Search Results

Documents authored by Probst, Christian W.


Found 2 Possible Name Variants:

Probst, Christian W.

Document
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461)

Authors: Tyler W. Moore, Christian W. Probst, Kai Rannenberg, and Michel van Eeten

Published in: Dagstuhl Reports, Volume 6, Issue 11 (2017)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 16461 "Assessing ICT Security Risks in Socio-Technical Systems". As we progress from classic mechanical or electrical production systems, over ICT systems, to socio-technical systems, risk assessment becomes increasingly complex and difficult. Risk assessment for traditional engineering systems assumes the systems to be deterministic. In non-deterministic systems, standard procedure is to fix those factors that are not deterministic. These techniques do not scale to ICT systems where many risks are hard to trace due to the immaterial nature of information. Beyond ICT systems, socio-technical systems also contain human actors as integral parts of the system. In such socio-technical systems there may occur unforeseen interactions between the system, the environment, and the human actors, especially insiders. Assessing ICT security risks for socio-technical systems and their economic environment requires methods and tools that integrate relevant socio-technical security metrics. In this seminar we investigated systematic methods and tools to estimate those ICT security risks in socio-technical systems and their economic environment. In particular, we searched for novel security risk assessment methods that integrate different types of socio-technical security metrics.

Cite as

Tyler W. Moore, Christian W. Probst, Kai Rannenberg, and Michel van Eeten. Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461). In Dagstuhl Reports, Volume 6, Issue 11, pp. 63-89, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2017)


Copy BibTex To Clipboard

@Article{moore_et_al:DagRep.6.11.63,
  author =	{Moore, Tyler W. and Probst, Christian W. and Rannenberg, Kai and van Eeten, Michel},
  title =	{{Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461)}},
  pages =	{63--89},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2017},
  volume =	{6},
  number =	{11},
  editor =	{Moore, Tyler W. and Probst, Christian W. and Rannenberg, Kai and van Eeten, Michel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.6.11.63},
  URN =		{urn:nbn:de:0030-drops-70390},
  doi =		{10.4230/DagRep.6.11.63},
  annote =	{Keywords: economics of risk assessment, human factor, return on security investment, security risk management, socio-technical security}
}
Document
Secure Architectures in the Cloud (Dagstuhl Seminar 11492)

Authors: Sabrina De Capitani di Vimercati, Wolter Pieters, and Christian W. Probst

Published in: Dagstuhl Reports, Volume 1, Issue 12 (2012)


Abstract
This report documents the outcomes of Dagstuhl Seminar 11492 ``Secure Architectures in the Cloud''. In cloud computing, data storage and processing are offered as services, and data are managed by external providers that reside outside the control of the data owner. The use of such services reduces the burden of the owners in managing their data, and may provide significant cost savings. However, cloud computing introduces new security and privacy concerns. In fact, there is little consensus on how to guarantee the confidentiality, integrity, and availability of data in cloud computing scenarios. Also, it is unclear to what extent parties can be held accountable in case something goes wrong. In this seminar, we searched for architectures, modelling approaches, and mechanisms that can help in providing guarantees for cloud security. We proposed the concept of verification-as-a-service that can guide architectures for verification of cloud architectures and configurations, as well as results of computations. We also proposed architectures for organising customisability of security and privacy for cloud customers.

Cite as

Sabrina De Capitani di Vimercati, Wolter Pieters, and Christian W. Probst. Secure Architectures in the Cloud (Dagstuhl Seminar 11492). In Dagstuhl Reports, Volume 1, Issue 12, pp. 11-26, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)


Copy BibTex To Clipboard

@Article{decapitanidivimercati_et_al:DagRep.1.12.11,
  author =	{De Capitani di Vimercati, Sabrina and Pieters, Wolter and Probst, Christian W.},
  title =	{{Secure Architectures in the Cloud (Dagstuhl Seminar 11492)}},
  pages =	{11--26},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{1},
  number =	{12},
  editor =	{De Capitani di Vimercati, Sabrina and Pieters, Wolter and Probst, Christian W.},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.1.12.11},
  URN =		{urn:nbn:de:0030-drops-33843},
  doi =		{10.4230/DagRep.1.12.11},
  annote =	{Keywords: attestation, auditing, cloud computing, security architectures, security modelling, verification}
}
Document
Towards a Time-predictable Dual-Issue Microprocessor: The Patmos Approach

