Josva Kleist - Academia.edu (original) (raw)

Papers by Josva Kleist

Research paper thumbnail of Evaluation of Flex-Grid architecture for NREN optical networks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Surrogates in Øjeblik

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Number of Pages: 56

This report documents the attempt to raise security for clients against a threat model, with thes... more This report documents the attempt to raise security for clients against a threat model, with these three at-tacks; Man In The Middle (MITM), phishing, and tampering attacks. The analysis describes security mechanisms and existing technology to prevent the three attacks in the threat model. It was discovered in the analysis that there exists tech-nology to prevent MITM and phish-ing attacks, but no security mecha-nism exist to prevent tampering of Java client programs. Instead of designing and implement-ing existing technology as secu-rity mechanisms to prevent MITM and phishing attacks, the project should be, to design and imple-ment a possible tamper-proofing se-curity mechanism for Java client programs. In the design and imple-mentation chapters, documentation of the prototype tamper-proofing se-curity mechanism is found. The test shows that the security mechanism is not sufficient, to en-sure that the client was actual tamper-proof. However, when the prototype was tested, a nice ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Mid-term self evaluation report for SNF project no. 21-03-0243

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Group Members

Distributed systems and semantics, operating system architectures, formal security models

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IEEE Fourth International Conference on eScience, 2008. eScience '08

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Process Calculi with Asynchronous Communication: Master's Thesis

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Computer Science - Research Evaluation: 2001 - 2005

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Surrogates in jeblik : Towards Migration in

In Cardelli's lexically scoped, distributed, object-based programming language Obliq, object ... more In Cardelli's lexically scoped, distributed, object-based programming language Obliq, object migration was suggested as creating a (remote) copy of an objects' state at the target site, followed by turning the (local) object itself into a surro-gate, i.e. a pointer to the just created remote copy. This kind of migration is only safe |migrated objects shall behave the same before and after migration|if it is protected and serialized. Protected objects can only be accessed by clients via selection, and within a serialized object at most one method can be active at any time. Yet, since Obliq does not have a formal semantics, there is no proof of this claim. In this abstract, we consider the act of creating object surrogates as an abstraction of the above-mentioned style of migration. We introduce the language jeblik, a simpliied distribution-free subset of Obliq, and give its formal semantics in terms of an encoding into the-calculus. This semantics shall provide the ground for...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Best Practices for Cloud Provider Connectivity for RE Users

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Laboratory Description: The Mindpass-CDS Laboratory

Bookmarks Related papers MentionsView impact

Research paper thumbnail of ALICE—ARC integration

Journal of Physics: Conference Series, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Surrogater i Øjeblik: mod migrerering i Obliq

Bookmarks Related papers MentionsView impact

Research paper thumbnail of This document in subdirectoryRS/98/52/ Imperative Objects and Mobile Processes

Reproduction of all or part of this work is permitted for educational or research use on conditio... more Reproduction of all or part of this work is permitted for educational or research use on condition that this copyright notice is included in any copy. See back inner page for a list of recent BRICS Report Series publications. Copies may be obtained by contacting: BRICS

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Local pi-Calculus at Work: Mobile Objects as Mobile Processes

. Obliq is a distributed, object-based programming language. In Obliq, the migration of an object... more . Obliq is a distributed, object-based programming language. In Obliq, the migration of an object is proposed as creating a clone of the object at the target site, whereafter the original object is turned into an alias for the clone. Obliq has an only informal semantics, so there is no proof that this style of migration is correct, i.e., transparent to object clients. In this paper, we focus on jeblik, an abstraction of Obliq. We give a -calculus semantics to jeblik, and we use it to formally prove the correctness of object surrogation, an abstraction of object migration. 1 Introduction The work presented in this paper is in line with the research activity to use the -calculus as a toolbox for reasoning about distributed object-oriented programming languages. Former works on the semantics of objects as processes have shown the value of this approach: while [22, 9, 19, 10] have focused on just providing formal semantics to object-oriented languages and language features, th...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Project Description: Mindpass Center for Distributed Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Studying CO2 Sequestration with the Power of Supercomputing

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Proceedings of Tbilisi Symposium on Language, Logic, and Computation

Bookmarks Related papers MentionsView impact

Research paper thumbnail of GÉANT perfSONAR MDM-based circuit monitoring in a multidomain environment

IEEE Communications Magazine, 2014

ABSTRACT Global research collaborations today require reliable and secure dedicated network conne... more ABSTRACT Global research collaborations today require reliable and secure dedicated network connections to facilitate data communications between collaborating partners. To deal with the deluge of data, dedicated connections are needed to transport data in a highly efficient manner. Managing such links, which often cross multiple administrative domains with heterogeneous infrastructure, poses many compelling research challenges, one of which is interdomain network monitoring. In this article, a multidomain circuit monitoring system, CMon, is introduced. Using some services of G??ANT perfSONAR MDM, CMon is able to provide end-to-end circuit monitoring services with great flexibility, extensibility, and vendor independence, regardless of the underlying circuit provisioning systems. The architecture of CMon, by using measurement federations, can adapt to either changes in the circuit provisioning system or expansion of network size.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Aliasing Models for Object Migration⋆

