By Topic

Dependable, Autonomic and Secure Computing, 2007. DASC 2007. Third IEEE International Symposium on

Date 25-26 Sept. 2007

Filter Results

Displaying Results 1 - 25 of 30
  • Third IEEE International Symposium on Dependable, Autonomic and Secure Computing - Cover

    Publication Year: 2007 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (38 KB)  
    Freely Available from IEEE
  • Third IEEE International Symposium on Dependable, Autonomic and Secure Computing-Title

    Publication Year: 2007 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (55 KB)  
    Freely Available from IEEE
  • Third IEEE International Symposium on Dependable, Autonomic and Secure Computing-Copyright

    Publication Year: 2007 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • Third IEEE International Symposium on Dependable, Autonomic and Secure Computing - TOC

    Publication Year: 2007 , Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (58 KB)  
    Freely Available from IEEE
  • Message from the DASC 2007 Chairs

    Publication Year: 2007 , Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizers

    Publication Year: 2007 , Page(s): ix - x
    Save to Project icon | Request Permissions | PDF file iconPDF (39 KB)  
    Freely Available from IEEE
  • International Advisory Committee

    Publication Year: 2007 , Page(s): xi - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007 , Page(s): xiii - xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB)  
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2007 , Page(s): xix
    Save to Project icon | Request Permissions | PDF file iconPDF (32 KB)  
    Freely Available from IEEE
  • Building a Self-Healing Operating System

    Publication Year: 2007 , Page(s): 3 - 10
    Cited by:  Papers (11)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (136 KB) |  | HTML iconHTML  

    User applications and data in volatile memory are usually lost when an operating system crashes because of errors caused by either hardware or software faults. This is because most operating systems are designed to stop working when some internal errors are detected despite the possibility that user data and applications might still be intact and recoverable. Techniques like exception handling, co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Configuration Techniques for MuniSocket

    Publication Year: 2007 , Page(s): 11 - 20
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (238 KB) |  | HTML iconHTML  

    MuniSocket (multiple-network-interface socket) provides mechanisms to enhance the communication performance properties such as throughput, transfer time, and reliability by utilizing the existing multiple network interface cards between a pair of computers. Although the MuniSocket model has some communication performance advantages over the regular socket, it has a number of configuration complexi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incorporating Modular Imperfect Coverage into Dynamic Hierarchical Systems Analysis

    Publication Year: 2007 , Page(s): 21 - 28
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (409 KB) |  | HTML iconHTML  

    This paper deals with the evaluation of the reliability of a dynamic hierarchical system. Reliability of the system is calculated precisely by incorporating modular imperfect coverage model for both static and dynamic subsystems. Modular imperfect coverage model is analyzed in detail using formal methods to debug the specification errors and remove any ambiguity. A modular and hierarchical decompo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Coarse-Grained Pessimistic Message Logging Scheme for Improving Rollback Recovery Efficiency

    Publication Year: 2007 , Page(s): 29 - 36
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (304 KB) |  | HTML iconHTML  

    As a common technology for fault tolerance and load balance, rollback-recovery faces the challenges of scalability and inherent variability in those long-running large-scale applications with grids as the computing infrastructure. Among the rollback recovery schemes, pessimistic message logging protocols (PMLPs) and coordinated checkpointing protocols (CCPs) are the most popular in practice. Altho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Byzantine Fault Tolerant Distributed Commit Protocol

    Publication Year: 2007 , Page(s): 37 - 46
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (172 KB) |  | HTML iconHTML  

    In this paper, we present a Byzantine fault tolerant distributed commit protocol for transactions running over un- trusted networks. The traditional two-phase commit protocol is enhanced by replicating the coordinator and by running a Byzantine agreement algorithm among the coordinator replicas. Our protocol can tolerate Byzantine faults at the coordinator replicas and a subset of malicious faults... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compiler-Directed Region-Based Security for Low-Overhead Software Protection

    Publication Year: 2007 , Page(s): 47 - 54
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (368 KB) |  | HTML iconHTML  

    Software security has become a prominent area of research in recent years, with research efforts spanning a wide range of topics. Among these are techniques such as those in this paper that are in the general area of languages, compilers and architecture aimed at increasing the security of computing systems. This paper describes a compiler technique that performs risk-analysis on source code and g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Proactive Fraud Management Framework for Financial Data Streams