Authors: Martin Schoeberl, Pascal Schleuniger, Wolfgang Puffitsch, Florian Brandner, and Christian W. Probst

Published in: OASIcs, Volume 18, Bringing Theory to Practice: Predictability and Performance in Embedded Systems (2011)


Abstract
Current processors are optimized for average case performance, often leading to a high worst-case execution time (WCET). Many architectural features that increase the average case performance are hard to be modeled for the WCET analysis. In this paper we present Patmos, a processor optimized for low WCET bounds rather than high average case performance. Patmos is a dual-issue, statically scheduled RISC processor. The instruction cache is organized as a method cache and the data cache is organized as a split cache in order to simplify the cache WCET analysis. To fill the dual-issue pipeline with enough useful instructions, Patmos relies on a customized compiler. The compiler also plays a central role in optimizing the application for the WCET instead of average case performance.

Cite as

Martin Schoeberl, Pascal Schleuniger, Wolfgang Puffitsch, Florian Brandner, and Christian W. Probst. Towards a Time-predictable Dual-Issue Microprocessor: The Patmos Approach. In Bringing Theory to Practice: Predictability and Performance in Embedded Systems. Open Access Series in Informatics (OASIcs), Volume 18, pp. 11-21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)


Copy BibTex To Clipboard

@InProceedings{schoeberl_et_al:OASIcs.PPES.2011.11,
  author =	{Schoeberl, Martin and Schleuniger, Pascal and Puffitsch, Wolfgang and Brandner, Florian and Probst, Christian W.},
  title =	{{Towards a Time-predictable Dual-Issue Microprocessor: The Patmos Approach}},
  booktitle =	{Bringing Theory to Practice: Predictability and Performance in Embedded Systems},
  pages =	{11--21},
  series =	{Open Access Series in Informatics (OASIcs)},
  ISBN =	{978-3-939897-28-6},
  ISSN =	{2190-6807},
  year =	{2011},
  volume =	{18},
  editor =	{Lucas, Philipp and Wilhelm, Reinhard},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.PPES.2011.11},
  URN =		{urn:nbn:de:0030-drops-30774},
  doi =		{10.4230/OASIcs.PPES.2011.11},
  annote =	{Keywords: Time-predictable architecture, WCET analysis, WCET-aware compilation}
}
Document
10341 Abstracts Collection – Insider Threats: Strategies for Prevention, Mitigation, and Response

Authors: Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst

Published in: Dagstuhl Seminar Proceedings, Volume 10341, Insider Threats: Strategies for Prevention, Mitigation, and Response (2010)


Abstract
From August 22 to 26, 2010, the Dagstuhl Seminar 10341 ``Insider Threats: Strategies for Prevention, Mitigation, and Response'' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.

Cite as

Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst. 10341 Abstracts Collection – Insider Threats: Strategies for Prevention, Mitigation, and Response. In Insider Threats: Strategies for Prevention, Mitigation, and Response. Dagstuhl Seminar Proceedings, Volume 10341, pp. 1-12, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{bishop_et_al:DagSemProc.10341.1,
  author =	{Bishop, Matt and Coles-Kemp, Lizzie and Gollmann, Dieter and Hunker, Jeffrey and Probst, Christian W.},
  title =	{{10341 Abstracts Collection – Insider Threats: Strategies for Prevention, Mitigation, and Response}},
  booktitle =	{Insider Threats: Strategies for Prevention, Mitigation, and Response},
  pages =	{1--12},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10341},
  editor =	{Matt Bishop and Lizzie Coles-Kemp and Dieter Gollmann and Jeff Hunker and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10341.1},
  URN =		{urn:nbn:de:0030-drops-29046},
  doi =		{10.4230/DagSemProc.10341.1},
  annote =	{Keywords: Insider Threat, Security Policies, Threat Modelling}
}
Document
10341 Report – Insider Threats: Strategies for Prevention, Mitigation, and Response

