Skip to main content

Showing 1–6 of 6 results for author: Barletta, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.11169  [pdf, other

    cs.DC

    Mutiny! How does Kubernetes fail, and what can we do about it?

    Authors: Marco Barletta, Marcello Cinque, Catello Di Martino, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer

    Abstract: In this paper, we i) analyze and classify real-world failures of Kubernetes (the most popular container orchestration system), ii) develop a framework to perform a fault/error injection campaign targeting the data store preserving the cluster state, and iii) compare results of our fault/error injection experiments with real-world failures, showing that our fault/error injections can recreate many… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

  2. arXiv:2403.19042  [pdf

    cs.DC

    Orchestrating Mixed-Criticality Cloud Workloads in Reconfigurable Manufacturing Systems

    Authors: Marco Barletta, Marcello Cinque, Davide De Vita

    Abstract: The adoption of cloud computing technologies in the industry is paving the way to new manufacturing paradigms. In this paper we propose a model to optimize the orchestration of workloads with differentiated criticality levels on a cloud-enabled factory floor. Preliminary results show that it is possible to optimize the guarantees to deployed jobs without penalizing the number of schedulable jobs.… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: S. Bernardi, T. Zoppi (Editors), Fast Abstracts and Student Forum Proceedings - EDCC 2024 - 19th European Dependable Computing Conference, Leuven, Belgium, 8-11 April 2024

  3. arXiv:2209.01843  [pdf, other

    cs.DC cs.OS

    RunPHI: Enabling Mixed-criticality Containers via Partitioning Hypervisors in Industry 4.0

    Authors: Marco Barletta, Marcello Cinque, Luigi De Simone, Raffaele Della Corte, Giorgio Farina, Daniele Ottaviano

    Abstract: Orchestration systems are becoming a key component to automatically manage distributed computing resources in many fields with criticality requirements like Industry 4.0 (I4.0). However, they are mainly linked to OS-level virtualization, which is known to suffer from reduced isolation. In this paper, we propose RunPHI with the aim of integrating partitioning hypervisors, as a solution for assuring… ▽ More

    Submitted 5 September, 2022; originally announced September 2022.

    Comments: 2 pages, accepted for publication in Proc. ISSREW, 2022

  4. Introducing k4.0s: a Model for Mixed-Criticality Container Orchestration in Industry 4.0 (extended)

    Authors: Marco Barletta, Marcello Cinque, Luigi De Simone, Raffaele Della Corte

    Abstract: Time predictable edge cloud is seen as the answer for many arising needs in Industry 4.0 environments, since it is able to provide flexible, modular, and reconfigurable services with low latency and reduced costs. Orchestration systems are becoming the core component of clouds since they take decisions on the placement and lifecycle of software components. Current solutions start introducing real-… ▽ More

    Submitted 4 January, 2023; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: This paper is an extended version of the paper published at "2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress"

    ACM Class: C.m

    Journal ref: 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress

  5. arXiv:1206.3180  [pdf, other

    cs.LO

    Automated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities (Extended Version)

    Authors: Michele Barletta, Silvio Ranise, Luca ViganĂ²

    Abstract: The advance of web services technologies promises to have far-reaching effects on the Internet and enterprise networks allowing for greater accessibility of data. The security challenges presented by the web services approach are formidable. In particular, access control solutions should be revised to address new challenges, such as the need of using certificates for the identification of users an… ▽ More

    Submitted 14 June, 2012; originally announced June 2012.

  6. arXiv:0906.4570  [pdf, other

    cs.CR cs.LO

    Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version)

    Authors: Michele Barletta, Silvio Ranise, Luca ViganĂ²

    Abstract: A widespread design approach in distributed applications based on the service-oriented paradigm, such as web-services, consists of clearly separating the enforcement of authorization policies and the workflow of the applications, so that the interplay between the policy level and the workflow level is abstracted away. While such an approach is attractive because it is quite simple and permits on… ▽ More

    Submitted 25 June, 2009; originally announced June 2009.

    Comments: 16 pages, 4 figures, full version of paper at Symposium on Secure Computing (SecureCom09)

    ACM Class: C.2.2; D.2.4