Default Cover Image

Secure System Integration and Reliability Improvement

July 8 2009 to July 10 2009

Shanghai, China

ISBN: 978-0-7695-3758-0

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Copyright PageFreely available from IEEE.pp. iv
Papers
Table of ContentsFreely available from IEEE.pp. v-x
Papers
Message from General ChairsFreely available from IEEE.pp. xi
Papers
Message from Program ChairsFreely available from IEEE.pp. xii-xiii
Papers
Organizing CommitteeFreely available from IEEE.pp. xiv
Papers
Program CommitteeFreely available from IEEE.pp. xv-xvi
Papers
Keynote: Probabilistic Programming With Coordination and CompensationFull-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
Keynote: Security Engineering: Developments and DirectionsFull-text access may be available. Sign in or learn about subscription options.pp. 2-3
Papers
Keynote: Automatic Test Data Generation : Who, When and Where ?Full-text access may be available. Sign in or learn about subscription options.pp. 4
Papers
Keynote: Reliability for Software-Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 5
Papers
Keynote: Complexity - Interoperability - Deployment of SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 6
Papers
Automated Web Service Composition System on Enterprise Service BusFull-text access may be available. Sign in or learn about subscription options.pp. 9-13
Papers
Architectural Availability Analysis of Software Decomposition for Local RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 14-22
Papers
Recursive Decomposition of Progress GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 23-31
Papers
CacheBit: A Multisource-Multitarget Cache Instrumentation ToolFull-text access may be available. Sign in or learn about subscription options.pp. 35-39
Papers
FiLM: A Runtime Monitoring Tool for Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 40-46
Papers
Scheduling and Controlling Semantics for Distributed Resource Based Computing EnginesFull-text access may be available. Sign in or learn about subscription options.pp. 47-56
Papers
A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 59-64
Papers
Detection of Multiple-Duty-Related Security Leakage in Access Control PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 65-74
Papers
A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and DefenseFull-text access may be available. Sign in or learn about subscription options.pp. 75-81
Papers
Verifying Aspect-Oriented Programs Using Open Temporal LogicFull-text access may be available. Sign in or learn about subscription options.pp. 85-92
Papers
Anchored Text for Software Weaving and MergingFull-text access may be available. Sign in or learn about subscription options.pp. 93-100
Papers
A Classification of Aspect Composition ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 101-109
Papers
Visualizing Multiple Program Executions to Assist Behavior VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 113-122
Papers
On the Verification of Strong Atomicity in Programs Using STMFull-text access may be available. Sign in or learn about subscription options.pp. 123-131
Papers
State Space Reduction for Verifying NoninterferenceFull-text access may be available. Sign in or learn about subscription options.pp. 132-138
Papers
An Analysis for Understanding Software Security Requirement MethodologiesFull-text access may be available. Sign in or learn about subscription options.pp. 141-149
Papers
A DSL Framework for Policy-Based Security of Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 150-158
Papers
Environmental Metrics for Software Security Based on a Vulnerability OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 159-168
Papers
Performance Testing of Mobile Applications at the Unit Test LevelFull-text access may be available. Sign in or learn about subscription options.pp. 171-180
Papers
Analyzing Relation between Software Architecture Testing Criteria on Test SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 181-186
Papers
Six-Sigma Based Performance Verification in Early Development of Automatic Test EquipmentFull-text access may be available. Sign in or learn about subscription options.pp. 187-192
Papers
A Graph-Model-Based Testing Method Compared with the Classification Tree Method for Test Case GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 193-200
Papers
A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination SemanticsFull-text access may be available. Sign in or learn about subscription options.pp. 203-211
Papers
Software Reliability Prediction and Analysis Using Queueing Models with Multiple Change-PointsFull-text access may be available. Sign in or learn about subscription options.pp. 212-221
Papers
ReconBin: Reconstructing Binary File from Execution for Software AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 222-229
Papers
A Comparative Study of Forensic Science and Computer ForensicsFull-text access may be available. Sign in or learn about subscription options.pp. 230-239
Papers
Provable Secure AKA Scheme with Reliable Key Delegation in UMTSFull-text access may be available. Sign in or learn about subscription options.pp. 243-252
Papers
An Efficient and Secure Multi-secret Image Sharing Scheme with General Access StructureFull-text access may be available. Sign in or learn about subscription options.pp. 253-259
Papers
Efficient Multi-secret Sharing Scheme Using Room SquareFull-text access may be available. Sign in or learn about subscription options.pp. 260-266
Papers