Authors: Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst

Published in: Dagstuhl Seminar Proceedings, Volume 10341, Insider Threats: Strategies for Prevention, Mitigation, and Response (2010)


Abstract
This article summarizes the objectives and structure of a seminar with the same title, held from August 22nd to 26th, 2010, at Schloss Dagstuhl, Germany. The seminar brought together researchers and policy-makers from quite diverse communities, to make progress towards an integrated framework for understanding insider threats and their interaction with organizations and policies. During the seminar, social and organizational factors relevant to insider threats, were discussed, as well as urgent questions in four areas: synthesizing social science and technical research, metrics and assurance, language formulations and ontology, and the threats facing intangible systems. This report gives an overview of the discussions and presentations during the week, as well as the outcome of these discussions.

Cite as

Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst. 10341 Report – Insider Threats: Strategies for Prevention, Mitigation, and Response. In Insider Threats: Strategies for Prevention, Mitigation, and Response. Dagstuhl Seminar Proceedings, Volume 10341, pp. 1-13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{bishop_et_al:DagSemProc.10341.2,
  author =	{Bishop, Matt and Coles-Kemp, Lizzie and Gollmann, Dieter and Hunker, Jeffrey and Probst, Christian W.},
  title =	{{10341 Report – Insider Threats: Strategies for Prevention, Mitigation, and Response}},
  booktitle =	{Insider Threats: Strategies for Prevention, Mitigation, and Response},
  pages =	{1--13},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10341},
  editor =	{Matt Bishop and Lizzie Coles-Kemp and Dieter Gollmann and Jeff Hunker and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10341.2},
  URN =		{urn:nbn:de:0030-drops-29033},
  doi =		{10.4230/DagSemProc.10341.2},
  annote =	{Keywords: Insider Threat, Security Policies, Threat Modelling}
}
Document
08302 Abstracts Collection – Countering Insider Threats

Authors: Matt Bishop, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst

Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)


Abstract
From July 20 to July 25, 2008, the Dagstuhl Seminar 08302 ``Countering Insider Threats '' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.

Cite as

Matt Bishop, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst. 08302 Abstracts Collection – Countering Insider Threats. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-10, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{bishop_et_al:DagSemProc.08302.1,
  author =	{Bishop, Matt and Gollmann, Dieter and Hunker, Jeffrey and Probst, Christian W.},
  title =	{{08302 Abstracts Collection – Countering Insider Threats}},
  booktitle =	{Countering Insider Threats},
  pages =	{1--10},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8302},
  editor =	{Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.1},
  URN =		{urn:nbn:de:0030-drops-17960},
  doi =		{10.4230/DagSemProc.08302.1},
  annote =	{Keywords: Insider Threat, Security Policies, Threat Modelling}
}
Document
08302 Summary – Countering Insider Threats

Authors: Christian W. Probst, Jeffrey Hunker, Matt Bishop, and Dieter Gollmann

Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)


Abstract
This article summarizes the objectives and structure of a seminar with the same title, held from July 20th to July 25th, 2008, at Schloss Dagstuhl, Germany. The seminar brought together researchers and policy-makers from all involved communities, to clarify what it is that identifies an insider threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome of these discussions.

