Ahmed Elkhodary & Jon Whittle : "A Survey of Approaches to Adaptive Security", International Workshop on Software Engineering for Adaptive and Self-Managing System (SEAMS’07)
Ahmed Elkhodary & Jon Whittle : "A Survey of Approaches to Adaptive Security", International Workshop on Software Engineering for Adaptive and Self-Managing System (SEAMS’07)
中身はほぼ以下の論文紹介です!
Soremekun, E., Papadakis, M., Cordy, M., & Traon, Y. Le. (2022). Software Fairness: An Analysis and Survey. ArXiv. Retrieved from http://arxiv.org/abs/2205.08809
WM2SP16 Keynote: Current and Future challenge of Model and Modelling on Secur...Nobukazu Yoshioka
My talk includes current models and modelling on Security and Privacy: Conceptual Models such as SIG, Common Criteria, STIX, SCPM, UML based models such as Misusecase, UMLsec, secureUML, and GORE models such as SecureTropos, i*/Tropos, KAOS etc.
Additionally, research challenges on the Security and Privacy Model and Modelling are discussed.
Operation on Models on Security and Privacy with consistency
Hybrid Models on Security and Privacy
Big data and Machine Learning on Security and Privacy Modelling
2. 2001
2003
Cluster
Tokyo
2010
+Cloud
International Symposium on
Cluster Computing and the Grid
Grid Cloud
The 12th IEEE/ACM International Symposium on Cluster,
Cloud and Grid Computing
2
3. [OS/Programming Language] [Hardware]
Programming Models and File Systems Multicore Architectures
Programming Models
QoS and Architecture [Virtualization]
I/O and File Systems
Faults, Failures and Reliability Cluster Virtualization
GPU
[IaaS]
Cloud Services I
[Network]
Cloud Services II
Communication and Network
Cloud Computing I
Cloud Computing II
Grid Cloud Data on the Cloud
[Scheduling]
Workflows
Scheduling and Monitoring [PaaS]
Map Reduce and Workflows
Map Reduce
[Inter-Cloud]
Communication and Networks
Faults, Failures and Reliabi1lity Applications
3
4. Grid Clouds
Heterogeneous Homogeneous
Many types of systems Datacenters
Multi-organizational Clearly defined organization
Scientific applications Web / Applications
Authentication issues Authentication by credit
card
One user – many resources Elasticity
No industry involvement Much industry involvement
Free(?) Payment model
Energy awareness
引用:Dick H.J. Epema, “Twenty Years of Grid Scheduling Research and Beyond, “CCGrid2012. 4
10. 20本 with Reception Party
Best poster: Hiroko Midorikawa and Joe Uchiyama, “Automatic
Adaptive Page-Size Control for Remote Memory Paging”
Our Poster: Shigetoshi Yokoyama and Nobukazu Yoshioka,
“Cluster as a Service for Self-Deployable Cloud Applications”
GRID 5000 と目的が同じでは?
10
11. Thyaga Nandagopal and Krishna P. N.
Puttaswamy, “Lowering Inter-Datacenter
Bandwidth Costs via Bulk Data Scheduling”
Best paper, クラウド間のデータ転送のピーク(最大
バンド幅)を低く抑えるようにスケジューリング
Hsing-Yu Chen, Yue-Hsun Lin, and Chen-Mou
Cheng , “COCA: Computation Offload to
Clouds using AOP”
モバイルとクラウドの組み合わせをAOPで実現
11
14. MORPHOSYS: Efficient Colocation of QoS-
Constrained Workloads in the Cloud
SLAを満たすためのリソース提供言語を規定:SLA
Calculus
リソース提供方法をパラメータ化 (IPの考え方):
capacity, interval, tolerant, window
Reward Scheduling for QoS in Cloud Applications
multi-tiered serverを想定:memory, SSD, HDD
SSDをfairに分配
Policy-Based Automation of SLA Establishment for
Cloud Computing Services
WS Policyを利用
14
15. A Model and Decision Procedure for Data Storage
in Cloud Computing
クラウドの選択を自動化
costを最小, known parameterを固定し、unknown
parameterを調整
inter linear programming (ILP) modelに帰着
ILP/SAT solverを利用
An Analysis of Provisioning and Allocation
Policies for Infrastructure-as-a-Service Clouds
様々なVMのprovisioning policyとallocation policyを考慮
した割り当てをシミュレーションにより比較
ポリシーの使い分け、良し悪しをperformanceとcostの観
点で比較 ⇒ 結論:トレードオフが重要
15
16. A Workflow-Aware Storage
System: An Opportunity Study
Workflow処理時間の30%はdata
management
IO patterns に従い、jobのノードへの
割り当てを決定
Memory, SSD, HDDを使い分け
A Time-series Pattern based Noise
Generation Strategy for Privacy
Protection in Cloud Computing
ユーザ側で故意に場所情報のノイズ
を送ってプライバシーを守る
少ないノイズで効果的にサーバを混
乱
16