National Repository of Grey Literature 11 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Security and Trust in the DEECo Component Model
Štumpf, Ondřej ; Bureš, Tomáš (advisor) ; Kruliš, Martin (referee)
DEECo represents an example of a Cyber-Physical System (CPS) consisting of potentially vast number of components able to share data with each other. So far, access to data was not restricted, thus enabling components to exploit sensitive data owned by other components. The goal of this work is to analyze security threats in distributed environments such as DEECo and propose a security solution which would provide both physical security of component data and introduce an access control mechanism. However, while confidentiality may be critical to certain applications, data integrity is crucial to almost every one. This work therefore also proposes a trust model, which prevents components operating with defective or malicious data. Both proposed models are realized in jDEECo, a Java implementation of DEECo.
Analysis of Knowledge Obsolescence in Ensemble-Based Component Systems
Pavliš, Filip ; Bureš, Tomáš (advisor) ; Kofroň, Jan (referee)
Designing Resilient Distributed embedded Systems is a challenging task. One of the design issues is to guarantee correct behavior of the system during the runtime. It demands verification that information propagated through the system is reliable. The goal of this thesis is a research and implementation of an analysis that should identify obsolescence of variables due to delays caused by scheduling and communication in real-time systems. Analysis will be designed for Ensemble-Based Component System (EBCS) semantics because it enables precise specification and analysis of important properties. The main problem is to find a suitable input model of the analysis and find its possible limits. Effort should be put in balancing between the level of abstraction given to a RDS developer and power of the analysis itself. The main benefit of the analysis will be detection of situations in which data processed in RDS are outdated and can cause incorrect behavior of particular components.
Security and Trust in the DEECo Component Model
Štumpf, Ondřej
DEECo represents an example of a Cyber-Physical System (CPS) consisting of potentially vast number of components able to share data with each other. So far, access to data was not restricted, thus enabling components to exploit sensitive data owned by other components. The goal of this work is to analyze security threats in distributed environments such as DEECo and propose a security solution which would provide both physical security of component data and introduce an access control mechanism. However, while confidentiality may be critical to certain applications, data integrity is crucial to almost every one. This work therefore also proposes a trust model, which prevents components operating with defective or malicious data. Both proposed models are realized in jDEECo, a Java implementation of DEECo.
A virtual playground for DEECo applications
Khalyeyev, Danylo ; Hnětynka, Petr (advisor) ; Parízek, Pavel (referee)
DEECo is a novel component model for designing software-intensive cyber- physical systems. As a practical realization of this model there was developed the JDEECo implementation, written in Java. The usage of this framework was shown in a number of different scenarios. However, at the moment there are only limited ways to systematically create, simulate, and visualize new scenarios written with this model. This thesis presents a virtual playground that allows to create scenarios featuring autonomic robots programmed in DEECo. The playground offers a number of options in creation of scenarios, including pro- gramming robots and their interactions, customizing and extending the physical environment, and adding interactive objects. These scenarios can also be visu- alized with the developed application. The parameters of visualization can be customized for needs of a specific scenario. The functionality of the application is demonstrated on several example scenarios.
Smart Infrastructure Visualization
Filípek, Tomáš ; Hnětynka, Petr (advisor) ; Kofroň, Jan (referee)
Computational power of mobile devices has been continuously improving in the recent years. One of the benefits which it brings, is feasibility of new kinds of distributed systems, such as Ensemble-Based Component Systems (EBCS). For practical reasons, EBCS systems are usually tested using simulations before being released. However, it can be difficult to interpret the simulation output, as it is usually contained in XML format, which is more suited to be read by machines than by people. We provide a visualizing application, which creates a graphical representation of such a simulation output. Out of the box, it is able to visualize data from applications built on top of the JDEECo component model, but it can be easily modified to accept output from different EBCS applications. It is able to visualize both components and ensembles and provides a scripting interface to modify the graphical output. In addition, it has an extensibility mechanism for adding new functionalities. Our benchmarking shows that the application is expected to run reasonably fast in typical scenarios.
