基于可生存性规范的软件构件系统恢复的建模与推理
作者:
基金项目:

Supported by the National Grand Fundamental Research 973 Program of China under Grant No.2005CB321905 (国家重点基础研究发展规划(973)); the Open Subject Fund of Jiangsu Provincial Key Laboratory of Network and Information Security of China under Grant No.BM2003201 (江苏省网络与信息安全重点实验室开放课题基金)


Modeling and Reasoning of the Software Component Based System Recovery Based on Survivability Specification
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [29]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    从基于构件的系统在面临各种不同的恶意攻击、系统故障和意外事故时,根据预先定义好的生存性规范为用户提供不同等级的系统服务出发,研究了构件系统恢复中的一些关键问题.其主要贡献是:(1) 提出了基于构件家族和构件安装顺序的服务核表示方法,该方法能够准确表达系统在不同条件下为用户提供能够感知的服务;(2) 建立了基于构件兼容性和构件安装执行的构件系统恢复性质的推理规则,用于判断系统恢复的成功性(新启动的服务能够正常工作)和安全性(原有的服务不会受到损害);(3) 提出了基于投影的构件安装执行的简化算法,为大规模构件系统恢复的性质推理分析提供了支持.利用基于可生存性规范的构件系统恢复的分析流程,可以在实际中系统地应用相应的推理规则.最后通过一个基于构件的移动视频点播MVoD系统来展示所提出的模型与方法的实用性和有效性.

    Abstract:

    The component-based system will provide a predefined survivability specification which consists of corresponding degraded services in the presence of various kinds of malicious attacks,system failures or accidents. The main contributions of this paper are(1) presenting the method to represent service core based on component families and installation orders,which can precisely capture the system services perceived by users;(2) proposing the reasoning rules of system recovery based on component compatibility and installation execution,which are used to judge the success property(the newly started service works well) and safety property (formerly started services are not damaged);and(3) presenting the algorithms to simplify installation execution based on the concept of projection,which supports the reasoning analysis of system recovery of big scale.By the analysis process based on survivability specification,the corresponding reasoning rules can be systemically applied in practice.A component-based system named MVoD(mobile video-on-demand) is illustrated to demonstrate the practicability and efficiency of the formal model and the analysis method.

