The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Achieving high I/O throughput on modern servers presents significant challenges. With increasing core counts, server memory architectures become less uniform, both in terms of latency as well as bandwidth. In particular, the bandwidth of the interconnect among NUMA nodes is limited compared to local memory bandwidth. Moreover, interconnect congestion and contention introduce additional latency on...
This paper describes a low-overhead and prolonged Linux process logging mechanism that is separated into networks for embedded systems with small memory. It is useful to log the behavior of Linux processes in Android in order to debug, test, and learn about the embedded systems. However, the logging system interferes with process scheduling and requires huge storage to capture the process behavior...
Namespaces are fundamental to computing systems. Each namespace maps the names that clients use to retrieve resources to the actual resources themselves. However, the indirection that namespaces provide introduces avenues of attack through the name resolution process. Adversaries can trick programs into accessing unintended resources by changing the binding between names and resources and by using...
In the literature, the notion of Race Condition deals with the interference between two processes A and B carrying out three interactions involving a shared object. The second interaction of the concurrent process B interleaves with the first and the third interactions of process A. Preventing Race Conditions attacks between concurrent processes is still an open problem. Many limitations remain such...
The security of shared High Performance Computing clusters is still an open research problem. Existing solutions deal with sandboxing and Discretionary Access Control for controlling remote connections. Guaranteeing security properties for a shared cluster is complex since users demand an environment at the same time efficient and preventing confidentiality and integrity violations. This paper studies...
With the advent of multi- and many-core architectures, new opportunities in fault-tolerant computing have become available. In this paper we propose a novel process replication method that provides transparent failover of non-deterministic TCP services by utilizing spare CPU cores. Our method does not require any changes to the TCP protocol, does not require any changes to the client software, and...
Protecting a HPC cluster against real world cyber threats is a critical task, with the increasing trend to open and share computing resources. As partners can upload data that is confidential regarding other partners, a company managing a shared cluster has to enforce strong security measures. It has to prevent both accidental data leakage and voluntary data stealing. When using an operating system...
The virtualization technology has been developed rapidly with the growth of the hardware supported virtualization technologies and the appearance of the various services. Many researchers are concentrating on developing the virtualization technologies which are recognized as the most significant core technology of the IT applications such as green IT and cloud computing. The major processor companies...
Along with the development and application of the high speed network, in order to reduce the cost of data copy and context switch, the paper presents an improved method of zero-copy data transmission that is suitable for the high speed network environment on Linux and UNIX platforms. The method can reduce the number of data copy and context switch between kernel and user mode. It is tested by transmitting...
Access control in SELinux is designed for a monolithic operating system. In order to apply SELinux in distributed environments it is necessary to extend the policy specification language to include the notion of location. This paper presents a system that translates a location extended policy to local-policies. A policy server does this translation and distributes local policies to the corresponding...
Private computing on public platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platforms. PCPP must secure its encryption keys to ensure that application isolation is robust and reliable. To this end we offer a protection scheme for PCPP encryption keys. In this paper we first discuss a commonly used key storage...
Modern on-line collaborative learning environments need to be continuously adapted, adjusted, and personalized to each specific target learning group. Moreover, these environments are to enable and scale the involvement of an increasing large number of single/group participants who can geographically be widely distributed, and who need transparently share a huge variety of both software and hardware...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.