    Publication Year: 2007 , Page(s): 55 - 64
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (336 KB) |  | HTML iconHTML  

    Effective and efficient fraud prevention is a core capability required from financial institutions towards detecting and minimizing losses due to unlawful transactions. With the ubiquitous availability of unmanned customer interaction channels (e.g., Internet and mobile banking), the challenge of controlling fraud has increased substantially demanding fraud management frameworks capable of providi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges and Best Practices in Policy-Based Autonomic Architectures

    Publication Year: 2007 , Page(s): 65 - 74
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (276 KB) |  | HTML iconHTML  

    Based on insights from the development of a commercial framework for the autonomic management of data center resources, we identify some of the main challenges faced by autonomic architectures. We describe a number of best practices for overcoming or, in some cases, working around these challenges, and we propose a general-purpose autonomic architecture that complies with our best practices and bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Atoms to Simplify Distributed Programs Checking

    Publication Year: 2007 , Page(s): 75 - 83
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (464 KB) |  | HTML iconHTML  

    The execution of a distributed program generates a large state space which needs to be checked in testing and debugging. This state space can be reduced by using atoms corresponding to code blocks before performing the checking of the required program properties. This paper presents our results in using atoms which are known at program design time for this purpose. We consider the impact of incomp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Inference-based Collaborative Filtering Approach

    Publication Year: 2007 , Page(s): 84 - 94
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    In memory-based collaborative filtering, the existing methods conduct a prediction based on the overall consistency of two users or items. The major problem with these methods is that it is hard to find users/items that are overall consistent with the test user/item in the system. In addition, these methods are sometimes being over optimistic, and disregard some useful information in user profiles... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Update Dependable Secure Computing Systems from a Survivability Assessment Perspective?

    Publication Year: 2007 , Page(s): 95 - 99
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (156 KB) |  | HTML iconHTML  

    In this paper, we investigate how to compute an updating time for a dependable secure computing (DSC) system from a survivability assessment perspective. Generally speaking, to prevent adversaries from learning secret information in a DSC system, the secret information has to be updated in the system. The proposed method is based on a novel concept of survivability of reconfigurable systems presen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of CORBA Replication Models

    Publication Year: 2007 , Page(s): 100 - 107
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (261 KB) |  | HTML iconHTML  

    Active and passive replication models constitute an effective way to achieve the availability objectives of distributed real-time (DRE) systems. These two models have different impacts on the application performance. Although these models have been commonly used in practical systems, a systematic quantitative evaluation of their influence on the application performance has not been conducted. In t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Byzantine Fault Tolerance for Nondeterministic Applications

    Publication Year: 2007 , Page(s): 108 - 118
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    All practical applications contain some degree of non- determinism. When such applications are replicated to achieve Byzantine fault tolerance (BFT), their nondeterministic operations must be controlled to ensure replica consistency. To the best of our knowledge, only the most simplistic types of replica nondeterminism have been dealt with. Furthermore, there lacks a systematic approach to handlin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Employing Expert Opinion and Software Metrics for Reasoning About Software

    Publication Year: 2007 , Page(s): 119 - 124
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (230 KB) |  | HTML iconHTML  

    When comparing software programs based on certain qualities there is usually more than one metric that can be used. Often these metrics may contradict one another or there may be no standard acceptance thresholds. In this work we demonstrate how the Analytical Hierarchy Process (AHP) can be used to mitigate the aforementioned deficiencies in metrics-based software decision making. We illustrate th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Trust Information Exchange for Federated Systems

    Publication Year: 2007 , Page(s): 125 - 133
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (607 KB) |  | HTML iconHTML  

    In federated systems, trust management is critical for information sharing and online collaboration. Security tokens provide a way to convey and exchange trust information for security and privacy protection. Although several communication protocols have mechanisms to exchange security tokens, users may still encounter difficulties when they have to handle security tokens across heterogeneous plat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • iKernel: Isolating Buggy and Malicious Device Drivers Using Hardware Virtualization Support

    Publication Year: 2007 , Page(s): 134 - 144
    Cited by:  Papers (4)  |  Patents (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (159 KB) |  | HTML iconHTML  

    The users of today's operating systems demand high reliability and security. However, faults introduced outside of the core operating system by buggy and malicious device drivers can significantly impact these dependability attributes. To help improve driver isolation, we propose an approach that utilizes the latest hardware virtualization support to efficiently sandbox each device driver in its o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.