default search action
HASE 2008: Nanjing, China
- 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3482-4
Keynotes
- Mary Lou Soffa:
Path Sensitive Analysis for Security Flaws. 3 - Jifeng He:
Transaction Calculus. 4 - Masayuki Matsumoto:
Assurance Technology of System Test Based on Operators' Aspects. 5
System Security
- Holger Peine, Marek Jawurek, Stefan Mandel:
Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection. 9-18 - Liangliang Xiao, I-Ling Yen, Farokh B. Bastani:
Low Cost Secure Computation for the General Client-Server Computation Model. 19-26 - Reinaldo de Barros Correia, Luci Pirmez, Luiz F. Rust da Costa Carmo:
Evaluating Security Risks following a Compliance Perspective. 27-36
Network Security
- Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda:
On the Comparison of Network Attack Datasets: An Empirical Analysis. 39-48 - Danielle Chrun, Michel Cukier, Gerry Sneeringer:
On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. 49-58 - Robin Berthier, Michel Cukier:
The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. 59-68
Distributed Systems
- Zizhong Chen, Jack J. Dongarra:
A Scalable Checkpoint Encoding Algorithm for Diskless Checkpointing. 71-79 - Qin Li, Jinpeng Huai, Jianxin Li, Tianyu Wo, Minxiong Wen:
HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks. 80-88 - Sheikh Iqbal Ahamed, Md. Endadul Hoque, Farzana Rahman, Mohammad Zulkernine:
Towards Secure Trust Bootstrapping in Pervasive Computing Environment. 89-96 - Debmalya Biswas, Thomas Gazagnaire, Blaise Genest:
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination. 97-106
Embedded Systems
- Mahdi Fazeli, Seyed Nematollah Ahmadian, Seyed Ghassem Miremadi:
A Low Energy Soft Error-Tolerant Register File Architecture for Embedded Processors. 109-116 - Susmit Jha, Sumit Kumar Jha:
Randomization Based Probabilistic Approach to Detect Trojan Circuits. 117-124 - Raul Barbosa, Johan Karlsson:
On the Integrity of Lightweight Checkpoints. 125-134 - Hun Jung, Miao Ju, Hao Che, Zhijun Wang:
A Fast Performance Analysis Tool for Multicore, Multithreaded Communication Processors. 135-144
Formal verification, specification and implementation I
- Sumit Kumar Jha, Susmit Jha:
Random Relaxation Abstractions for Bounded Reachability Analysis of Linear Hybrid Automata: Distributed Randomized Abstractions in Model Checking. 147-153 - Jonas Elmqvist, Simin Nadjm-Tehrani:
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems. 154-164 - Éric Jaeger, Thérèse Hardin:
A Few Remarks about Formal Development of Secure Systems. 165-174
Formal verification, specification and implementation II
- Patrick Henrique da S. Brito, Rogério de Lemos, Cecília M. F. Rubira:
Verification of Exception Control Flows and Handlers Based on Architectural Scenarios. 177-186 - Fei Pu, Yan Zhang:
Localizing Program Errors via Slicing and Reasoning. 187-196 - Pengcheng Zhang, Bixin Li, Mingjie Sun:
A Timed Extension of Property Sequence Chart. 197-206
Testing
- Wenhua Wang, Sreedevi Sampath, Yu Lei, Raghu Kacker:
An Interaction-Based Test Sequence Generation Approach for Testing Web Applications. 209-218 - Hakim Belhaouari, Frédéric Peschanski:
Automated Generation of Test Cases from Contract-Oriented Specifications: A CSP-Based Approach. 219-228 - Hossain Shahriar, Mohammad Zulkernine:
Mutation-Based Testing of Format String Bugs. 229-238
Formal verification, specification and implementation III
- Alfredo Pironti, Riccardo Sisto:
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code. 241-250 - Julien Forget, Frédéric Boniol, David Lesens, Claire Pagetti:
A Multi-Periodic Synchronous Data-Flow Language. 251-260 - Kohei Sakurai, Péter Bokor, Neeraj Suri:
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications. 261-270
Quality, Reliability, and Safety
