Michael Engel | TU Dortmund (original) (raw)

Papers by Michael Engel

Research paper thumbnail of Aspects in hardware: what do they look like?

Research paper thumbnail of Security Issues in On-Demand Grid and Cluster Computing

Research paper thumbnail of TECHNICAL REPORTS IN COMPUTER SCIENCE Technische Universität Dortmund Signal Analysis and Classification for Plasmon Assisted Microscopy of Nanoobjects

Research paper thumbnail of Automatic Extraction of Multi-Objective Aware Pipeline Parallelism Using Genetic Algorithms

Research paper thumbnail of Advancing Operating Systems via Aspect-Oriented Programming

Research paper thumbnail of Plea for a Holistic Analysis of the Relationship between Information Technology and Carbon-Dioxide Emissions

Research paper thumbnail of Improving Transient Memory Fault Resilience of an H.264 Decoder

Research paper thumbnail of Using Application Knowledge to Improve Embedded Systems Dependability

Research paper thumbnail of Signal Analysis and Classification for Plasmon Assisted Microscopy of Nanoobjects

Research paper thumbnail of Temporal Properties of Error Handling for Multimedia Applications

Research paper thumbnail of Embedded System Design 2.0: Rationale Behind a Textbook Revision

Research paper thumbnail of Unreliable yet Useful -- Reliability Annotations for Data in Cyber-Physical Systems

Research paper thumbnail of Design and Architectures for Dependable Embedded Systems

Research paper thumbnail of Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques

Journal of Parallel and …, Jan 1, 2006

In this paper, an analysis of security threats within service-oriented on-demand Grid computing e... more In this paper, an analysis of security threats within service-oriented on-demand Grid computing environments is presented. The analysis is based on identifying three levels of trust relationships and three types of Grid applications in on-demand computing; the trust relationships involve interactions among resource providers, middleware producers, solution producers, and users. The paper presents solutions for addressing the threats inherent to these three increasingly demanding levels. The solutions involve applying sandbox-based approaches using virtual machine technology and jailing mechanisms to ensure trust for the first two levels of on-demand Grid computing, as well as Trusted Computing Platform Alliance (TCPA) technology for the third level of on-demand Grid computing. A brief taxonomy of the presented solutions is introduced.

Research paper thumbnail of Supporting autonomic computing functionality via dynamic operating system kernel aspects

Proceedings of the 4th international conference …, Jan 1, 2005

... 4. APPLICATION EXAMPLES In this section, four examples implementing basic auto-nomic computin... more ... 4. APPLICATION EXAMPLES In this section, four examples implementing basic auto-nomic computing functionality, each providing support for one “self”-principleusing dynamic aspects are presented. 4.1 Self-Configuration ...

Research paper thumbnail of Design and Architectures for Dependable Embedded Systems

Research paper thumbnail of Aspects in hardware: what do they look like?

Research paper thumbnail of Security Issues in On-Demand Grid and Cluster Computing

Research paper thumbnail of TECHNICAL REPORTS IN COMPUTER SCIENCE Technische Universität Dortmund Signal Analysis and Classification for Plasmon Assisted Microscopy of Nanoobjects

Research paper thumbnail of Automatic Extraction of Multi-Objective Aware Pipeline Parallelism Using Genetic Algorithms

Research paper thumbnail of Advancing Operating Systems via Aspect-Oriented Programming

Research paper thumbnail of Plea for a Holistic Analysis of the Relationship between Information Technology and Carbon-Dioxide Emissions

Research paper thumbnail of Improving Transient Memory Fault Resilience of an H.264 Decoder

Research paper thumbnail of Using Application Knowledge to Improve Embedded Systems Dependability

Research paper thumbnail of Signal Analysis and Classification for Plasmon Assisted Microscopy of Nanoobjects

Research paper thumbnail of Temporal Properties of Error Handling for Multimedia Applications

Research paper thumbnail of Embedded System Design 2.0: Rationale Behind a Textbook Revision

Research paper thumbnail of Unreliable yet Useful -- Reliability Annotations for Data in Cyber-Physical Systems

Research paper thumbnail of Design and Architectures for Dependable Embedded Systems

Research paper thumbnail of Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques

Journal of Parallel and …, Jan 1, 2006

In this paper, an analysis of security threats within service-oriented on-demand Grid computing e... more In this paper, an analysis of security threats within service-oriented on-demand Grid computing environments is presented. The analysis is based on identifying three levels of trust relationships and three types of Grid applications in on-demand computing; the trust relationships involve interactions among resource providers, middleware producers, solution producers, and users. The paper presents solutions for addressing the threats inherent to these three increasingly demanding levels. The solutions involve applying sandbox-based approaches using virtual machine technology and jailing mechanisms to ensure trust for the first two levels of on-demand Grid computing, as well as Trusted Computing Platform Alliance (TCPA) technology for the third level of on-demand Grid computing. A brief taxonomy of the presented solutions is introduced.

Research paper thumbnail of Supporting autonomic computing functionality via dynamic operating system kernel aspects

Proceedings of the 4th international conference …, Jan 1, 2005

... 4. APPLICATION EXAMPLES In this section, four examples implementing basic auto-nomic computin... more ... 4. APPLICATION EXAMPLES In this section, four examples implementing basic auto-nomic computing functionality, each providing support for one “self”-principleusing dynamic aspects are presented. 4.1 Self-Configuration ...

Research paper thumbnail of Design and Architectures for Dependable Embedded Systems