Cite as

Christian W. Probst, Jeffrey Hunker, Matt Bishop, and Dieter Gollmann. 08302 Summary – Countering Insider Threats. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{probst_et_al:DagSemProc.08302.2,
  author =	{Probst, Christian W. and Hunker, Jeffrey and Bishop, Matt and Gollmann, Dieter},
  title =	{{08302 Summary – Countering Insider Threats}},
  booktitle =	{Countering Insider Threats},
  pages =	{1--18},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8302},
  editor =	{Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.2},
  URN =		{urn:nbn:de:0030-drops-17937},
  doi =		{10.4230/DagSemProc.08302.2},
  annote =	{Keywords: Insider threat, workshop report}
}
Document
07041 Abstracts Collection – Power-aware Computing Systems

Authors: Luca Benini, Naehyuck Chang, Ulrich Kremer, and Christian W. Probst

Published in: Dagstuhl Seminar Proceedings, Volume 7041, Power-aware Computing Systems (2007)


Abstract
From January 21, 2007 to January 26, 2007, the Dagstuhl Seminar 07041``Power-aware Computing Systems'' was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and discussed ongoing work and open problems. This report compiles abstracts of the seminar presentations as well as the seminar results and ideas, providing hyperlinks to full papers wherever possible.

Cite as

Luca Benini, Naehyuck Chang, Ulrich Kremer, and Christian W. Probst. 07041 Abstracts Collection – Power-aware Computing Systems. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 7041, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)


Copy BibTex To Clipboard

@InProceedings{benini_et_al:DagSemProc.07041.1,
  author =	{Benini, Luca and Chang, Naehyuck and Kremer, Ulrich and Probst, Christian W.},
  title =	{{07041 Abstracts Collection – Power-aware Computing Systems}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--14},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2007},
  volume =	{7041},
  editor =	{Luca Benini and Naehyuck Chang and Ulrich Kremer and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07041.1},
  URN =		{urn:nbn:de:0030-drops-11248},
  doi =		{10.4230/DagSemProc.07041.1},
  annote =	{Keywords: Power consumption, energy reduction, compilers, microarchitectures, simulations, experimental frameworks}
}
Document
07041 Summary – Power-aware Computing Systems

Authors: Luca Benini, Naehyuck Chang, Ulrich Kremer, and Christian W. Probst

Published in: Dagstuhl Seminar Proceedings, Volume 7041, Power-aware Computing Systems (2007)


Abstract
The program of the Dagstuhl seminar 07041 on Power-aware Computing Systems featured presentations of about 25 participating researchers from academia and industry. They were chosen to represent major areas in targeting the energy consumption of a computing system – Applications, Compilers, Virtual-execution Environments, Operating Systems, and Hardware. In order to continue the work of the predecessor Dagstuhl seminar held in 2005, the results of that seminar [1] were discussed, with the aim of developing a vision of challenges, problems, and research activities in some of the key areas identified in 2005. The first part of the seminar was dedicated to lively discussions that led to the identification of three areas that were considered being most interesting. As a result, three groups were formed to further identify challenges and opportunities. The results of these groups are presented in this report. In addition, abstracts of the presentations as well as work-in-progress papers are published in these proceedings.

Cite as

Luca Benini, Naehyuck Chang, Ulrich Kremer, and Christian W. Probst. 07041 Summary – Power-aware Computing Systems. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 7041, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)


Copy BibTex To Clipboard

@InProceedings{benini_et_al:DagSemProc.07041.2,
  author =	{Benini, Luca and Chang, Naehyuck and Kremer, Ulrich and Probst, Christian W.},
  title =	{{07041 Summary – Power-aware Computing Systems}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--7},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2007},
  volume =	{7041},
  editor =	{Luca Benini and Naehyuck Chang and Ulrich Kremer and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07041.2},
  URN =		{urn:nbn:de:0030-drops-11232},
  doi =		{10.4230/DagSemProc.07041.2},
  annote =	{Keywords: Power-aware Computing Systems, Low-power Design, Parallelism and Power Consumption}
}
Document
07041 Working Group – Towards Interfaces for Integrated Performance and Power Analysis and Simulation

Authors: Chris Bleakley, Tom Clerckx, Harald Devos, Matthias Grumer, Alex Janek, Ulrich Kremer, Christian W. Probst, Phillip Stanley-Marbell, Christian Steger, Vasanth Venkatachalam, and Manuel Wendt

Published in: Dagstuhl Seminar Proceedings, Volume 7041, Power-aware Computing Systems (2007)


