Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
HASE
HASE 2008
Generate Citations
2008 11th IEEE High Assurance Systems Engineering Symposium
Dec. 3 2008 to Dec. 5 2008
Nanjing
Table of Contents
Papers
Conference organization
Freely available from IEEE.
pp. xii-xiv
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-ix
Papers
list-reviewer
Freely available from IEEE.
pp. xv
Evaluating Security Risks following a Compliance Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-36
by
Reinaldo de B. Correia
,
Luci Pirmez
,
Luiz F. Rust C. Carmo
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from the Chairs
Freely available from IEEE.
pp. x-xi
Papers
Path Sensitive Analysis for Security Flaws
Full-text access may be available. Sign in or learn about subscription options.
pp. 3
by
Mary Lou Soffa
Papers
Transaction Calculus
Full-text access may be available. Sign in or learn about subscription options.
pp. 4
by
Jifeng He
Papers
Assurance Technology of System Test Based on Operators
Full-text access may be available. Sign in or learn about subscription options.
pp. 5
by
Masayuki Matsumoto
Papers
Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-18
by
Holger Peine
,
Marek Jawurek
,
Stefan Mandel
Papers
Low Cost Secure Computation for the General Client-Server Computation Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-26
by
Liangliang Xiao
,
I-Ling Yen
,
Farokh Bastani
Verification of Exception Control Flows and Handlers Based on Architectural Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-186
by
Patrick Henrique da Silva Brito
,
Rogério de Lemos
,
Cecilía Mary Fischer Rubira
Papers
On the Comparison of Network Attack Datasets: An Empirical Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-48
by
Robin Berthier
,
Dave Korman
,
Michel Cukier
,
Matti Hiltunen
,
Gregg Vesonder
,
Daniel Sheleheda
Papers
On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-58
by
Danielle Chrun
,
Michel Cukier
,
Gerry Sneeringer
Papers
The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-68
by
Robin Berthier
,
Michel Cukier
Papers
A Scalable Checkpoint Encoding Algorithm for Diskless Checkpointing
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-79
by
Zizhong Chen
,
Jack Dongarra
Papers
HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-88
by
Qin Li
,
Jinpeng Huai
,
Jianxin Li
,
Tianyu Wo
,
Minxiong Wen
Papers
Towards Secure Trust Bootstrapping in Pervasive Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-96
by
Sheikh I. Ahamed
,
Endadul Hoque
,
Farzana Rahman
,
Mohammad Zulkernine
Papers
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-106
by
Debmalya Biswas
,
Thomas Gazagnaire
,
Blaise Genest
Papers
A Low Energy Soft Error-Tolerant Register File Architecture for Embedded Processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-116
by
M. Fazeli
,
S.N. Ahmadian
,
S.G. Miremadi
Papers
Randomization Based Probabilistic Approach to Detect Trojan Circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-124
by
Susmit Jha
,
Sumit Kumar Jha
Papers
On the Integrity of Lightweight Checkpoints
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-134
by
Raul Barbosa
,
Johan Karlsson
Papers
A Fast Performance Analysis Tool for Multicore, Multithreaded Communication Processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-144
by
Hun Jung
,
Miao Ju
,
Hao Che
,
Zhijun Wang
Papers
Random Relaxation Abstractions for Bounded Reachability Analysis of Linear Hybrid Automata: Distributed Randomized Abstractions in Model Checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-153
by
Sumit Kumar Jha
,
Susmit Jha
Papers
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-164
by
Jonas Elmqvist
,
Simin Nadjm-Tehrani
Papers
A Few Remarks about Formal Development of Secure Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-174
by
Éric Jaeger
,
Thérèse Hardin
Papers
Localizing Program Errors via Slicing and Reasoning
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-196
by
Fei Pu
,
Yan Zhang
Papers
A Timed Extension of Property Sequence Chart
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-206
by
Pengcheng Zhang
,
Bixin Li
,
Mingjie Sun
Papers
An Interaction-Based Test Sequence Generation Approach for Testing Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-218
by
Wenhua Wang
,
Sreedevi Sampath
,
Yu Lei
,
Raghu Kacker
Papers
Automated Generation of Test Cases from Contract-Oriented Specifications: A CSP-Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-228
by
Hakim Belhaouari
,
Frederic Peschanski
Papers
Mutation-Based Testing of Format String Bugs
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-238
by
Hossain Shahriar
,
Mohammad Zulkernine
Papers
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-250
by
Alfredo Pironti
,
Riccardo Sisto
Papers
A Multi-Periodic Synchronous Data-Flow Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-260
by
Julien Forget
,
Frédéric Boniol
,
David Lesens
,
Claire Pagetti
Papers
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-270
by
Kohei Sakurai
,
Péter Bokor
,
Neeraj Suri
Papers
At What Level of Granularity Should We be Componentizing for Software Reliability?
