Default Cover Image

2008 11th IEEE High Assurance Systems Engineering Symposium

Dec. 3 2008 to Dec. 5 2008

Nanjing

Table of Contents

Papers
Conference organizationFreely available from IEEE.pp. xii-xiv
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-ix
Papers
list-reviewerFreely available from IEEE.pp. xv
Evaluating Security Risks following a Compliance PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 27-36
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from the ChairsFreely available from IEEE.pp. x-xi
Papers
Path Sensitive Analysis for Security FlawsFull-text access may be available. Sign in or learn about subscription options.pp. 3
Papers
Transaction CalculusFull-text access may be available. Sign in or learn about subscription options.pp. 4
Papers
Assurance Technology of System Test Based on OperatorsFull-text access may be available. Sign in or learn about subscription options.pp. 5
Papers
Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security InspectionFull-text access may be available. Sign in or learn about subscription options.pp. 9-18
Papers
Low Cost Secure Computation for the General Client-Server Computation ModelFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
Papers
On the Comparison of Network Attack Datasets: An Empirical AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 39-48
Papers
On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 49-58
Papers
The Deployment of a Darknet on an Organization-Wide Network: An Empirical AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 59-68
Papers
A Scalable Checkpoint Encoding Algorithm for Diskless CheckpointingFull-text access may be available. Sign in or learn about subscription options.pp. 71-79
Papers
HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 80-88
Papers
Towards Secure Trust Bootstrapping in Pervasive Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 89-96
Papers
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) DiscriminationFull-text access may be available. Sign in or learn about subscription options.pp. 97-106
Papers
A Low Energy Soft Error-Tolerant Register File Architecture for Embedded ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 109-116
Papers
Randomization Based Probabilistic Approach to Detect Trojan CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 117-124
Papers
On the Integrity of Lightweight CheckpointsFull-text access may be available. Sign in or learn about subscription options.pp. 125-134
Papers
A Fast Performance Analysis Tool for Multicore, Multithreaded Communication ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 135-144
Papers
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 154-164
Papers
A Few Remarks about Formal Development of Secure SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 165-174
Papers
Localizing Program Errors via Slicing and ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 187-196
Papers
A Timed Extension of Property Sequence ChartFull-text access may be available. Sign in or learn about subscription options.pp. 197-206
Papers
An Interaction-Based Test Sequence Generation Approach for Testing Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 209-218
Papers
Automated Generation of Test Cases from Contract-Oriented Specifications: A CSP-Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 219-228
Papers
Mutation-Based Testing of Format String BugsFull-text access may be available. Sign in or learn about subscription options.pp. 229-238
Papers
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java CodeFull-text access may be available. Sign in or learn about subscription options.pp. 241-250
Papers
A Multi-Periodic Synchronous Data-Flow LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 251-260
Papers
At What Level of Granularity Should We be Componentizing for Software Reliability?Full-text access may be available. Sign in or learn about subscription options.pp. 273-282
Papers
A Comparative Study into Architecture-Based Safety Evaluation Methodologies Using AADLFull-text access may be available. Sign in or learn about subscription options.pp. 283-292
Papers
Software Quality Improvement via Pattern-Based Model RefactoringFull-text access may be available. Sign in or learn about subscription options.pp. 293-302
Papers
A Novel Model for Component-Based Software Reliability AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 303-309
Papers
Automotive Safety Case Full-text access may be available. Sign in or learn about subscription options.pp. 313-322
Papers
Detection and Diagnosis of Recurrent Faults in Software Systems by Invariant AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 323-332
Papers
Automated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 333-342
Papers
Layered Memory Architecture for High IO Intensive Information Services to Achieve TimelinessFull-text access may be available. Sign in or learn about subscription options.pp. 343-349
Papers
Securing Sensor Nodes Against Side Channel AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 353-361
Papers
Power Optimization in Fault-Tolerant Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 362-370
Papers
A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL SystemFull-text access may be available. Sign in or learn about subscription options.pp. 373-382
Papers
Secure, Highly Available, and High Performance Peer-to-Peer Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 383-391
Papers
Privacy, Preservation and Performance: The 3 P's of Distributed Data ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 392-401
Papers
A Novel Ripple-Based Context-Cognizant Service Discovery Method in Autonomous Decentralized Community SystemFull-text access may be available. Sign in or learn about subscription options.pp. 405-413
Papers
[Roster]Freely available from IEEE.pp. 494
Papers
Architecture Centric System Design for Supporting Reconfiguration of Service Oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 414-423
Papers
A Self-Managing Brokerage Model for Quality Assurance in Service-Oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 424-433
Papers
Formalize UML 2 Sequence DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 437-440
Papers
Towards the Service Composition Through BusesFull-text access may be available. Sign in or learn about subscription options.pp. 441-444
Papers
Designing, Modelling and Verifying a Container Terminal System Using UPPAALFull-text access may be available. Sign in or learn about subscription options.pp. 445-448
Papers
A Grammar-Based Reverse Engineering Framework for Behavior VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 449-452
Papers
Checking Inconsistency of Rule Sets in Active Real-Time DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 453-456
Papers
An Integrated Model to Analyze Cryptographic Protocols with Colored Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 457-460
Papers
Reliability Design for Large Scale Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 463-466
Papers
A New Fault-Tolerant Wormhole Routing Scheme in Tori with Convex FaultsFull-text access may be available. Sign in or learn about subscription options.pp. 467-470
Papers
Using Multi-Level Security Annotations to Improve Software AssuranceFull-text access may be available. Sign in or learn about subscription options.pp. 471-474
Papers
DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 475-478
Papers
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission ValueFull-text access may be available. Sign in or learn about subscription options.pp. 479-482
Papers
Methodology for Service-Oriented Management of Security Assurance in Communication InfrastructuresFull-text access may be available. Sign in or learn about subscription options.pp. 483-486
Papers
Jasmine: A Tool for Model-Driven Runtime Verification with UML Behavioral ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 487-490
Papers
Author IndexFreely available from IEEE.pp. 491-493
Showing 67 out of 67