    参考文献
    [1]Mei H,Chen F,Feng YD,Yang J.ABC:An architecture based,component oriented approach to software development.Journal of Software,2003,14(4):721-732 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/14/721.htm
    [2]Yang FQ.Thinking on the development of software engineering technology.Journal of Software,2005,16(1):1-7 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/16/1.htm
    [3]Mei H,Huang G,Zhao HY,Jiao WP.An internetware development approach centered on software architecture.Science in China (Series E),2006,36(10):1100-1126 (in Chinese with English abstract).
    [4]Li W,He J,Ma QK,Yen IL,Bastani F,Paul R.A framework to support survivable Web services.In:Proc.of the 19th IEEE Int'l Conf.on Parallel and Distributed Processing Symp.(IPDPS 2005).Denver:IEEE Computer Society,2005.
    [5]Cankaya HC,Nair VSS.A survivability assessment tool for restorable networks.In:Proc.of the 3rd IEEE Symp.on Application-Specific Systems and Software Engineering Technology.IEEE Press,2000.319-324.
    [6]Jha S,Wing J,Linger R,Longstaff T.Survivability analysis of network specifications.In:Proc.of the Int'l Conf.on Dependable Systems and Networks.IEEE Press,2000.53-58.
    [7]Louca S,Pitsillides A,Samaras G.On network survivability algorithms based on trellis graph transformations.In:Proc.of the Int'l Symp.on Computers and Communications.IEEE Press,1999.1008-1023.
    [8]Snow AP,Varshney U,Malloy AD.Reliability and survivability of wireless and mobile networks.IEEE Computer,2000,33(7):449-454.
    [9]Fung C,Chen YL,Wang XY,Lee J,Tarquini R,Anderson M,Linger RC.Survivability analysis of distributed systems using attack tree methodology.In:Proc.of the IEEE Military Communications Conf.(MILCOM 2005).IEEE Computer Society,2005.583-589.
    [10]Hiltunen MA,Schliching RD,Ugarte CA.Building survivable services using redundancy and adaptation.IEEE Trans.on Computers,2003,52(2):181-194.
    [11]Bowen T,Chee D,Segal M,Sekar R,Shanbhag T,Uppuluri P.Building survivable systems:An integrated approach based on intrusion detection and damage containment.In:Proc.of the DARPA Information Survivability Conf.and Exposition (DISCEX 2000).Vol.2.IEEE Computer Society,2000.25-27.
    [12]Linger RC.Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software.In:Proc.of the 32nd Annual Hawaii Int'l Conf.on System Sciences (HICSS-32).Wailea:IEEE Computer Society,1999.
    [13]Mead NR,Linger RC,McHugh J,Lipson HF.Managing software development for survivable systems.Annals of Software Engineering,2001,11(1):45-78.
    [14]Ma QK,Xiao LL,Yen IL,Tu MH,Bastani FB.An adaptive multiparty protocol for secure data protection.In:Proc.of the 11th Int'l Conf.on Parallel and Distributed Systems.Vol.1.IEEE Computer Society,2005.43-49.
    [15]Bowers S,Delcambre L,Maier D,Cowan C,Wagle P,McNamee D,Le Meur AF,Hinton H.Applying adaptation spaces to support quality of service and survivability.In:Proc.of the DARPA Information Survivability Conf.and Exposition (DISCEX 2000).Vol.2.IEEE Computer Society,2000.271-283.
    [16]Westmark VR.A definition for information system survivability.In:Proc.of the 37th Annual Hawaii Int'l Conf.on System Sciences (HICSS 2004).2004.303-312.
    [17]Networked systems survivability program.2007.http://www.sei.cmu.edu/programs/nss/nss.html
    [18]Knight C,Strunk EA.Achieving critical system survivability through software architectures.In:de Lemos R,et al.,eds.Architecting Dependable Systems II.LNCS 3069,Berlin,Heidelberg:Springer-Verlag,2004.51-78.
    [19]Knight JC,Strunk EA,Sullivan KJ.Towards a rigorous definition of information system survivability.In:Proc.of the DARPA Information Survivability Conf.and Exposition (DISCEX 2003).2003.78-79.
    [20]Szyperski C,Gruntz D,Murer S.Component Software:Beyond Object-Oriented Programming.2nd ed.,Massachusetts:Addison-Wesley Professional,2002.
    [21]Avizienis A,Laprie JC,Randell B,Landwehr C.Basic concepts and taxonomy of dependable and secure computing.IEEE Trans.on Dependable and Secure Computing,2004,1(1):11-33.
    [22]Coupaye T,Estublier J.Foundations of enterprise software deployment.In:Proc.of the Euromicro Conf.on Software Maintenance and Reengineering.Zurich:IEEE Computer Society,2000.
    [23]Carroll JM.Scenario-Based Design:Envisioning Work and Technology in System Development.New York:John Wiley & Sons,1995.
    [24]Damm W,Harel D.LECs:Breathing life into message sequence charts.Formal Methods in System Design,2001,19(1):45-80.
    [25]Alda S,Won M,Cremers A.Managing dependencies in component-based distributed applications.In:Proc.of the Int'l Workshop on Scientific Engineering of Distributed Java Applications (FIDJI).LNCS 2604,Luxembourg-City:Springer-Verlag,2002.143-154.
    [26]Parrish AS,Dixon B,Cordes D.A conceptual foundation for component-based software deployment.Journal of Systems and Software,2001,57(3):193-200.
    [27]Saridakis T.Surviving errors in component-based software.In:Proc.of the 31st EUROMICRO Conf.on Software Engineering and Advanced Applications (EUOMICRO-SEAA 2005).2005.114-123. [1]梅宏,陈锋,冯耀东,杨杰.ABC:基于体系结构、面向构件的软件开发方法.软件学报,2003,14(4):721-732.http://www.jos.org.cn/ 1000-9825/14/721.htm
    [2]杨芙清.软件工程技术发展思索.软件学报,2005,16(1):1-7.http://www.jos.org.cn/1000-9825/16/1.htm
    [3]梅宏,黄罡,赵海燕,焦文品.一种以软件体系结构为中心的网构软件开发方法.中国科学(E辑),2006,36(10):1100-1126.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

卢暾.基于可生存性规范的软件构件系统恢复的建模与推理.软件学报,2007,18(12):3031-3047

复制
分享
文章指标
  • 点击次数:7379
  • 下载次数: 7600
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2007-06-11
  • 最后修改日期:2007-10-16
文章二维码
您是第20334007位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号