Default Cover Image

Dependability, International Conference on

June 18 2009 to June 23 2009

Athens/Glyfada, Greece

ISBN: 978-0-7695-3666-8

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-vii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
PrefaceFreely available from IEEE.pp. viii-ix
Papers
CommitteeFreely available from IEEE.pp. x-xii
ReviewersFreely available from IEEE.pp. xiii-xiv
Papers
A Dependable Threshold Broadcast Encryption System for Key Distribution in Mobile Ad Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Current and Emerging Security, Trust, Dependability and Privacy Challenges in Mobile TelecommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Papers
The Design and Analysis of IN Disaster Tolerant System Based on Birth-Death ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
Papers
TMAC: Taint-Based Memory Protection via Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 19-27
Papers
An Algorithm Based Fault Tolerant Scheme for Elliptic Curve Public-Key CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 28-33
Papers
A Secure and Survivable Architecture for SCADA SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 34-39
Papers
Quantitative Assessment for Organisational Security & DependabilityFull-text access may be available. Sign in or learn about subscription options.pp. 40-45
Papers
Planning Dependability of Virtualised NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 46-51
Papers
AFPL2, an Abstract Language for Firewall ACLs with NAT SupportFull-text access may be available. Sign in or learn about subscription options.pp. 52-59
Papers
Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT)Full-text access may be available. Sign in or learn about subscription options.pp. 60-65
Papers
An Appraisal to Assess the Security of Database ConfigurationsFull-text access may be available. Sign in or learn about subscription options.pp. 73-80
Papers
[Publisher's information]Freely available from IEEE.pp. 174
Papers
Formalizing Safety Requirements Using Controlling AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 81-86
Papers
An Investigation of Fault Tolerance Behavior of 32-Bit DLX ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 93-98
Papers
Gaining Assurance in a Voter-Verifiable Voting SystemFull-text access may be available. Sign in or learn about subscription options.pp. 99-104
Papers
A Logging Approach for Effective Dependability Evaluation of Complex SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 105-110
Papers
Development of Applications Based on Security PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 111-116
Papers
Hands on Dependability EconomicsFull-text access may be available. Sign in or learn about subscription options.pp. 117-121
Papers
Extending Test-Driven Development for Robust Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 122-127
Papers
Dynamically Configurable Membership Support for Dependable Applications in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 128-135
Papers
Almost Triggerless Writeset Extraction in Multiversioned DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 136-142
Papers
Managing the Impact of On-chip Temperature on the Lifetime Reliability of Reliably Overclocked SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
Papers
Modelling and Evaluation of a Game-Theory Approach for Airborne Conflict Resolution in Omnet++Full-text access may be available. Sign in or learn about subscription options.pp. 162-165
Papers
Statistical Model Checking for Steady State Dependability VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 166-169
Papers
Author IndexFreely available from IEEE.pp. 171-172
Showing 36 out of 36