- Atef Mohamed, Mohammad Zulkernine:
At What Level of Granularity Should We be Componentizing for Software Reliability? 273-282 - Lars Grunske, Jun Han:
A Comparative Study into Architecture-Based Safety Evaluation Methodologies Using AADL's Error Annex and Failure Propagation Models. 283-292 - Dae-Kyoo Kim:
Software Quality Improvement via Pattern-Based Model Refactoring. 293-302 - Fan Zhang, Xingshe Zhou, Junwen Chen, Yunwei Dong:
A Novel Model for Component-Based Software Reliability Analysis. 303-309
High assurance systems and programs
- Fredrik Törner, Peter Öhman:
Automotive Safety Case A Qualitative Case Study of Drivers, Usages, and Issues. 313-322 - Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward:
Detection and Diagnosis of Recurrent Faults in Software Systems by Invariant Analysis. 323-332 - Jicheng Fu, Farokh B. Bastani, I-Ling Yen:
Automated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning Techniques. 333-342 - Hironao Takahashi, Hafiz Farooq Ahmad, Kinji Mori:
Layered Memory Architecture for High IO Intensive Information Services to Achieve Timeliness. 343-349
Ad hoc network
- Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu, Li Xiao, Leo C. Kempel:
Securing Sensor Nodes Against Side Channel Attacks. 353-361 - Oliviero Riganelli, Radu Grosu, Samir R. Das, C. R. Ramakrishnan, Scott A. Smolka:
Power Optimization in Fault-Tolerant Mobile Ad Hoc Networks. 362-370
Data management systems
- Kun Bai, Peng Liu:
A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System. 373-382 - Yunqi Ye, I-Ling Yen, Liangliang Xiao, Bhavani Thuraisingham:
Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems. 383-391 - Bobji Mungamuru, Hector Garcia-Molina:
Privacy, Preservation and Performance: The 3 P's of Distributed Data Management. 392-401
Service-oriented Computing
- Khalid Mahmood, Satoshi Niki, Xiaodong Lu, Kinji Mori:
A Novel Ripple-Based Context-Cognizant Service Discovery Method in Autonomous Decentralized Community System. 405-413 - Wang Chu, Depei Qian:
Architecture Centric System Design for Supporting Reconfiguration of Service Oriented Systems. 414-423 - Daniel Robinson, Gerald Kotonya:
A Self-Managing Brokerage Model for Quality Assurance in Service-Oriented Systems. 424-433
Short papers I
- Hui Shen, Aliya Virani, Jianwei Niu:
Formalize UML 2 Sequence Diagrams. 437-440 - Qin Li, Huibiao Zhu, Jifeng He:
Towards the Service Composition Through Buses. 441-444 - Quan Zu, Miaomiao Zhang, Jing Liu, Qingfeng Du:
Designing, Modelling and Verifying a Container Terminal System Using UPPAAL. 445-448 - Chunying Zhao, Kang Zhang:
A Grammar-Based Reverse Engineering Framework for Behavior Verification. 449-452 - Jian Zhang:
Checking Inconsistency of Rule Sets in Active Real-Time Databases. 453-456 - Jin Wei, Guiping Su, Meng Xu:
An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets. 457-460
Short papers II
- Kai Du, Huaimin Wang, Shuqiang Yang, Yingwen Chen, Yan Wen:
Reliability Design for Large Scale Storage Systems. 463-466 - Lingfu Xie, Du Xu, Qing Yao, Lei Song:
A New Fault-Tolerant Wormhole Routing Scheme in Tori with Convex Faults. 467-470 - Eryk Kylikowski, Riccardo Scandariato, Wouter Joosen:
Using Multi-Level Security Annotations to Improve Software Assurance. 471-474 - Hua Wang, Yao Guo, Xiangqun Chen:
DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. 475-478 - Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value. 479-482 - Albin Zuccato, Samuel Dubus, Evren Bulut:
Methodology for Service-Oriented Management of Security Assurance in Communication Infrastructures. 483-486 - Zhou Zhou, Linzhang Wang, Zhanqi Cui, Xin Chen, Jianhua Zhao:
Jasmine: A Tool for Model-Driven Runtime Verification with UML Behavioral Models. 487-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.