Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
IEEE CS Standards
Career Center
About Us
Subscribe to Newsletter
0
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
0
Home
Proceedings
SSIRI
SSIRI 2009
Generate Citations
Secure System Integration and Reliability Improvement
July 8 2009 to July 10 2009
Shanghai, China
ISBN: 978-0-7695-3758-0
Table of Contents
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Copyright Page
Freely available from IEEE.
pp. iv
Papers
Table of Contents
Freely available from IEEE.
pp. v-x
Papers
Message from General Chairs
Freely available from IEEE.
pp. xi
Papers
Message from Program Chairs
Freely available from IEEE.
pp. xii-xiii
Papers
Organizing Committee
Freely available from IEEE.
pp. xiv
Papers
Program Committee
Freely available from IEEE.
pp. xv-xvi
Papers
Keynote: Probabilistic Programming With Coordination and Compensation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
by
Professor Ji-Feng He
Papers
Keynote: Security Engineering: Developments and Directions
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-3
by
Professor Bhavani Thuraisingham
Papers
Keynote: Automatic Test Data Generation : Who, When and Where ?
Full-text access may be available. Sign in or learn about subscription options.
pp. 4
by
Dr. Jeff Offutt
Papers
Keynote: Reliability for Software-Based Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 5
by
Dr. Frances Paulisch
Papers
Keynote: Complexity - Interoperability - Deployment of Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 6
by
Rudolf Siebenhofer
Papers
Automated Web Service Composition System on Enterprise Service Bus
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-13
by
Xinhuai Tang
,
Sizhe Sun
,
Xiaozhou Yuan
,
Delai Chen
Papers
Architectural Availability Analysis of Software Decomposition for Local Recovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-22
by
Hichem Boudali
,
Hasan Sözer
,
Mariëlle Stoelinga
Papers
Recursive Decomposition of Progress Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-31
by
David A. Cape
,
Bruce M. McMillin
,
Benjamin W. Passer
,
Mayur Thakur
Papers
CacheBit: A Multisource-Multitarget Cache Instrumentation Tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-39
by
Chao Xu
,
Jinghui Gu
,
Ling Lin
,
Alei Liang
,
Haibing Guan
Papers
FiLM: A Runtime Monitoring Tool for Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-46
by
Fuyuan Zhang
,
Zhengwei Qi
,
Haibing Guan
,
Xuezheng Liu
,
Mao Yang
,
Zheng Zhang
Papers
Scheduling and Controlling Semantics for Distributed Resource Based Computing Engines
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-56
by
Pradeep Varma
,
Vijay K. Naik
Papers
A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-64
by
Qiang Zhang
,
Yuan Luo
,
Chuliang Weng
,
Minglu Li
Papers
Detection of Multiple-Duty-Related Security Leakage in Access Control Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-74
by
JeeHyun Hwang
,
Tao Xie
,
Vincent C. Hu
Papers
A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-81
by
Jin-Cherng Lin
,
Jan-Min Chen
,
Chou-Chuan Chen
,
Yu-Shu Chien
Papers
Verifying Aspect-Oriented Programs Using Open Temporal Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-92
by
Jia Lv
,
Jing Ying
,
Minghui Wu
,
Tao Jiang
,
Fanwei Zhu
Papers
Anchored Text for Software Weaving and Merging
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-100
by
Pradeep Varma
Papers
A Classification of Aspect Composition Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-109
by
Kun Tian
,
Kendra Cooper
,
Kang Zhang
,
Huiqun Yu
Papers
Visualizing Multiple Program Executions to Assist Behavior Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-122
by
Chunying Zhao
,
Kang Zhang
,
Jie Hao
,
W. Eric Wong
Papers
On the Verification of Strong Atomicity in Programs Using STM
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-131
by
Yong Li
,
Yu Zhang
,
Yiyun Chen
,
Ming Fu
Papers
State Space Reduction for Verifying Noninterference
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-138
by
Conghua Zhou
,
Li Chen
,
Shiguang Ju
,
Zhifeng Liu
Papers
An Analysis for Understanding Software Security Requirement Methodologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-149
by
Jing Du
,
Ye Yang
,
Qing Wang
Papers
A DSL Framework for Policy-Based Security of Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-158
by
Hédi Hamdi
,
Mohamed Mosbah
Papers