Checking Service Instance Protection for AMF ConfigurationsFull-text access may be available. Sign in or learn about subscription options.pp. 269-274
Papers
Security Variability Design and Analysis in an Aspect Oriented Software ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 275-280
Papers
Test-Data Generation for Web Services Based on Contract MutationFull-text access may be available. Sign in or learn about subscription options.pp. 281-286
Papers
A Turing Machine-Based Model for Computer Forensic ReconstructionFull-text access may be available. Sign in or learn about subscription options.pp. 289-290
Papers
Implementation of the Privacy Protection in Video Surveillance SystemFull-text access may be available. Sign in or learn about subscription options.pp. 291-292
Papers
An Approach to Improving Reliability for Distributed Video-Based Monitoring SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 293-294
Papers
Research and Evaluation on Modularity Modeling in Community Detecting of Complex Network Based on Information EntropyFull-text access may be available. Sign in or learn about subscription options.pp. 297-302
Papers
Semantic ACP2P Information Retrieval MethodFull-text access may be available. Sign in or learn about subscription options.pp. 303-308
Papers
A Fast and Flexible Platform for Fault Injection and Evaluation in Verilog-Based SimulationsFull-text access may be available. Sign in or learn about subscription options.pp. 309-314
Papers
Panel Description: Evolving Software Models for Global OrganizationsFull-text access may be available. Sign in or learn about subscription options.pp. 317
Papers
Position Statement: Evolving Software Models for Global OrganizationsFull-text access may be available. Sign in or learn about subscription options.pp. 318-319
Papers
Position Statement: Evolving Software Models for Global OrganizationsFull-text access may be available. Sign in or learn about subscription options.pp. 320
Papers
Message from T4CIA Workshop Co-chairsFull-text access may be available. Sign in or learn about subscription options.pp. 323
Papers
Systematic Cooperation between Industry and Universities Full-text access may be available. Sign in or learn about subscription options.pp. 324
Papers
Improving Test Quality by a Test Type Analysis Based MethodFull-text access may be available. Sign in or learn about subscription options.pp. 325-328
Papers
A Safe Approach to Shrink Email Sample Set while Keeping Balance between Spam and NormalFull-text access may be available. Sign in or learn about subscription options.pp. 329-334
Papers
Adaptation Strategies for Performance Failure AvoindanceFull-text access may be available. Sign in or learn about subscription options.pp. 337-341
Papers
Generating Test Cases for Timed Systems from Controlled Natural Language SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 348-353
Papers
Automatic Test Data Generation for C ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 359-368
Papers
Reliability Prediction of Web Service Composition Based on DTMCFull-text access may be available. Sign in or learn about subscription options.pp. 369-375
Papers
Panel: Increase Industry and Academy Cooperation in Testing Technologies and Tools for Critical Industry ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 376
Papers
Temporal Specification and Deductive Verification of a Distributed Component Model and Its EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 379-386
Papers
Communication Sequence Graphs for Mutation-Oriented Integration TestingFull-text access may be available. Sign in or learn about subscription options.pp. 387-392
Papers
Directed Acyclic Graph Modeling of Security Policies for Firewall TestingFull-text access may be available. Sign in or learn about subscription options.pp. 393-398
Papers
A New Method to Generate Attack GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 401-406
Papers
A Comparative Study of Access Control LanguagesFull-text access may be available. Sign in or learn about subscription options.pp. 407-412
Papers
JPEG 2000 and Digital Watermarking Technique Using in Medical ImageFull-text access may be available. Sign in or learn about subscription options.pp. 413-416
Papers
A Developed Dynamic Environment Fault Injection Tool for Component Security TestingFull-text access may be available. Sign in or learn about subscription options.pp. 417-422
Papers
Multidimensional Approach to Quality Analysis of IPSec and HTTPS ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 425-430
Papers
Software Stability Model (SSM) for Building Reliable Real Time Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 431-435
Papers
Extending Model Driven Architecture with Software Security AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 436-441
Papers
Path-Based Approach to Integration TestingFull-text access may be available. Sign in or learn about subscription options.pp. 445-446
Papers
Simplifying Parametrization of Bayesian Networks in Prediction of System QualityFull-text access may be available. Sign in or learn about subscription options.pp. 447-448
Papers
Reliability Computing for Service CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 449-450
Papers
Improvement of QoS in Process Centric Software Development Using ANPFull-text access may be available. Sign in or learn about subscription options.pp. 451-452
Papers
Author IndexFreely available from IEEE.pp. 453-455
Papers
Publisher's InformationFreely available from IEEE.pp. 456
Showing 80 out of 80