PhD Student at the University of Victoria
warning: Creating default object from empty value in /home/chr10000/public_html/modules/taxonomy/taxonomy.pages.inc on line 34.

Papers

GENICloud and TransCloud: Towards a Standard Interface for Cloud Federates @ WCS&OCS-2012

In this paper, we argue that federation of cloud systems re- quires a standard API for users to create, manage, and destroy virtual objects, and a standard naming scheme for virtual ob- jects. We introduce an existing API for this purpose, the Slice- Based Federation Architecture, and demonstrate that it can be implemented on a number of existing cloud management sys- tems. We introduce a simple naming scheme for virtual objects, and discuss its implementation.

Maitland: Lighter-Weight VM Introspection to Support Cyber-Security in the Cloud @ IEEE Cloud 2012

Despite defensive advances, malicious software (mal- ware) remains an ever present cyber-security threat. Cloud environments are far from malware immune, in that: i) they innately support the execution of remotely supplied code, and ii) escaping their virtual machine (VM) confines has proven relatively easy to achieve in practice. The growing interest in clouds by industries and governments is also creating a core need to be able to formally address cloud security and privacy issues. VM introspection provides one of the core cyber-security tools for analyzing the run-time behaviors of code.

Lind: Challenges turning virtual composition into reality @ FreeCo 2011

Security is a constant sore spot in application development. Applications now need structural support for better isolation and security on a domain specific basis to stave off the multitude of modern security vulnerabilities. Currently, application developers have been relying upon cumbersome workarounds to address these issues.

Et (smart) phone home!

Most home users are not able to troubleshoot advanced network issues themselves. Hours on the phone with an ISP's customer representative is a common way to solve this problem. With the advent of mobile devices with both Wi-Fi and cellular radios, troubleshooters at the ISP have a new back-door into a malfunctioning residential network. However, placing full trust in an ISP is a poor choice for a home user. In this paper we present Extra Technician (ET), a system designed to provide ISPs and others with an environment to troubleshoot home networking in a remote, safe and flexible manner.

TRANSCLOUD: Design Considerations for a High-Performance Cloud Architecture Across Multiple Administrative Domains @ CLOSER 2011

In this position paper, we consider architectures of distributed interconnected clouds across geographically distributed, independently-administered storage and computation clusters. We consider two problems:federation of access across heterogeneous administrative domains, and computation jobs run over the wide area and heterogeneous data sets. We argue that a single, flexible architecture, analogous to the TCP/IP stack for networking, is sufficient to support these jobs, and outline its major elements.

NanoXen: Better Systems Through Rigorous Containment and Active Modeling @ SAVCBS2010

Proceedings of the 2010 workshop on Specification and Verification of Component-Based Systems (SAVCBS'10)

 

Overcast: Eclipsing High Pro le Open Source Cloud Initiatives @ OOPSLA09 Cloud Computing Workshop

Can Cloud Computing be used without the traditional clustered, high-availability and highly complicated software stacks from big vendors or high profile open source initiatives? This paper presents the position that by leveraging the virtualization that is inherent in the cloud, we can recompose cloud systems out of more simple building blocks, breaking the dependancy on complicated software stacks and creating more secure and reliable systems than at present.

Virtualized Recomposition: Cloudy or Clear? Workshop on Software Engineering Challenges in Cloud Computing @ ICSE 2009

Virtualization provides a coarse-grained isolation mechanism that results in large systems, with full operating systems and a complete software stack as their foundation. Though much of this foundation is not strictly necessary, the programmatic burden of building systems at a finer-granularity, on a smaller foundation, has previously been shown to be prohibitive.

Quantifying Artifacts of Virtualization: A Framework for Mirco-Benchmarks QuEST09 @ AINA

One of the novel benefits of virtualization is the ability to emulate many hosts with a single physical machine.  This approach is often used to support at-scale testing for large-scale distributed systems.  In order to better understand the precise ways in which virtual machines differ from their physical counterparts, we have started to quantify some of the timing artifacts that appear to be common to two modern approaches to virtualization. Here we present several systematic experiments that highlight four timing artifacts, and begin to decipher their origins within vi