In this work we present the DESERT tool that allows the automatic generation of distributed monitoring systems for enhancing security and dependability of a component-based application at architectural level. The DESERT language permits to specify both the components interfaces and interaction properties in term of correct components communications. DESERT uses these specifications to generate one filter for each component. Each filter locally detects when its component communications violate the property and can undertake a set of reaction policies. DESERT allows the definition of different reaction policies to enhance system security and dependability. DESERT has been used to monitor applications running on both mobile and wired infrastru...
This paper discusses different aspects of performing monitoring in the context of software intensive...
Abstract — It is a challenge to provide detection facilities for large scale distributed systems run...
Abstract. The complexity of today’s distributed computing environ-ments is such that the presence of...
In this work we present the DESERT tool that allows the automatic generation of distributed monitori...
In this work we present the DESERT tool that allows the automatic generation of distributed monitori...
This paper presents the tool DESERT that allows the generation of decentralized monitoring systems f...
This paper presents the tool DESERT that allows the gen- eration of decentralized monitoring systems...
This paper illustrates an approach to add security policies to a component-based system. We consider...
This paper discusses several relevant aspects of performing monitoring in the context of software-in...
This paper illustrates an approach to add security policies to a component-based system. We consider...
This paper defines a generic class of monitoring extensions to component-based distributed enterpris...
This thesis presents our work in the area of monitoring distributed software applications (DSAs). We...
Distributed applications are becoming increasingly pervasive, and difficult to manage. Examples of ...
This paper presents a framework for monitoring component interactions. It is part of a larger compon...
This paper presents a framework for monitoring component interactions. It is part of a larger compon...
This paper discusses different aspects of performing monitoring in the context of software intensive...
Abstract — It is a challenge to provide detection facilities for large scale distributed systems run...
Abstract. The complexity of today’s distributed computing environ-ments is such that the presence of...
In this work we present the DESERT tool that allows the automatic generation of distributed monitori...
In this work we present the DESERT tool that allows the automatic generation of distributed monitori...
This paper presents the tool DESERT that allows the generation of decentralized monitoring systems f...
This paper presents the tool DESERT that allows the gen- eration of decentralized monitoring systems...
This paper illustrates an approach to add security policies to a component-based system. We consider...
This paper discusses several relevant aspects of performing monitoring in the context of software-in...
This paper illustrates an approach to add security policies to a component-based system. We consider...
This paper defines a generic class of monitoring extensions to component-based distributed enterpris...
This thesis presents our work in the area of monitoring distributed software applications (DSAs). We...
Distributed applications are becoming increasingly pervasive, and difficult to manage. Examples of ...
This paper presents a framework for monitoring component interactions. It is part of a larger compon...
This paper presents a framework for monitoring component interactions. It is part of a larger compon...
This paper discusses different aspects of performing monitoring in the context of software intensive...
Abstract — It is a challenge to provide detection facilities for large scale distributed systems run...
Abstract. The complexity of today’s distributed computing environ-ments is such that the presence of...