Optimization of DEECo gossip-based communication
Kováč, Ondrej ; Bureš, Tomáš (advisor) ; Arcaini, Paolo (referee)
The spread of wireless devices inspired the creation of a DEECo component model suitable for designing applications with immanent mobility and dynamic composition where the system architecture emerges at runtime. A great challenge in implementation of such a system is the underlying communication mechanism based on gossip protocol in order to achieve resilience and suitability for MANET networks. In this thesis we propose an optimization of the protocol exploiting infrastructure networks, but still preserving the gossip-like communication without a centralized element. The improvement is based on forming communication groups introduced at the design level. The experiments show a substantial decrease in the number of sent messages and a decrease in time of data delivery. The timing aspect of data delivery is further elaborated for MANET networks by implementing a pulling mechanism with significant improvement of the latency. Part of this thesis is dedicated to a formal specification of the system semantic to provide a precise rationale about its properties and laying the ground for further extensions and research. Powered by TCPDF (www.tcpdf.org)
Security and Trust in the DEECo Component Model
Štumpf, Ondřej
DEECo represents an example of a Cyber-Physical System (CPS) consisting of potentially vast number of components able to share data with each other. So far, access to data was not restricted, thus enabling components to exploit sensitive data owned by other components. The goal of this work is to analyze security threats in distributed environments such as DEECo and propose a security solution which would provide both physical security of component data and introduce an access control mechanism. However, while confidentiality may be critical to certain applications, data integrity is crucial to almost every one. This work therefore also proposes a trust model, which prevents components operating with defective or malicious data. Both proposed models are realized in jDEECo, a Java implementation of DEECo.
DEECo Component Model Framework on Android Mobile Platform
Sipták, Daniel ; Bureš, Tomáš (advisor) ; Gemrot, Jakub (referee)
Presented master thesis is dedicated to creation of DEECo component model supported on Android platform. Enabling distributed system of inter-connected devices to run DEECo framework. For this purpose jDEECo implementation of DEECo component model is ported to Android platform and synchronization solution creating common state is done on top of JGroups toolkit. Possible solutions are presented and implementation of created solution is described. At last demo application showing usage of created framework was developed and evaluated.
DEECo Cloudlets Exploratory Study
Kinšt, Jakub ; Bureš, Tomáš (advisor) ; Horký, Vojtěch (referee)
This thesis explores possibilities of using recently introduced ensemble-based component models (represented by the DEECo model) as a management layer in a cloudlet-like environment for mobile computation offloading, which can lead to savings of limited mobile-specific resources such as battery life. As a part of the solution, the goal is analyzed, possible issues and problems are identified and then addressed by designing and implementing a reference architecture for computation offloading of parts of mobile applications managed by a DEECo-based control layer. The implementation is presented in the form of an offloading framework, whose use is demonstrated on two applications for the Android platform. Finally, the framework's performance and utility is evaluated by comparing offloaded and local executions of the same application. Powered by TCPDF (www.tcpdf.org)
Security and Trust in the DEECo Component Model
Štumpf, Ondřej ; Bureš, Tomáš (advisor) ; Kruliš, Martin (referee)
DEECo represents an example of a Cyber-Physical System (CPS) consisting of potentially vast number of components able to share data with each other. So far, access to data was not restricted, thus enabling components to exploit sensitive data owned by other components. The goal of this work is to analyze security threats in distributed environments such as DEECo and propose a security solution which would provide both physical security of component data and introduce an access control mechanism. However, while confidentiality may be critical to certain applications, data integrity is crucial to almost every one. This work therefore also proposes a trust model, which prevents components operating with defective or malicious data. Both proposed models are realized in jDEECo, a Java implementation of DEECo.

National Repository of Grey Literature : 11 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.