Dependability of Computer Systems, 2007. DepCoS-RELCOMEX '07. 2nd International Conference on

14-16 June 2007

Filter Results

Displaying Results 1 - 25 of 57
  • 2nd International Conference on Dependability of Computer Systems - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (184 KB)
    Freely Available from IEEE
  • 2nd International Conference on Dependability of Computer Systems - Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (630 KB)
    Freely Available from IEEE
  • 2nd International Conference on Dependability of Computer Systems - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • 2nd International Conference on Dependability of Computer Systems - Table of contents

    Publication Year: 2007, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (250 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (800 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (404 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2007, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (401 KB)
    Freely Available from IEEE
  • Semiformal Approach to the IT Security Development

    Publication Year: 2007, Page(s):3 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    The paper concludes the author's works on the IT security development framework compliant with the common criteria standard. Two basic issues were solved to make this development easier and more effective: the entire development process was better formalized using the UML/OCL approach, and the set of specification means was extended (by defining enhanced generics) thus now the set covers all devel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems

    Publication Year: 2007, Page(s):11 - 18
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    On large and complex distributed systems hardware and software faults, as well as vulnerabilities, exhibit significant dependencies and interrelationships. Being able to assess their actual impact on the overall system dependability is especially important. The goal of this paper is to propose a unifying way of describing a complex hardware and software system, in order to assess the impact of bot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of MDA/PSM database model quality in the context of selected non-functional requirements

    Publication Year: 2007, Page(s):19 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    Conceptual, logical, and physical database models can be regarded as PIM, PSM1, and PSM2 data models within MDA architecture, respectively. Many different logical database models can be derived from a given conceptual database model by applying a set of transformations rules. To choose a logical database model for further transformation (to physical database model at PSM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Overlay Simulator for Interdependent Critical Information Infrastructures

    Publication Year: 2007, Page(s):27 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Modeling and simulation of heterogeneous interconnected critical infrastructures and of their (inter)dependencies is essential to get a clear understanding of their behavior. Current solutions are generally dedicated to one sector and do not provide means for information exchange with other simulators. This paper tries to fill this gap by introducing a simulation environment overlaying existing si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Influence of Relations among Different Levels of UML Diagrams onto Software Maintenance

    Publication Year: 2007, Page(s):35 - 42
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    UML represents the current state of the software model with the help of 13 types of diagrams. The methodology of modeling is usually described as a process of reasoning new properties of these diagrams on the base of their previous versions. There is not, however any formal support of remembering the trace of this reasoning process. The introduction of the vertical relation, showing how an element... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-version Information Technologies and Development of Dependable Systems out of Undependable Components

    Publication Year: 2007, Page(s):43 - 50
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    The approaches of dependable computing systems development out of undependable components based on multi-version technologies are analyzed. Taxonomies of dependable systems, stages of dependable systems paradigms evolution are discussed. Same general tasks and principles of providing dependability are analyzed. Lifecycle model and principles of development and assessment of dependable computing sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assurance of System Consistency During Independent Creation of UML Diagrams

    Publication Year: 2007, Page(s):51 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    Graph transformations are a very intuitive formalism used in visualization, modelling of distributed systems or in support its allocation. The formal description the modelling process (both UML diagram and the trace of designer decisions) complicate its structure; we should be able support both parallel activity of local graph transformation systems and their cooperation for the assurance of the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Systems Metamodels Developing for Providing Structural and Semantic Interoperability

    Publication Year: 2007, Page(s):59 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3622 KB) | HTML iconHTML

    In the paper the problem of information system integration is considered. The actuality of the problem is shown and metamodeling approach is offered for its decision. This approach can provide common interpretation of integrating information system entities, based on problem domain ontology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Distributed Multilevel Agent-based Monitoring Technique for Automated Network Modelling Approach

    Publication Year: 2007, Page(s):61 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    In last few years extraordinarily strong trend of rapid development of dedicated telecommunications networks, mostly specialized information systems, is observed. Still growing number of users as well as continuously rising needs and requirements regarding business services delivered by these systems, implies increasing complexity of solutions being build. Therefore unfortunately at the same time ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dataflow Analysis of Distributed Programs Using Generalized Marked Nets

    Publication Year: 2007, Page(s):73 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    The satisfiability and algorithmic decidability problems are discussed for message passing models of distributed programs represented as processes communicating through buffers. The satisfiability means that parameters of the buffers are coordinated such that any admissible process histories do not result in appearance of deadlock situations. The decidability problem is reduced to finding the leas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation Multi-State System Reliability by Structure Function

    Publication Year: 2007, Page(s):81 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Multi-State System is a mathematical model that is used in reliability analysis to present a system with some level of working efficiency. A structure function allows to describe behavior of system reliability depending on the efficiency of its components unambiguously. There are a lot of estimates of a Multi-State System on the basic of structure function. Dynamic Reliability Indices belong to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting Compliance with Security Standards by Trust Case Templates

    Publication Year: 2007, Page(s):91 - 98
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    Trust cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A trust case template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transient Fault Detection in State-Automata

    Publication Year: 2007, Page(s):99 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    State automata are implemented in numerous ways and technologies - from simple traffic light controls to high-performance microprocessors comprising thousands of different states. Highly-integrated microprocessors get more and more susceptible to transient faults induced by radiation, extreme clocking, temperature and decreasing voltage supplies. A transient fault in form of a single event-upset (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Duration Calculus for Analysis of Fault Trees with Time Dependencies

    Publication Year: 2007, Page(s):107 - 114
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    The paper deals with a problem of a description and analysis of fault trees with time dependencies, constructed for real-time systems to show possible ways leading to a hazard. Both the description and analysis are made with the duration temporal logic formalism - Duration Calculus (DC). It is the first time, when fault trees, containing the temporal gates, proposed by Magott and Skrobanek, got fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technique for Analyzing Items Reliability by Simulating Their Behaviour over Time Intervals

    Publication Year: 2007, Page(s):115 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    This paper covers a technique of analyzing various items reliability by simulating such items' behaviour over time intervals. The paper concerns the main stages of calculating reliability indices using the above technique, means of items description, representation of the input data and results. The scope of the technique, its advantages, disadvantages, and software implementations are analyzed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing Duration Systems using an approximation method

    Publication Year: 2007, Page(s):119 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Testing is an important validation activity particularly for real-time systems. We are interested to testing duration systems which are an extension of real-time systems, we consider that the specification of duration systems is described by a duration graphs. Duration graphs are an extension of timed graphs and are suitable for modeling the accumulated times spent by computations in the duration ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error Prevention, Detection and Diffusion Algorithms for Cryptographic Hardware

    Publication Year: 2007, Page(s):127 - 134
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    It is well known that hardware is susceptible to variety of different faults causing device malfunction, errors in the output or simply destroying the device. These threats refer to any type of hardware. However in case of cryptographic devices, such as smart cards or crypto-processors, errors may also leak some secret information hidden in the device (e.g. encryption keys). This was presented for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.