skip to main content
10.1145/1289971.1289999acmconferencesArticle/Chapter ViewAbstractPublication PagesgpceConference Proceedingsconference-collections
Article

Aspects of availability

Published: 01 October 2007 Publication History

Abstract

In this paper, we propose a domain-specific aspect language to prevent the denials of service caused by resource management. Our aspects specify availability policies by enforcing time limits in the allocation of resources. In our language, aspects can be seen as formal timed properties on execution traces. Programs and aspects are specified as timed automata and the weaving process as an automata product. The benefit of this formal approach is two-fold: the user keeps the semantic impact of weaving under control and (s)he can use a model-checker to optimize the woven program and verify availability properties.

References

[1]
K. Altisen, F. Maraninchi, and D. Stauch. Aspect-oriented programming for reactive systems: Larissa, a proposal in the synchronous framework. Sci. Comput. Program., 63(3):297--320, 2006.
[2]
R. Alur. Timed automata. In Computer Aided Verification, pages 8--22, 1999.
[3]
R. Alur and D. L. Dill. A theory of timed automata. Theoretical Computer Science, 126(2):183--235, 1994.
[4]
J. Bengtsson and W. Yi. Timed automata: Semantics, algorithms and tools. In Concurrency and Petri Nets, LNCS vol. 3098. Springer-Verlag, 2004.
[5]
W. Binder, J. G. Hulaas, and A. Villaz. Portable resource control in java. In OOPSLA '01: Proceedings of the 16th ACM SIGPLAN conference on Object oriented programming, systems, languages, and applications, pages 139--155. ACM Press, 2001.
[6]
T. Colcombet and P. Fradet. Enforcing trace properties by program transformation. In Symposium on Principles of Programming Languages (POPL'00), pages 54--66, 2000.
[7]
F. Cuppens and C. Saurel. Towards a formalization of availability and denial of service. In Inf. Syst. Tech. Panel Symp. on Protecting Nato Information Systems in the 21st century, 1999.
[8]
R. Douence, P. Fradet, and M. Südholt. A framework for the detection and resolution of aspect interactions. In Proc. of Conference on Generative Programming and Component Engineering (GPCE'02), LNCS vol. 2487. Springer-Verlag, 2002.
[9]
R. Douence, P. Fradet, and M. Südholt. Trace-based aspects. In M. Aksit, S. Clarke, T. Elrad, and R. Filman, editors, Aspect-Oriented Software Development, pages 201--217. Addison-Wesley, 2004.
[10]
P. Fradet and S. Hong Tuan Ha. Network fusion. In Prog. Lang. and Syst.: Second Asian Symposium, (APLAS'04), LNCS vol. 3302, 2004.
[11]
P. Fradet and S. Hong Tuan Ha. Systèmes de gestion de ressources et aspects de disponibilité. In 2nd Journée sur le Développement de Logiciels Par Aspects (JFDLPA 2005), Sept. 2005.
[12]
P. Fradet and S. Hong Tuan Ha. Systèmes de gestion de ressources et aspects de disponibilité. L'Objet - Logiciel, bases de données, réseaux, 12(2-3):183--210, Sept. 2006.
[13]
S. Hong Tuan Ha. Programmation par aspects et tissage de propriétés. Application à l'ordonnancement et à la disponibilité. PhD thesis, Rennes University, Jan. 2007.
[14]
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An overview of AspectJ. Lecture Notes in Computer Science, 2072:327--355, 2001.
[15]
J.-C. Laprie. Dependability: Basic Concepts and Terminology. Dependable Computing and Fault-Tolerant Systems. Springer, 1992.
[16]
K. G. Larsen, P. Pettersson, and W. Yi. UPPAAL in a nutshell. Int. J. on Software Tools for Technology Transfer, 1(1-2):134--152, 1997.
[17]
X. Li, T. Mitra, and A. Roychoudhury. Modeling control speculation for timing analysis. Real-Time Syst., 29(1):27--58, 2005.
[18]
J. Ligatti, L. Bauer, and D. Walker. Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Security, 4(1-2):2--16, 2005.
[19]
J. K. Millen. A resource allocation model for denial of service protection. Journal of Computer Security, 2(2), 1994.
[20]
V. K. Nandivada and J. Palsberg. Timing analysis of tcp servers for surviving denial-of-service attacks. In IEEE Real-Time and Embedded Technology and Applications Symp., pages 541--549, 2005.
[21]
P. Puschner and C. Koza. Calculating the maximum, execution time of real-time programs. Real-Time Syst., 1(2):159--176, 1989.
[22]
J. Rushby. Critical system properties: Survey and taxonomy. Reliability Engineering and Systems Safety, 43(2):189--219, 1994.
[23]
F. B. Schneider. Enforceable security policies. ACM Transactions on Information and System Security, 3(1):1--50, Feb. 2000.
[24]
H. Sipma. A formal model for cross-cutting modular transition systems. In Workshop on Foundations of Aspect-Oriented Languages (FOAL'03), 2003.
[25]
C.-F. Yu and V. D. Gligor. A specification and verification method for preventing denial of service. IEEE Trans. Soft. Eng., 16(6), 1990.

Cited By

View all
  • (2008)Aspects preserving propertiesProceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation10.1145/1328408.1328429(135-145)Online publication date: 7-Jan-2008
  • (2008)Specialized Aspect Languages Preserving Classes of PropertiesProceedings of the 2008 Sixth IEEE International Conference on Software Engineering and Formal Methods10.1109/SEFM.2008.21(227-236)Online publication date: 10-Nov-2008

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GPCE '07: Proceedings of the 6th international conference on Generative programming and component engineering
October 2007
206 pages
ISBN:9781595938558
DOI:10.1145/1289971
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. aspect-oriented programming
  2. availability
  3. denial of service
  4. resource management
  5. timed automata
  6. weaving

Qualifiers

  • Article

Conference

GPCE '07

Acceptance Rates

Overall Acceptance Rate 56 of 180 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2008)Aspects preserving propertiesProceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation10.1145/1328408.1328429(135-145)Online publication date: 7-Jan-2008
  • (2008)Specialized Aspect Languages Preserving Classes of PropertiesProceedings of the 2008 Sixth IEEE International Conference on Software Engineering and Formal Methods10.1109/SEFM.2008.21(227-236)Online publication date: 10-Nov-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media