Environmental Metrics for Software Security Based on a Vulnerability Ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-168
by
Ju An Wang
,
Minzhe Guo
,
Hao Wang
,
Min Xia
,
Linfeng Zhou
Papers
Performance Testing of Mobile Applications at the Unit Test Level
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-180
by
Heejin Kim
,
Byoungju Choi
,
W. Eric Wong
Papers
Analyzing Relation between Software Architecture Testing Criteria on Test Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-186
by
Lijun Lun
,
Xuemei Ding
Papers
Six-Sigma Based Performance Verification in Early Development of Automatic Test Equipment
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-192
by
Madhu Kilari
,
Qiyu Huang
,
Tongdan Jin
Papers
A Graph-Model-Based Testing Method Compared with the Classification Tree Method for Test Case Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-200
by
Fevzi Belli
,
Axel Hollmann
,
Markus Kleinselbeck
Papers
A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-211
by
Chunxiang Xu
,
Hanpin Wang
,
Wanling Qu
,
Meixia Zhu
,
Yu Huang
Papers
Software Reliability Prediction and Analysis Using Queueing Models with Multiple Change-Points
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-221
by
Chin-Yu Huang
,
Tsui-Ying Hung
,
Chao-Jung Hsu
Papers
ReconBin: Reconstructing Binary File from Execution for Software Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-229
by
Lingyun Ying
,
Purui Su
,
Dengguo Feng
,
Xianggen Wang
,
Yi Yang
,
Yu Liu
Papers
A Comparative Study of Forensic Science and Computer Forensics
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-239
by
Ryan Hankins
,
Tetsutaroh Uehara
,
Jigang Liu
Papers
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-252
by
Yu-Lun Huang
,
C. Y. Shen
,
Shiuhpyng Shieh
,
Hung-Jui Wang
,
Cheng-Chun Lin
Papers
An Efficient and Secure Multi-secret Image Sharing Scheme with General Access Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-259
by
Ching-Fan Lee
,
Justie Su-Tzu Juan
Papers
Efficient Multi-secret Sharing Scheme Using Room Square
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-266
by
Ming-Jheng Li
,
Ying-Hsuan Chang
,
Justie Su-Tzu Juan
Papers
Checking Service Instance Protection for AMF Configurations
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-274
by
Pejman Salehi
,
Ferhat Khendek
,
Maria Toeroe
,
Abdelwahab Hamou-Lhadj
,
Abdelouahed Gherbi
Papers
Security Variability Design and Analysis in an Aspect Oriented Software Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-280
by
Lirong Dai
Papers
Test-Data Generation for Web Services Based on Contract Mutation
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-286
by
Ying Jiang
,
Ying-Na Li
,
Shan-Shan Hou
,
Lu Zhang
Papers
A Turing Machine-Based Model for Computer Forensic Reconstruction
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-290
by
Ryan Hankins
,
Tetsutaroh Uehara
,
Jigang Liu
Papers
Implementation of the Privacy Protection in Video Surveillance System
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-292
by
Hae-Min Moon
,
Sung Bum Pan
Papers
An Approach to Improving Reliability for Distributed Video-Based Monitoring Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-294
by
Michael Jiang
,
Yaping Liu
,
Xinzheng Gu
Papers
Research and Evaluation on Modularity Modeling in Community Detecting of Complex Network Based on Information Entropy
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-302
by
Xiaolong Deng
,
Bai Wang
,
Bin Wu
,
Shengqi Yang
Papers
Semantic ACP2P Information Retrieval Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-308
by
Haibo Yu
,
Tsunenori Mine
,
Makoto Amamiya
Papers
A Fast and Flexible Platform for Fault Injection and Evaluation in Verilog-Based Simulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-314
by
David Kammler
,
Junqing Guan
,
Gerd Ascheid
,
Rainer Leupers
,
Heinrich Meyr
Papers
Panel Description: Evolving Software Models for Global Organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 317
by
Rajesh Subramanyan
Papers
Position Statement: Evolving Software Models for Global Organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-319
by
Mao Boying
Papers
Position Statement: Evolving Software Models for Global Organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 320
by
Uttiya Basu
Papers
Message from T4CIA Workshop Co-chairs
Full-text access may be available. Sign in or learn about subscription options.