Abstract
In the design and optimization of power-aware computing systems, it is often desired to estimate power consumption at various levels of abstraction, e.g., at the transistor, gate, RTL, behavioral or transaction levels. Tools for power estimation at these different levels of abstraction require specialized expertise, e.g., understanding of device physics for circuit-level power estimation, and as such are necessarily developed by different research communities. In the optimization of complete platforms however, it is desired to be able to obtain aggregate power and performance estimates for the different components of a system, and this requires the ability to model the system at a mixture of levels of abstraction. One approach to enabling such cross-abstraction modeling, is to define a mechanism for interchange of data between tools at different layers of abstraction, for both static analysis and simulation-based studies. This document presents preliminary discussions on the requirements of such an interface.

Cite as

Chris Bleakley, Tom Clerckx, Harald Devos, Matthias Grumer, Alex Janek, Ulrich Kremer, Christian W. Probst, Phillip Stanley-Marbell, Christian Steger, Vasanth Venkatachalam, and Manuel Wendt. 07041 Working Group – Towards Interfaces for Integrated Performance and Power Analysis and Simulation. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 7041, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)


Copy BibTex To Clipboard

@InProceedings{bleakley_et_al:DagSemProc.07041.3,
  author =	{Bleakley, Chris and Clerckx, Tom and Devos, Harald and Grumer, Matthias and Janek, Alex and Kremer, Ulrich and Probst, Christian W. and Stanley-Marbell, Phillip and Steger, Christian and Venkatachalam, Vasanth and Wendt, Manuel},
  title =	{{07041 Working Group – Towards Interfaces for Integrated Performance and Power Analysis and Simulation}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--6},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2007},
  volume =	{7041},
  editor =	{Luca Benini and Naehyuck Chang and Ulrich Kremer and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07041.3},
  URN =		{urn:nbn:de:0030-drops-11072},
  doi =		{10.4230/DagSemProc.07041.3},
  annote =	{Keywords: Power Estimation Tools, Simulation, Tool Interfaces}
}
Document
05141 Abstracts Collection – Power-aware Computing Systems

Authors: Luca Benini, Ulrich Kremer, Christian W. Probst, and Peter Schelkens

Published in: Dagstuhl Seminar Proceedings, Volume 5141, Power-aware Computing Systems (2005)


Abstract
From 03.04.05 to 08.04.05, the Dagstuhl Seminar 05141 ``Power-aware Computing Systems'' was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and discussed open problems. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are collected in this paper. The first section describes the seminar topics and goals. Links to extended abstracts or full papers are provided, if available.

Cite as

Luca Benini, Ulrich Kremer, Christian W. Probst, and Peter Schelkens. 05141 Abstracts Collection – Power-aware Computing Systems. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 5141, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2005)


Copy BibTex To Clipboard

@InProceedings{benini_et_al:DagSemProc.05141.1,
  author =	{Benini, Luca and Kremer, Ulrich and Probst, Christian W. and Schelkens, Peter},
  title =	{{05141 Abstracts Collection – Power-aware Computing Systems}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--14},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2005},
  volume =	{5141},
  editor =	{Luca Benini and Ulrich Kremer and Christian W. Probst and Peter Schelkens},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.05141.1},
  URN =		{urn:nbn:de:0030-drops-3108},
  doi =		{10.4230/DagSemProc.05141.1},
  annote =	{Keywords: Energy dissipation, power reduction, measurement, management, performance}
}
Document
05141 Summary – Power-aware Computing Systems

Authors: Luca Benini, Ulrich Kremer, Christian W. Probst, and Peter Schelkens

Published in: Dagstuhl Seminar Proceedings, Volume 5141, Power-aware Computing Systems (2005)


Abstract
This paper summarizes the objectives and structure of a seminar with the same title, held from April 3rd to April 8th 2005 at Schloss Dagstuhl, Germany.

