Management System for Heterogeneous Networks Final Report Volume I: Project Summary and Paper

Abstract : Enforcement of a high-level statement of security policy may be difficult to discern when mapped through functional requirements to a myriad of possible security services and mechanisms in a highly complex, networked environment. A method for articulating network security functional requirements, and their fulfillment, is presented. Using this method, security in a quality of service frame. work is discussed in terms of "variant" security mechanisms and dynamic security policies. For illustration, it is shown how this method can be used to represent Quality of Security Service (QoSS) in a network scheduler benefit function.

[1]  Cynthia E. Irvine,et al.  The effects of security choices and limits in a metacomputing environment , 2000 .

[2]  Ted Lewis,et al.  A Comparison of C++ Sockets and Corba in a Distributed Matrix Multiply Application , 1998 .

[3]  Roger Wright,et al.  Security architecture for a virtual heterogeneous machine , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[4]  Michael W. Godfrey,et al.  An overview of MSHN: the Management System for Heterogeneous Networks , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).

[5]  Viktor K. Prasanna,et al.  Adaptive Communication Algorithms for Distributed Heterogeneous Systems , 1999, J. Parallel Distributed Comput..

[6]  Ladislau Bölöni,et al.  A comparison study of static mapping heuristics for a class of meta-tasks on heterogeneous computing systems , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).

[7]  Ronald Jacobs Identifying accurate resource monitoring tools and techniques , 1999 .

[8]  Howard Jay Siegel,et al.  Task execution time modeling for heterogeneous computing systems , 2000, Proceedings 9th Heterogeneous Computing Workshop (HCW 2000) (Cat. No.PR00556).

[9]  Pedro T. H. Tsai Re-Targeting the Graze Performance Debugging Tool for Java Threads and Analyzing the Re-Targeting to Automatically Parallelized (FORTRAN) Code , 2000 .

[10]  Cynthia E. Irvine,et al.  Toward quality of security service in a resource management system benefit function , 2000, Proceedings 9th Heterogeneous Computing Workshop (HCW 2000) (Cat. No.PR00556).

[11]  Howard Jay Siegel,et al.  A dynamic matching and scheduling algorithm for heterogeneous computing systems , 1998, Proceedings Seventh Heterogeneous Computing Workshop (HCW'98).

[12]  Howard Jay Siegel,et al.  Techniques for mapping tasks to machines in heterogeneous computing systems , 2000, J. Syst. Archit..

[13]  John P Kresho Quality Network Load Information Improves Performance of Adaptive Applications , 1997 .

[14]  Bin Yao,et al.  A taxonomy for describing matching and scheduling heuristics for mixed-machine heterogeneous computing systems , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[15]  Blanca A. Shaeffer Refining a task-execution time prediction model for use in MSHN , 2000 .

[16]  N. Wayne. Porter Resource usage for adaptive C4I models in a heterogeneous computing environment , 1999 .

[17]  Viktor K. Prasanna,et al.  Efficient collective communication in distributed heterogeneous systems , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).

[18]  Alpay Duman The use and run-time overhead of Corba in MSHN project , 1998 .

[19]  R. F. Freund,et al.  Dynamic Mapping of a Class of Independent Tasks onto Heterogeneous Computing Systems , 1999, J. Parallel Distributed Comput..

[20]  Muthucumaru Maheswaran Software issues on mapping applications onto heterogeneous machines and the performance of Krylov algorithms on parallel machines , 1998 .

[21]  Viktor K. Prasanna,et al.  A QoS performance measure framework for distributed heterogeneous networks , 2000, Proceedings 8th Euromicro Workshop on Parallel and Distributed Processing.

[22]  Debra A. Hensgen,et al.  Passive, domain-independent, end-to-end message passing performance monitoring to support adaptive applications in MSHN , 1999, Proceedings. The Eighth International Symposium on High Performance Distributed Computing (Cat. No.99TH8469).

[23]  Cynthia E. Irvine,et al.  Toward a taxonomy and costing method for security services , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[24]  Cynthia E. Irvine,et al.  An introduction to Quality of Security Services , 1999 .

[25]  Anthony A. Maciejewski,et al.  Task Matching and Scheduling in Heterogenous Computing Environments Using a Genetic-Algorithm-Based Approach , 1997, J. Parallel Distributed Comput..

[26]  Howard Jay Siegel,et al.  Heterogeneous Distributed Computing , 1999 .

[27]  John Paul English A Management System for Heterogeneous Networks (MSHN) Security Analysis , 1997 .

[28]  David St. John,et al.  Experiences Using Semi-Formal Methods During Development of Distributed, Research-Oriented, System-Level Software , 1999 .

[29]  R. F. Freund,et al.  Dynamic matching and scheduling of a class of independent tasks onto heterogeneous computing systems , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).

[30]  Geoffrey G. Xie,et al.  Determining the Accuracy Required in Resource Load Prediction to Successfully Support Application Agility , 1998 .

[31]  Cynthia E. Irvine,et al.  An Approach to Characterizing Resource Usage and User Preferences in Benefit Functions , 1999 .

[32]  Debra A. Hensgen,et al.  Are CORBA services ready to support resource management middleware for heterogeneous computing? , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).

[33]  Viktor K. Prasanna,et al.  A unified resource scheduling framework for heterogeneous computing environments , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).

[34]  Panagiotis Papadatos Implementation of real-time MSHN using ACE and TAO , 1999 .

[35]  James M. Breitinger Optimal size of job pool for initiating a scheduling event , 1999 .

[36]  Howard Jay Siegel,et al.  High-performance mixed-machine heterogeneous computing , 1998, Proceedings of the Sixth Euromicro Workshop on Parallel and Distributed Processing - PDP '98 -.

[37]  Anthony A. Maciejewski,et al.  Evaluation of a semi-static approach to mapping dynamic iterative tasks onto heterogeneous computing systems , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).

[38]  Debra A. Hensgen,et al.  The relative performance of various mapping algorithms is independent of sizable variances in run-time predictions , 1998, Proceedings Seventh Heterogeneous Computing Workshop (HCW'98).

[39]  Cynthia E. Irvine,et al.  A note on mapping user-oriented security policies to complex mechanisms and services , 1999 .

[40]  Ladislau Bölöni,et al.  A Comparison of Eleven Static Heuristics for Mapping a Class of Independent Tasks onto Heterogeneous Distributed Computing Systems , 2001, J. Parallel Distributed Comput..

[41]  Viktor K. Prasanna,et al.  Communication scheduling techniques for distributed heterogeneous systems , 1999 .

[42]  Viktor K. Prasanna,et al.  A framework for mapping with resource co-allocation in heterogeneous computing systems , 2000, Proceedings 9th Heterogeneous Computing Workshop (HCW 2000) (Cat. No.PR00556).

[43]  Paul F. Carff When is a simple model adequate for in scheduling in MSHN , 1999 .