Lecture Notes in Computer Science, 1999

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Evaluation of Flex-Grid architecture for NREN optical networks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Surrogates in Øjeblik

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Number of Pages: 56

This report documents the attempt to raise security for clients against a threat model, with thes... more This report documents the attempt to raise security for clients against a threat model, with these three at-tacks; Man In The Middle (MITM), phishing, and tampering attacks. The analysis describes security mechanisms and existing technology to prevent the three attacks in the threat model. It was discovered in the analysis that there exists tech-nology to prevent MITM and phish-ing attacks, but no security mecha-nism exist to prevent tampering of Java client programs. Instead of designing and implement-ing existing technology as secu-rity mechanisms to prevent MITM and phishing attacks, the project should be, to design and imple-ment a possible tamper-proofing se-curity mechanism for Java client programs. In the design and imple-mentation chapters, documentation of the prototype tamper-proofing se-curity mechanism is found. The test shows that the security mechanism is not sufficient, to en-sure that the client was actual tamper-proof. However, when the prototype was tested, a nice ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Mid-term self evaluation report for SNF project no. 21-03-0243

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Group Members

Distributed systems and semantics, operating system architectures, formal security models

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IEEE Fourth International Conference on eScience, 2008. eScience '08

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Process Calculi with Asynchronous Communication: Master's Thesis

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Computer Science - Research Evaluation: 2001 - 2005

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Surrogates in jeblik : Towards Migration in

In Cardelli's lexically scoped, distributed, object-based programming language Obliq, object ... more In Cardelli's lexically scoped, distributed, object-based programming language Obliq, object migration was suggested as creating a (remote) copy of an objects' state at the target site, followed by turning the (local) object itself into a surro-gate, i.e. a pointer to the just created remote copy. This kind of migration is only safe |migrated objects shall behave the same before and after migration|if it is protected and serialized. Protected objects can only be accessed by clients via selection, and within a serialized object at most one method can be active at any time. Yet, since Obliq does not have a formal semantics, there is no proof of this claim. In this abstract, we consider the act of creating object surrogates as an abstraction of the above-mentioned style of migration. We introduce the language jeblik, a simpliied distribution-free subset of Obliq, and give its formal semantics in terms of an encoding into the-calculus. This semantics shall provide the ground for...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Best Practices for Cloud Provider Connectivity for RE Users

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Laboratory Description: The Mindpass-CDS Laboratory

Bookmarks Related papers MentionsView impact

Research paper thumbnail of ALICE—ARC integration

Journal of Physics: Conference Series, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Surrogater i Øjeblik: mod migrerering i Obliq

Bookmarks Related papers MentionsView impact

Research paper thumbnail of This document in subdirectoryRS/98/52/ Imperative Objects and Mobile Processes

Reproduction of all or part of this work is permitted for educational or research use on conditio... more Reproduction of all or part of this work is permitted for educational or research use on condition that this copyright notice is included in any copy. See back inner page for a list of recent BRICS Report Series publications. Copies may be obtained by contacting: BRICS

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Local pi-Calculus at Work: Mobile Objects as Mobile Processes

. Obliq is a distributed, object-based programming language. In Obliq, the migration of an object... more . Obliq is a distributed, object-based programming language. In Obliq, the migration of an object is proposed as creating a clone of the object at the target site, whereafter the original object is turned into an alias for the clone. Obliq has an only informal semantics, so there is no proof that this style of migration is correct, i.e., transparent to object clients. In this paper, we focus on jeblik, an abstraction of Obliq. We give a -calculus semantics to jeblik, and we use it to formally prove the correctness of object surrogation, an abstraction of object migration. 1 Introduction The work presented in this paper is in line with the research activity to use the -calculus as a toolbox for reasoning about distributed object-oriented programming languages. Former works on the semantics of objects as processes have shown the value of this approach: while [22, 9, 19, 10] have focused on just providing formal semantics to object-oriented languages and language features, th...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Project Description: Mindpass Center for Distributed Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Studying CO2 Sequestration with the Power of Supercomputing

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Proceedings of Tbilisi Symposium on Language, Logic, and Computation

Bookmarks Related papers MentionsView impact

Research paper thumbnail of GÉANT perfSONAR MDM-based circuit monitoring in a multidomain environment

IEEE Communications Magazine, 2014

ABSTRACT Global research collaborations today require reliable and secure dedicated network conne... more ABSTRACT Global research collaborations today require reliable and secure dedicated network connections to facilitate data communications between collaborating partners. To deal with the deluge of data, dedicated connections are needed to transport data in a highly efficient manner. Managing such links, which often cross multiple administrative domains with heterogeneous infrastructure, poses many compelling research challenges, one of which is interdomain network monitoring. In this article, a multidomain circuit monitoring system, CMon, is introduced. Using some services of G??ANT perfSONAR MDM, CMon is able to provide end-to-end circuit monitoring services with great flexibility, extensibility, and vendor independence, regardless of the underlying circuit provisioning systems. The architecture of CMon, by using measurement federations, can adapt to either changes in the circuit provisioning system or expansion of network size.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Aliasing Models for Object Migration⋆

Lecture Notes in Computer Science, 1999

Bookmarks Related papers MentionsView impact