One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be executed. A theoretically strong approach to defending against any type of code-injection attack is to create and use a process-specific instruction set that is created by a… (More)
The management of modern distributed systems is complicated by scale and dynamics. Scalable, decoupled communication establishes flexible, loosely coupled component relationships, and these relationships help meet the present demands on management. However, traditional decoupled addressing mechanisms tend to focus the addressing on only one of the parties… (More)
In order for Grids to become relied upon for critical infrastructure and scientific computing, Grid-wide management must be automated so that it is possible in quickly and comprehensively respond to or anticipate specific environmental changes and requirements. That is, due to the disjoint administration of Grids which results in high communication… (More)
Grids should not just be facilitating advances in science and engineering ; rather they should also be making an impact on our daily lives by enabling sophisticated applications such as new consumer services and support for homeland defense. This is not possible today because the poor grid dependabil-ity—which is tolerated by scientific users—would be… (More)
Large scale distributed systems—including human and software organizations—benefit from top-down command and control in order to survive threats and damage. Yet achieving top-down management organization over millions of components is a significant challenge. This raises the question: is top down control a valid approach to the survival management of very… (More)
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-today operation of the Grid infrastructure. The current approach for Grid management is generally to have geographically-distributed system administrators contact each other by phone or email to debug Grid behavior and… (More)
This paper explores domain arguments-arguments about why techniques, processes, and designs possess properties as believed by their domain experts. An elicitation technique for their recovery from domain documents is presented. This is followed by demonstrated application of the technique to several domain artifacts from aviation engineering. The elicited… (More)
This article consists of a collection of slides from the author's conference presentation.