Default Cover Image

2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing

Sept. 29 2006 to Oct. 1 2006

Indianapolis, IN

Table of Contents

Introduction
Message from the General Co-ChairsFreely available from IEEE.pp. ix
Introduction
Organizing CommitteesFreely available from IEEE.pp. x-xii
Introduction
RefereesFreely available from IEEE.pp. xiii-xiv
Session 1: Autonomic Computing and Selfware
A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics SystemFull-text access may be available. Sign in or learn about subscription options.pp. 3-10
Session 1: Autonomic Computing and Selfware
Adaptable and Autonomic Mission Manager for Dependable Aerospace ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 11-18
Session 1: Autonomic Computing and Selfware
A Model-Driven Architecture Approach for Modeling, Specifying and Deploying Policies in Autonomous and Autonomic SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 19-30
Session 2: Cryptography
A Reliable (k, n) Image Secret Sharing SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
Session 2: Cryptography
Tamper-Evident Digital Signature Protecting Certification Authorities Against MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
Session 2: Cryptography
A Parallel GNFS Integrated with the Block Wiedemann?s Algorithm for Integer FactorizationFull-text access may be available. Sign in or learn about subscription options.pp. 45-50
Session 2: Cryptography
A CRT-RSA Algorithm Secure against Hardware Fault AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 51-60
Session 3: Autonomic Computing and Monitoring
A Game-Theoretic Approach to Stochastic Security and Dependability EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 61-68
Session 3: Autonomic Computing and Monitoring
Autonomous Decentralized Load Tracking Techniques and EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 69-76
Session 3: Autonomic Computing and Monitoring
Optimal Checkpoint Placement with Equality ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 77-84
Session 3: Autonomic Computing and Monitoring
Fault-Intrusion Tolerant Techniques in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 85-94
Session 4: Reliability and Security Modeling
Modeling Security Vulnerabilities: A Constraints and Assumptions PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 95-102
Session 4: Reliability and Security Modeling
Assessing Vulnerabilities in Apache and IIS HTTP ServersFull-text access may be available. Sign in or learn about subscription options.pp. 103-110
Session 4: Reliability and Security Modeling
Estimating Markov Modulated Software Reliability Models via EM AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 111-118
Session 4: Reliability and Security Modeling
Measuring Quantitative Dependability Attributes in Digital Publishing Using Petri Net Workflow ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 119-128
Session 5: Autonomy Supported by Grid and Pervasive Computing
Towards Reliable Rating Filtering in Grid Reputation Systems: A Pre-Evaluating Set Based Bias-Tuned Approach1Full-text access may be available. Sign in or learn about subscription options.pp. 129-136
Session 5: Autonomy Supported by Grid and Pervasive Computing
A Security-Supportive Middleware Architecture for Pervasive ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 137-144
Session 5: Autonomy Supported by Grid and Pervasive Computing
Self-Adaptive Pervasive Computing Application Based on Code MobilityFull-text access may be available. Sign in or learn about subscription options.pp. 145-154
Session 6: Network Security
A Dynamic Countermeasure Method for Large-Scale Network AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 163-170
Session 6: Network Security
A Solution to Single Point of Failure Using Voter Replication and Disagreement DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 171-176
Session 6: Network Security
Runtime Security Verification for Itinerary-Driven Mobile AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 177-186
Session 7: Self-Adaptation and Scheduling
A Satisficing MOMIP Framework for Reliable Real-time Application SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 187-194
Session 7: Self-Adaptation and Scheduling
Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based DatacentersFull-text access may be available. Sign in or learn about subscription options.pp. 195-202
Session 7: Self-Adaptation and Scheduling
SmartC: A Component-Based Hierarchical Modeling Language for Automotive ElectronicsFull-text access may be available. Sign in or learn about subscription options.pp. 203-210
Session 8: Autonomous Intrusion Detection
On Recognizing Virtual Honeypots and CountermeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 211-218
Session 8: Autonomous Intrusion Detection
A Self-Tuning Multicast Flow Control Scheme Based on Autonomic TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 219-226
Session 8: Autonomous Intrusion Detection
Autonomic Security and Self-Protection based on Feature-Recognition with Virtual NeuronsFull-text access may be available. Sign in or learn about subscription options.pp. 227-234
Session 8: Autonomous Intrusion Detection
Intelligent Autonomic Strategy to Attacks in Network Infrastructure Protection: Feedback Methods to IDS, Using Policies, Alert Filters and Firewall Packet Filters for Multiple ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 235-244
Session 9: Autonomy in Sensor Networks
Performance Evaluation of Adjusted Probabilistic Broadcasting in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 245-249
Session 9: Autonomy in Sensor Networks
Infrastructure Communication Reliability of Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 250-257
Session 9: Autonomy in Sensor Networks
Autonomic Sensor Networks: A New Paradigm for Collaborative Information ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 258-268
Session 10: Automated Trust Management
Architecture of Trustworthy NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 269-276
Session 10: Automated Trust Management
DRBTS: Distributed Reputation-based Beacon Trust SystemFull-text access may be available. Sign in or learn about subscription options.pp. 277-283
Session 10: Automated Trust Management
Trusted Mobile Interaction via Extended Digital CertificatesFull-text access may be available. Sign in or learn about subscription options.pp. 284-292
Session 11: Access Control
Aclamate: An AOSD Security Framework for Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 293-300
Session 11: Access Control
Composing Access Control Policies of Distributed ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 301-307
Session 11: Access Control
PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 308-314
Session 11: Access Control
An Algorithm for Privacy-Preserving Quantitative Association Rules MiningFull-text access may be available. Sign in or learn about subscription options.pp. 315-324
Session 12: Autonomic Computing and Context Awareness
Analysing Stream Authentication Protocols in Autonomous Agent-Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 325-332
Session 12: Autonomic Computing and Context Awareness
Automated Caching of Behavioral Patterns for Efficient Run-Time MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 333-340
Session 12: Autonomic Computing and Context Awareness
Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 341-348
Author Index
Author IndexFreely available from IEEE.pp. 349-350
Showing 49 out of 49