Cite as

Luca Benini, Ulrich Kremer, Christian W. Probst, and Peter Schelkens. 05141 Summary – Power-aware Computing Systems. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 5141, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2005)


Copy BibTex To Clipboard

@InProceedings{benini_et_al:DagSemProc.05141.2,
  author =	{Benini, Luca and Kremer, Ulrich and Probst, Christian W. and Schelkens, Peter},
  title =	{{05141 Summary – Power-aware Computing Systems}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--7},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2005},
  volume =	{5141},
  editor =	{Luca Benini and Ulrich Kremer and Christian W. Probst and Peter Schelkens},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.05141.2},
  URN =		{urn:nbn:de:0030-drops-3216},
  doi =		{10.4230/DagSemProc.05141.2},
  annote =	{Keywords: Power-aware architectures}
}
Document
A Multilevel Introspective Dynamic Optimization System For Holistic Power-Aware Computing

Authors: Vasanth Venkatachalam, Christian W. Probst, and Michael Franz

Published in: Dagstuhl Seminar Proceedings, Volume 5141, Power-aware Computing Systems (2005)


Abstract
Power consumption is rapidly becoming the dominant limiting factor for further improvements in computer design. Curiously, this applies both at the "high end" of workstations and servers and the "low end" of handheld devices and embedded computers. At the high-end, the challenge lies in dealing with exponentially growing power densities. At the low-end, there is a demand to make mobile devices more powerful and longer lasting, but battery technology is not improving at the same rate that power consumption is rising. Traditional power-management research is fragmented; techniques are being developed at specific levels, without fully exploring their synergy with other levels. Most software techniques target either operating systems or compilers but do not explore the interaction between the two layers. These techniques also have not fully explored the potential of virtual machines for power management. In contrast, we are developing a system that integrates information from multiple levels of software and hardware, connecting these levels through a communication channel. At the heart of this system are a virtual machine that compiles and dynamically profiles code, and an optimizer that reoptimizes all code, including that of applications and the virtual machine itself. We believe this introspective, holistic approach enables more informed power-management decisions.

Cite as

Vasanth Venkatachalam, Christian W. Probst, and Michael Franz. A Multilevel Introspective Dynamic Optimization System For Holistic Power-Aware Computing. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 5141, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2005)


Copy BibTex To Clipboard

@InProceedings{venkatachalam_et_al:DagSemProc.05141.3,
  author =	{Venkatachalam, Vasanth and Probst, Christian W. and Franz, Michael},
  title =	{{A Multilevel Introspective Dynamic Optimization System For Holistic Power-Aware Computing}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--14},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2005},
  volume =	{5141},
  editor =	{Luca Benini and Ulrich Kremer and Christian W. Probst and Peter Schelkens},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.05141.3},
  URN =		{urn:nbn:de:0030-drops-3099},
  doi =		{10.4230/DagSemProc.05141.3},
  annote =	{Keywords: Power-aware Computing, Virtual Machines, Dynamic Optimization}
}

Probst, Christian

Document
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501)

Authors: Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, and Christian Probst

Published in: Dagstuhl Reports, Volume 2, Issue 12 (2013)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 12501 "Organizational Processes for Supporting Sustainable Security" which ran from December 9 to 12, 2012 and was held in Schloss Dagstuhl--Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. We also ran a number of collaborative sessions designed to promote the development of design principles for sustainably secure organizational processes. The first section describes the seminar topics and goals in general. The following section contains abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper.

Cite as

Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, and Christian Probst. Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501). In Dagstuhl Reports, Volume 2, Issue 12, pp. 37-48, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{coleskemp_et_al:DagRep.2.12.37,
  author =	{Coles-Kemp, Lizzie and Gates, Carrie and Gollmann, Dieter and Peisert, Sean and Probst, Christian},
  title =	{{Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501)}},
  pages =	{37--48},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{12},
  editor =	{Coles-Kemp, Lizzie and Gates, Carrie and Gollmann, Dieter and Peisert, Sean and Probst, Christian},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.2.12.37},
  URN =		{urn:nbn:de:0030-drops-39881},
  doi =		{10.4230/DagRep.2.12.37},
  annote =	{Keywords: Insider threat, Organizational Process, Resilience, Security Policy}
}
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail