamically Variable Networks
Found in: Distributed Computing Systems, International Conference on
By Calton Pu, Lenin Singaravelu
Issue Date:June 2005
pp. 685-694
Despite voluminous previous research on adaptive compression, we found significant challenges when attempting to fully utilize both network bandwidth and CPU. We describe the Fine-Grain (FG) Mixing strategy that compresses and sends as much data as possibl...
 
Reliable Peer-to-Peer End System Multicasting through Replication
Found in: Peer-to-Peer Computing, IEEE International Conference on
By Jianjun Zhang, Ling Liu, Calton Pu, Mostafa Ammar
Issue Date:August 2004
pp. 235-242
A key challenge in peer-to-peer computing system is to provide decentralized and yet reliable services on top of a network of loosely coupled, weakly connected and possibly unreliable peers. This paper presents an effective dynamic passive replication sche...
 
Infopipes: Concepts and ISG Implementation
Found in: Software Technologies for Future Embedded and Ubiquitous Systems, IEEE Workshop on
By Galen S. Swint, Calton Pu, Koichi Moriyama
Issue Date:May 2004
pp. 19
We describe Infopipes, a distributed computational and communications abstraction for information flow applications and I/O intensive distributed real-time embedded (DRE) systems. Infopipes are specified by the syntax, semantics, and quality of service req...
 
Trigger Grouping: A Scalable Approach to Large Scale Information Monitoring
Found in: Network Computing and Applications, IEEE International Symposium on
By Wei Tang, Ling Liu, Calton Pu
Issue Date:April 2003
pp. 148
Information change monitoring services are becoming increasingly useful as more and more information is published on the Web. A major research challenge is how to make the service scalable to serve millions of monitoring requests. Such services usually use...
 
Enhancing Access Control with SysGuard, Reference Monitor Supporting Portable and Composable Kernel Module
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Yasushi Shinjo, Kotaro Eiraku, Atsushi Suzuki, Kozo Itano, Calton Pu
Issue Date:December 2002
pp. 167
To install security modules o reference monitors into operating system kernels is a common and effective way fo enhancing access control for networks. However, security modules in conventional kernel-level reference monitors are usually not portable to oth...
 
A Fully Automated Object Extraction System for the World Wide Web
Found in: Distributed Computing Systems, International Conference on
By David Buttler, Ling Liu, Calton Pu
Issue Date:April 2001
pp. 0361
Abstract: This paper presents a fully automated object extraction system---Omini. A distinct feature of Omini is the suite of algorithms and the automatically learned information extraction rules for discovering and extracting objects from dynamic Web page...
 
Guest Editors' Introduction: Special Section on the 15th International Conference on Data Engineering
Found in: IEEE Transactions on Knowledge and Data Engineering
By Masaru Kitsuregawa, Michael P. Papazoglou, Calton Pu
Issue Date:September 2000
pp. 673-674
No summary available.
 
A Dynamic Query Scheduling Framework for Distributed and Evolving Information Systems
Found in: Distributed Computing Systems, International Conference on
By Ling Liu, Calton Pu
Issue Date:May 1997
pp. 474
The rapid growth of the wide-area network technology has led to an increasing number of information sources available on-line. To ensure the query services scale up with such dynamic open environments, an advanced distributed information system must provid...
 
Who Is Your Neighbor: Net I/O Performance Interference in Virtualized Clouds
Found in: IEEE Transactions on Services Computing
By Xing Pu,Ling Liu,Yiduo Mei,Sankaran Sivathanu,Younggyun Koh,Calton Pu,Yuanda Cao
Issue Date:July 2013
pp. 314-329
User-perceived performance continues to be the most important QoS indicator in cloud-based data centers today. Effective allocation of virtual machines (VMs) to handle both CPU intensive and I/O intensive workloads is a crucial performance management capab...
 
Understanding Performance Interference of I/O Workload in Virtualized Cloud Environments
Found in: Cloud Computing, IEEE International Conference on
By Xing Pu, Ling Liu, Yiduo Mei, Sankaran Sivathanu, Younggyun Koh, Calton Pu
Issue Date:July 2010
pp. 51-58
Server virtualization offers the ability to slice large, underutilized physical servers into smaller, parallel virtual machines (VMs), enabling diverse applications to run in isolated environments on a shared hardware platform. Effective management of virt...
 
