


default search action
2nd DASC 2006: Indianapolis, Indiana, USA
- Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA. IEEE Computer Society 2006, ISBN 0-7695-2539-3

Introduction
- Message from the General Co-Chairs.

- Organizing Committees.

- Referees.

Session 1: Autonomic Computing and Selfware
- Yuan-Shun Dai, Michael G. Hinchey

, Manish Madhusoodan, James L. Rash, Xukai Zou:
A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System. 3-10 - Ian A. Troxel, Alan D. George

:
Adaptable and Autonomic Mission Manager for Dependable Aerospace Computing. 11-18 - Joaquín Peña

, Michael G. Hinchey, Roy Sterritt, Antonio Ruiz Cortés, Manuel Resinas:
A Model-Driven Architecture Approach for Modeling, Specifying and Deploying Policies in Autonomous and Autonomic Systems. 19-30
Session 2: Cryptography
- Li Bai:

A Reliable (k, n) Image Secret Sharing Scheme. 31-36 - Jong Youl Choi, Philippe Golle, Markus Jakobsson:

Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. 37-44 - Na Guo, Laurence Tianruo Yang, Man Lin, John P. Quinn:

A Parallel GNFS Integrated with the Block Wiedemann's Algorithm for Integer Factorization. 45-50 - Sining Liu, Brian King, Wei Wang:

A CRT-RSA Algorithm Secure against Hardware Fault Attacks. 51-60
Session 3: Autonomic Computing and Monitoring
- Karin Sallhammar, Bjarne E. Helvik

, Svein J. Knapskog:
A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation. 61-68 - Tetsuya Masuishi, Koichi Shibata, Yasuyuki Oki, Kinji Mori:

Autonomous Decentralized Load Tracking Techniques and Evaluation. 69-76 - Tadashi Dohi

, Tatsuya Ozaki, Naoto Kaio
:
Optimal Checkpoint Placement with Equality Constraints. 77-84 - Ruiping Ma, Liudong Xing

, Howard E. Michel:
Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. 85-94
Session 4: Reliability and Security Modeling
- Anil Bazaz, James D. Arthur, Joseph G. Tront:

Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. 95-102 - Sung-Whan Woo, Omar Hussain Alhazmi

, Yashwant K. Malaiya:
Assessing Vulnerabilities in Apache and IIS HTTP Servers. 103-110 - Takao Ando, Hiroyuki Okamura

, Tadashi Dohi
:
Estimating Markov Modulated Software Reliability Models via EM Algorithm. 111-118 - Gustavo A. Chaparro-Baquero

, Nayda G. Santiago, Wilson Rivera
, J. Fernando Vega-Riveros:
Measuring Quantitative Dependability Attributes in Digital Publishing Using Petri Net Workflow Modeling. 119-128
Session 5: Autonomy Supported by Grid and Pervasive Computing
- Xuejun Yang, Xiangli Qu, Chunmei Gui:

Towards Reliable Rating Filtering in Grid Reputation Systems: A Pre-Evaluating Set Based Bias-Tuned Approach1. 129-136 - Zhaoyu Liu, Dichao Peng:

A Security-Supportive Middleware Architecture for Pervasive Computing. 137-144 - Songqiao Han, Shensheng Zhang, Yong Zhang:

Self-Adaptive Pervasive Computing Application Based on Code Mobility. 145-154
Session 6: Network Security
- T. Paul Parker, Shouhuai Xu:

Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. 155-162 - Zhaoyu Liu, Roopesh Uppala:

A Dynamic Countermeasure Method for Large-Scale Network Attacks. 163-170 - Ahmad Patooghy

, Seyed Ghassem Miremadi, Abbas Javadtalab, Mahdi Fazeli
, Navid Farazmand:
A Solution to Single Point of Failure Using Voter Replication and Disagreement Detection. 171-176 - Zijiang Yang, Shiyong Lu, Ping Yang:

Runtime Security Verification for Itinerary-Driven Mobile Agents. 177-186
Session 7: Self-Adaptation and Scheduling
- Thanikesavan Sivanthi, Ulrich Killat:

A Satisficing MOMIP Framework for Reliable Real-time Application Scheduling. 187-194 - Qinghui Tang, Sandeep K. S. Gupta, Daniel Stanzione, Phil Cayton:

Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based Datacenters. 195-202 - Guoqing Yang, Hong Li, Zhaohui Wu:

SmartC: A Component-Based Hierarchical Modeling Language for Automotive Electronics. 203-210
Session 8: Autonomous Intrusion Detection
- Xinwen Fu

, Wei Yu
, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham:
On Recognizing Virtual Honeypots and Countermeasures. 211-218 - Naixue Xiong, Yanxiang He, Yan Yang, Laurence Tianruo Yang, Chao Peng:

A Self-Tuning Multicast Flow Control Scheme Based on Autonomic Technology. 219-226 - Yuan-Shun Dai, Michael G. Hinchey, Mingrui Qi, Xukai Zou:

Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons. 227-234 - Emmanuel Hooper:

Intelligent Autonomic Strategy to Attacks in Network Infrastructure Protection: Feedback Methods to IDS, Using Policies, Alert Filters and Firewall Packet Filters for Multiple Protocols. 235-244
Session 9: Autonomy in Sensor Networks
- M. Masadeh Bani Yassein

, Mohamed Ould-Khaoua, Lewis M. Mackenzie, Stylianos Papanastasiou:
Performance Evaluation of Adjusted Probabilistic Broadcasting in MANETs. 245-249 - Akhilesh Shrestha, Liudong Xing

, Hong Liu:
Infrastructure Communication Reliability of Wireless Sensor Networks. 250-257 - Hui Kang, Xiaolin Li, Patrick J. Moran:

Autonomic Sensor Networks: A New Paradigm for Collaborative Information Processing. 258-268
Session 10: Automated Trust Management
- Xuehai Peng, Chuang Lin:

Architecture of Trustworthy Networks. 269-276 - Avinash Srinivasan, Joshua Teitelbaum, Jie Wu:

DRBTS: Distributed Reputation-based Beacon Trust System. 277-283 - Will Tao, Robert Steele:

Trusted Mobile Interaction via Extended Digital Certificates. 284-292
Session 11: Access Control
- Andrew Prunicki, Tzilla Elrad:

Aclamate: An AOSD Security Framework for Access Control. 293-300 - Omkar J. Tilak, Rajeev R. Raje, Xukai Zou:

Composing Access Control Policies of Distributed Components. 301-307 - Junda Liu, Lin Ning, Yibo Xue, Dongsheng Wang:

PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network. 308-314 - Weiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao:

An Algorithm for Privacy-Preserving Quantitative Association Rules Mining. 315-324
Session 12: Autonomic Computing and Context Awareness
- Mehmet A. Orgun

, Ji Ma, Chuchang Liu, Guido Governatori
:
Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. 325-332 - Natalia Stakhanova, Samik Basu, Robyn R. Lutz

, Johnny Wong:
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. 333-340 - Philip K. McKinley, Farshad A. Samimi, Jonathan K. Shapiro, Chiping Tang:

Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services. 341-348

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














