Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DEPEND
DEPEND 2009
Generate Citations
Dependability, International Conference on
June 18 2009 to June 23 2009
Athens/Glyfada, Greece
ISBN: 978-0-7695-3666-8
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-vii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Preface
Freely available from IEEE.
pp. viii-ix
Papers
Committee
Freely available from IEEE.
pp. x-xii
Reviewers
Freely available from IEEE.
pp. xiii-xiv
Papers
A Dependable Threshold Broadcast Encryption System for Key Distribution in Mobile Ad Hoc Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Piyi Yang
,
Zhenfu Cao
,
Xiaolei Dong
Papers
Current and Emerging Security, Trust, Dependability and Privacy Challenges in Mobile Telecommunications
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Reijo M. Savola
Papers
The Design and Analysis of IN Disaster Tolerant System Based on Birth-Death Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-18
by
Hong-man Wang
,
Fang-chun Yang
,
Gu-yue Han
Papers
TMAC: Taint-Based Memory Protection via Access Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-27
by
Lei Wang
,
Chen Fang
,
Bing Mao
,
Li Xie
Papers
An Algorithm Based Fault Tolerant Scheme for Elliptic Curve Public-Key Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-33
by
Chang N. Zhang
,
Xiao Wei Liu
Papers
A Secure and Survivable Architecture for SCADA Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-39
by
I. Nai Fovino
,
A. Carcano
,
M. Masera
Papers
Quantitative Assessment for Organisational Security & Dependability
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-45
by
Yudistira Asnar
,
Massimo Felici
,
Fabio Massacci
,
Alessandra Tedeschi
,
Artsiom Yautsiukhin
Papers
Planning Dependability of Virtualised Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-51
by
Marco D. Aime
,
Paolo Carlo Pomi
,
Marco Vallini
Decision Support Console for System Administration Based on an Expert System Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Francisco José de la Torre
,
Laura García Munoz
,
Roberto González Barahona
,
Maite Avelino Carmona
,
Manuel Gil Perez
Papers
AFPL2, an Abstract Language for Firewall ACLs with NAT Support
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-59
by
S. Pozo
,
A. J. Varela-Vaca
,
R. M. Gasca
Papers
Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT)
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-65
by
Anantha K. Bangalore
,
Arun K. Sood
Papers
Towards a Policy-Driven Framework for Managing Service Dependability
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-72
by
Jorge Bernal Bernabé
,
Juan M. Marín Pérez
,
Daniel J. Martínez Manzano
,
Manuel Gil Pérez
,
Antonio F. Gómez Skarmeta
Papers
An Appraisal to Assess the Security of Database Configurations
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-80
by
Afonso Araújo Neto
,
Marco Vieira
,
Henrique Madeira
Papers
[Publisher's information]
Freely available from IEEE.
pp. 174
Papers
Formalizing Safety Requirements Using Controlling Automata
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-86
by
Zhe Chen
,
Gilles Motet
Papers
Lock-Free Synchronization of Data Flow between Time-Triggered and Event-Triggered Activities in a Dependable Real-Time System
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-92
by
Josef Templ
,
Johannes Pletzer
,
Wolfgang Pree
Papers
An Investigation of Fault Tolerance Behavior of 32-Bit DLX Processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-98
by
Pooria M. Yaghini
,
Hamid R. Zarandi
,
Ashkan Eghbal
,
Akbar Jafarzadeh
,
Saeedeh Eskandari
Papers
Gaining Assurance in a Voter-Verifiable Voting System
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-104
by
Eugenio Alberdi
,
Lorenzo Strigini
,
Kieran Leach
,
Peter Ryan
,
Philippe Palanque
,
Marco Winckler
Papers
A Logging Approach for Effective Dependability Evaluation of Complex Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-110
by
M. Cinque
,
D. Cotroneo
,
A. Pecchia
Papers
Development of Applications Based on Security Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-116
by
Daniel Serrano
,
José F. Ruiz
,
Antonio Munoz
,
Antonio Mana
,
Alvaro Armenteros
,
Beatriz Gallego-Nicaso Crespo
Papers
Hands on Dependability Economics
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-121
by
Theodosios Tsiakis
,
Panagiotis Katsaros
Papers
Extending Test-Driven Development for Robust Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-127
by
Nuno Laranjeiro
,
Marco Vieira
Papers
Dynamically Configurable Membership Support for Dependable Applications in Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-135
by
Juan Carlos García Ortiz
,
Stefan Beyer
,
Pablo Galdamez
Papers
Almost Triggerless Writeset Extraction in Multiversioned Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-142
by
Raúl Salinas-Monteagudo
,
Francesc D. Muñoz-Escoí
Papers
Diagnosis Service for Software Component and Its Application to a Heterogeneous Sensor Data Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-149
by
Thi-Quynh Bui
,
Oum-El-Kheir Aktouf
,
Michel Dang
,
Levent Gürgen
,
Claudia Roncancio
Papers
Managing the Impact of On-chip Temperature on the Lifetime Reliability of Reliably Overclocked Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-161
by
Viswanathan Subramanian
,
Prem Kumar Ramesh
,
Arun K. Somani
Papers
Modelling and Evaluation of a Game-Theory Approach for Airborne Conflict Resolution in Omnet++
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-165
by
Paolo Masci
,
Alessandra Tedeschi
Papers
Statistical Model Checking for Steady State Dependability Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-169
by
Diana El Rabih
,
Nihal Pekergin
Papers
Author Index
Freely available from IEEE.
pp. 171-172
Showing 36 out of 36