Detecting Transient Bottlenecks in n-Tier Applications through Fine-Grained Analysis
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)
By Qingyang Wang,Yasuhiko Kanemasa,Jack Li,Deepal Jayasinghe,Toshihiro Shimizu,Masazumi Matsubara,Motoyuki Kawaba,Calton Pu
Issue Date:July 2013
pp. 31-40
Identifying the location of performance bottlenecks is a non-trivial challenge when scaling n-tier applications in computing clouds. Specifically, we observed that an n-tier application may experience significant performance loss when there are transient b...
 
An Experimental Study of Rapidly Alternating Bottlenecks in n-Tier Applications
Found in: 2013 IEEE 6th International Conference on Cloud Computing (CLOUD)
By Qingyang Wang,Yasuhiko Kanemasa,Jack Li,Deepal Jayasinghe,Toshihiro Shimizu,Masazumi Matsubara,Motoyuki Kawaba,Calton Pu
Issue Date:June 2013
pp. 171-178
Identifying the location of performance bottlenecks is a non-trivial challenge when scaling n-tier applications in computing clouds. Specifically, we observed that an n-tier application may experience significant performance loss when bottlenecks alternate...
 
RoadAlarm: A spatial alarm system on road networks
Found in: 2013 IEEE International Conference on Data Engineering (ICDE 2013)
By Kisung Lee,Emre Yigitoglu,Ling Liu,Binh Han,Balaji Palanisamy,Calton Pu
Issue Date:April 2013
pp. 1372-1375
Spatial alarms are one of the fundamental functionalities for many LBSs. We argue that spatial alarms should be road network aware as mobile objects travel on spatially constrained road networks or walk paths. In this software system demonstration, we will...
 
Road network mix-zones for anonymous location based services
Found in: 2013 IEEE International Conference on Data Engineering (ICDE 2013)
By Balaji Palanisamy,Sindhuja Ravichandran,Ling Liu,Binh Han,Kisung Lee,Calton Pu
Issue Date:April 2013
pp. 1300-1303
We present MobiMix, a road network based mix-zone framework to protect location privacy of mobile users traveling on road networks. An alternative and complementary approach to spatial cloaking based location privacy protection is to break the continuity o...
 
Variations in Performance and Scalability When Migrating n-Tier Applications to Different Clouds
Found in: Cloud Computing, IEEE International Conference on
By Deepal Jayasinghe,Simon Malkowski,Qingyang Wang,Jack Li,Pengcheng Xiong,Calton Pu
Issue Date:July 2011
pp. 73-80
The increasing popularity of computing clouds continues to drive both industry and research to provide answers to a large variety of new and challenging questions. We aim to answer some of these questions by evaluating performance and scalability when an n...
 
Improving Performance and Availability of Services Hosted on IaaS Clouds with Structural Constraint-Aware Virtual Machine Placement
Found in: Services Computing, IEEE International Conference on
By Deepal Jayasinghe,Calton Pu,Tamar Eilam,Malgorzata Steinder,Ian Whally,Ed Snible
Issue Date:July 2011
pp. 72-79
The increasing popularity of modern virtualization-based datacenters continues to motivate both industry and academia to provide answers to a large variety of new and challenging questions. In this paper we aim to answer focusing on one such question: how ...
 
Economical and Robust Provisioning of N-Tier Cloud Workloads: A Multi-level Control Approach
Found in: Distributed Computing Systems, International Conference on
By Pengcheng Xiong, Zhikui Wang, Simon Malkowski, Qingyang Wang, Deepal Jayasinghe, Calton Pu
Issue Date:June 2011
pp. 571-580
Resource provisioning for N-tier web applications in Clouds is non-trivial due to at least two reasons. First, there is an inherent optimization conflict between cost of resources and Service Level Agreement (SLA) compliance. Second, the resource demands o...
 
 1  2 Next >>