Bytecode fault injection for Java software

上传人:cn****1 文档编号:487254821 上传时间:2023-09-11 格式:DOC 页数:19 大小:393.50KB
返回 下载 相关 举报
Bytecode fault injection for Java software_第1页
第1页 / 共19页
Bytecode fault injection for Java software_第2页
第2页 / 共19页
Bytecode fault injection for Java software_第3页
第3页 / 共19页
Bytecode fault injection for Java software_第4页
第4页 / 共19页
Bytecode fault injection for Java software_第5页
第5页 / 共19页
点击查看更多>>
资源描述

《Bytecode fault injection for Java software》由会员分享,可在线阅读,更多相关《Bytecode fault injection for Java software(19页珍藏版)》请在金锄头文库上搜索。

1、A software engineering approach for the development of heterogeneous robotic applicationsOriginal Research ArticleRobotics and Computer-Integrated ManufacturingJava Test Driver Generation from Object-Oriented Interaction TracesOriginal Research ArticleElectronic Notes in Theoretical Computer Science

2、CMS software architecture: Software framework, services and persistency in high level trigger, reconstruction and analysisOriginal Research ArticleComputer Physics CommunicationsThis paper describes the design of a resilient and flexible software architecture that has been developed to satisfy the d

3、ata processing requirements of a large HEP experiment, CMS, currently being constructed at the LHC machine at CERN. We describe various components of a software framework that allows integration of physics modules and which can be easily adapted for use in different processing environments both real

4、-time (online trigger) and offline (event reconstruction and analysis). Features such as the mechanisms for scheduling algorithms, configuring the application and managing the dependences among modules are described in detail. In particular, a major effort has been placed on providing a service for

5、managing persistent data and the experience using a commercial ODBMS (Objectivity/DB) is therefore described in detail.JOLIE: a Java Orchestration Language Interpreter EngineOriginal Research ArticleElectronic Notes in Theoretical Computer ScienceService oriented computing is an emerging paradigm fo

6、r programming distributed applications based on services. Services are simple software elements that supply their functionalities by exhibiting their interfaces and that can be invoked by exploiting simple communication primitives. The emerging mechanism exploited in service oriented computing for c

7、omposing services in order to provide more complex functionalities is by means of orchestrators. An orchestrator is able to invoke and coordinate other services by exploiting typical workflow patterns such as parallel composition, sequencing and choices. Examples of orchestration languages are XLANG

8、 IBM, “XLANG: Web Services for Business Process Design,” http:/ and WS-BPEL OASIS, “Web Services Business Process Execution Language Version 2.0, Working Draft,” http:/www.oasis-open.org/committees/download.php/10347/wsbpel-specification-draft-120204.htm. In this paper we present JOLIE, an interpret

9、er and engine for orchestration programs. The main novelties of JOLIE are that it provides an easy to use development environment (because it supports a more programmer friendly C/Java-like syntax instead of an XML-based syntax) and it is based on a solid mathematical underlying model (developed in

10、previous works of the authors N. Busi, R. Gorrieri, C. Guidi, R. Lucchi and G. Zavattaro, Towards a formal framework for Choreography, in: Proc. of 3rd International Workshop on Distributed and Mobile Collaboration (DMC 2005) (2005), N. Busi, R. Gorrieri, C. Guidi, R. Lucchi and G. Zavattaro, Choreo

11、graphy and orchestration conformance for system design, in: Proc. of 8th International Conference on Coordination Models and Languages (COORDINATION06), LNCS to appear, 2006, C. Guidi and R. Lucchi, Mobility mechanisms in service oriented computing, in: Proc. of 8th International Conference on on Fo

12、rmal Methods for Open Object-Based Distributed Systems (FMOODS06), LNCS to appear, 2006).Secure mobile business applications framework, architecture and implementationOriginal Research ArticleInformation Security Technical ReportEmerging mobile technologies such as PDAs, laptops and smart phones tog

13、ether with wireless networking technologies such as WLAN and UMTS promise to empower mobile employees to become better integrated into their companies business processes. However, the actual uptake of these technologies is still to come; one hindrance is security of mobile devices and applications.

14、In this contribution we present an in-depth analysis of the current situation enterprises are faced with in the mobile arena, both from a security and a management perspective. We argue that the currently predominant model of perimeter security will not scale for future mobile business applications

15、that will require appropriate application-level security mechanisms to be in place. We present a framework offering solutions for the development of secure mobile business applications that takes into account the need for strong security credentials, e.g. based on smart cards. This framework consist

16、s of software and abstractions that allow for the separation of the core business logic from the security logic in applications. Security management instruments in the form of enforceable enterprise policies are defined which target the security and trust-related deployment and configuration of mobile devices and business applications. The presented architecture is ope

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 幼儿/小学教育 > 小学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号