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-282
by
Atef Mohamed
,
Mohammad Zulkernine
Papers
A Comparative Study into Architecture-Based Safety Evaluation Methodologies Using AADL
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-292
by
Lars Grunske
,
Jun Han
Papers
Software Quality Improvement via Pattern-Based Model Refactoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-302
by
Dae-Kyoo Kim
Papers
A Novel Model for Component-Based Software Reliability Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-309
by
Fan Zhang
,
Xingshe Zhou
,
Junwen Chen
,
Yunwei Dong
Papers
Automotive Safety Case
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-322
by
Fredrik Törner
,
Peter Öhman
Papers
Detection and Diagnosis of Recurrent Faults in Software Systems by Invariant Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-332
by
Miao Jiang
,
Mohammad A. Munawar
,
Thomas Reidemeister
,
Paul A.S. Ward
Papers
Automated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-342
by
Jicheng Fu
,
Farokh B. Bastani
,
I-Ling Yen
Papers
Layered Memory Architecture for High IO Intensive Information Services to Achieve Timeliness
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-349
by
Hironao Takahashi
,
Hafiz Farooq Ahmad
,
Kinji Mori
Papers
Securing Sensor Nodes Against Side Channel Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-361
by
Kanthakumar Pongaliur
,
Zubin Abraham
,
Alex X. Liu
,
Li Xiao
,
Leo Kempel
Papers
Power Optimization in Fault-Tolerant Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-370
by
Oliviero Riganelli
,
Radu Grosu
,
Samir R. Das
,
C.R. Ramakrishnan
,
Scott A. Smolka
Papers
A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-382
by
Kun Bai
,
Peng Liu
Papers
Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-391
by
Yunqi Ye
,
I-Ling Yen
,
Liangliang Xiao
,
Bhavani Thuraisingham
Papers
Privacy, Preservation and Performance: The 3 P's of Distributed Data Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-401
by
Bobji Mungamuru
,
Hector Garcia-Molina
Papers
A Novel Ripple-Based Context-Cognizant Service Discovery Method in Autonomous Decentralized Community System
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-413
by
Khalid Mahmood
,
Satoshi Niki
,
Xiaodong Lu
,
Kinji Mori
Papers
[Roster]
Freely available from IEEE.
pp. 494
Papers
Architecture Centric System Design for Supporting Reconfiguration of Service Oriented Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-423
by
Wang Chu
,
Depei Qian
Papers
A Self-Managing Brokerage Model for Quality Assurance in Service-Oriented Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-433
by
Daniel Robinson
,
Gerald Kotonya
Papers
Formalize UML 2 Sequence Diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-440
by
Hui Shen
,
Aliya Virani
,
Jianwei Niu
Papers
Towards the Service Composition Through Buses
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-444
by
Qin Li
,
Huibiao Zhu
,
Jifeng He
Papers
Designing, Modelling and Verifying a Container Terminal System Using UPPAAL
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-448
by
Quan Zu
,
Miaomiao Zhang
,
Jing Liu
,
Qingfeng Du
Papers
A Grammar-Based Reverse Engineering Framework for Behavior Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-452
by
Chunying Zhao
,
Kang Zhang
Papers
Checking Inconsistency of Rule Sets in Active Real-Time Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-456
by
Jian Zhang
Papers
An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-460
by
Jin Wei
,
Guiping Su
,
Meng Xu
Papers
Reliability Design for Large Scale Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 463-466
by
Kai Du
,
Huaimin Wang
,
Shuqiang Yang
,
Yingwen Chen
,
Yan Wen
Papers
A New Fault-Tolerant Wormhole Routing Scheme in Tori with Convex Faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-470
by
Lingfu Xie
,
Du Xu
,
Qing Yao
,
Lei Song
Papers
Using Multi-Level Security Annotations to Improve Software Assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-474
by
Eryk Kylikowski
,
Riccardo Scandariato
,
Wouter Joosen
Papers
DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 475-478
by
Hua Wang
,
Yao Guo
,
Xiangqun Chen
Papers
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Full-text access may be available. Sign in or learn about subscription options.
pp. 479-482
by
Robert K. Abercrombie
,
Frederick T. Sheldon
,
Ali Mili
Papers
Methodology for Service-Oriented Management of Security Assurance in Communication Infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-486
by
Albin Zuccato
,
Samuel Dubus
,
Evren Bulut
Papers
Jasmine: A Tool for Model-Driven Runtime Verification with UML Behavioral Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-490
by
Zhou Zhou
,
Linzhang Wang
,
Zhanqi Cui
,
Xin Chen
,
Jianhua Zhao
Papers
Author Index
Freely available from IEEE.
pp. 491-493
Showing 67 out of 67