pp. 323
by
Jun Pang
,
Bao Tang
Papers
Systematic Cooperation between Industry and Universities
Full-text access may be available. Sign in or learn about subscription options.
pp. 324
by
Rudolf Siebenhofer
Papers
Improving Test Quality by a Test Type Analysis Based Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-328
by
Qin Liu
,
Wenqiang Zheng
,
JunFei Ma
Papers
A Safe Approach to Shrink Email Sample Set while Keeping Balance between Spam and Normal
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-334
by
Lili Diao
,
Hao Wang
Papers
Adaptation Strategies for Performance Failure Avoindance
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-341
by
Hong Sun
,
Vincenzo De Florio
,
Ning Gui
,
Raf Hens
,
Bert Vankeirsbilck
,
Bart Dhoedt
,
Chris Blondia
Papers
Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field Locality
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-347
by
Johannes Loinig
,
Christian Steger
,
Reinhold Weiss
,
Ernst Haselsteiner
Papers
Generating Test Cases for Timed Systems from Controlled Natural Language Specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-353
by
Matthias Schnelte
Papers
Automatic Test Data Generation for C Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-368
by
Prasad Bokil
,
Priyanka Darke
,
Ulka Shrotri
,
R. Venkatesh
Papers
Reliability Prediction of Web Service Composition Based on DTMC
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-375
by
Yingxin Ren
,
Qing Gu
,
Jingxian Qi
,
Daoxu Chen
Papers
Panel: Increase Industry and Academy Cooperation in Testing Technologies and Tools for Critical Industry Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 376
by
Bao Tang
Papers
Temporal Specification and Deductive Verification of a Distributed Component Model and Its Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-386
by
Alessandro Basso
,
Alexander Bolotov
,
Vladimir Getov
Papers
Communication Sequence Graphs for Mutation-Oriented Integration Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-392
by
Fevzi Belli
,
Axel Hollmann
,
Sascha Padberg
Papers
Directed Acyclic Graph Modeling of Security Policies for Firewall Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-398
by
Tugkan Tuglular
,
Özgur Kaya
,
Can Arda Müftüoglu
,
Fevzi Belli
Papers
A New Method to Generate Attack Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-406
by
Anming Xie
,
Guodong Chen
,
Yonggang Wang
,
Zhong Chen
,
Jianbin Hu
Papers
A Comparative Study of Access Control Languages
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-412
by
Sathish Pinagapani
,
Dianxiang Xu
,
Jun Kong
Papers
JPEG 2000 and Digital Watermarking Technique Using in Medical Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-416
by
Sung-Jin Lim
,
Hae-Min Moon
,
Seung-Hoon Chae
,
Yongwha Chung
,
Sung Bum Pan
Papers
A Developed Dynamic Environment Fault Injection Tool for Component Security Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-422
by
Binbin Qu
,
Yin Huang
,
Xiaodong Xie
,
Yansheng Lu
Papers
Multidimensional Approach to Quality Analysis of IPSec and HTTPS Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 425-430
by
Marcin Barylski
,
Henryk Krawczyk
Papers
Software Stability Model (SSM) for Building Reliable Real Time Computing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-435
by
Naganathan E.R
,
Eugene X.P
Papers
Extending Model Driven Architecture with Software Security Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 436-441
by
Xucheng Tang
,
Beijun Shen
Papers
Path-Based Approach to Integration Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-446
by
Jueliang Hu
,
Zuohua Ding
,
Geguang Pu
Papers
Simplifying Parametrization of Bayesian Networks in Prediction of System Quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-448
by
Aida Omerovic
,
Ketil Stølen
Papers
Reliability Computing for Service Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-450
by
Zuohua Ding
,
Mingyue Jiang
Papers
Improvement of QoS in Process Centric Software Development Using ANP
Full-text access may be available. Sign in or learn about subscription options.
pp. 451-452
by
A. Srividya
,
K. Krishna Mohan
,
A.K. Verma
Papers
Author Index
Freely available from IEEE.
pp. 453-455
Papers
Publisher's Information
Freely available from IEEE.
pp. 456
Showing 80 out of 80