2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX

26-28 June 2008

Filter Results

Displaying Results 1 - 25 of 65
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (389 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (641 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s):xi - xiii
    Request permission for commercial reuse | PDF file iconPDF (823 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2008, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (404 KB)
    Freely Available from IEEE
  • Using UML(VR) for Supporting the Automated Test Data Generation

    Publication Year: 2008, Page(s):3 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Software testing is the most common practice of software quality assurance. In this paper we will present a method of supporting the test data generations using the information from different kinds of UML diagrams. This method is based on the UML(VR) concept which is the extension of the standard UML with vertical relations which define in the formal way the relations between elements from differe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of System Workload Time Characteristic Using UML Timing Diagrams

    Publication Year: 2008, Page(s):9 - 14
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Timing diagrams are one of the new types of diagrams introduced in UML ver. 2.0. They are the tool which allows us to characterize the behavior of system components with respect to time parameter. In this paper we propose a method of using Timing Diagrams to estimate the overloading of the boundary elements of the system in the earliest possible stage of system designing - based only on the Use Ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vulnerability Modelling for the Analysis of Network Attacks

    Publication Year: 2008, Page(s):15 - 22
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    In order to perform a successful attack on a network, an intruder must know various penetration techniques, also known as exploits. In general, an exploit can be successful only if some pre-conditions are true. Such conditions may involve the presence of vulnerable programs and/or specific software configurations, as well as certain attacker privileges on hosts and network reachability. When an ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy strategies in modeling effects of technological implementations

    Publication Year: 2008, Page(s):23 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    In our work we propose the method of steering the technological effects under assumption, that we be base on interval or fuzzy date data. Such character of data in use to technological model the von Neumann (or others) give us the possibility to compose permutation structures of technological parameters. It permits to formulate a vectors of control the technological process in larger range than in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models

    Publication Year: 2008, Page(s):31 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    When using formal methods, security protocols are usually modeled with a high level of abstraction. In particular, encryption is assumed to be perfect and cryptographic algorithms and their parameters are often abstracted away. This paper states a set of constraints under which, if an abstract protocol model is secure, then a refined model, which takes into account cryptographic algorithms and par... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML Schema Based Faultset Definition to Improve Faults Injection Tools Interoperability

    Publication Year: 2008, Page(s):39 - 46
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    This paper describes an XML schema formalization approach for the definition of basic fault sets which specify memory and/or register value corruption in microprocessor-based systems. SWIFI (software implemented fault injection) tools use fault injectors to carry out the fault injection campaign defined in a GUI-based application. However, the communication between the fault injector and the appli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Language for Failure Patterns and Application in Safety Analysis

    Publication Year: 2008, Page(s):47 - 54
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Components and families of components in mechatronic systems often exhibit failure characteristics that are independent of system context and repeatable across applications. In this paper, we show that it is possible to capture and reuse such patterns for the purposes of system safety analysis. We describe a language that enables expression of failure behaviour and describe a number of useful patt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision Diagrams for Reliability Analysis of Multi-State System

    Publication Year: 2008, Page(s):55 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    Multi-state system (MSS) is one a mathematical model used in reliability analysis to describe a system having some working efficiency. We propose new methods for MSS description by decision diagrams that well know in algebra logic and in multiple-value logic in particular. We propose dynamic reliability indices for estimation of MSS reliability and elaborate algorithms for calculation of dynamic r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Method of Matrix Writing Constructing of Topological Structure of Computer Network

    Publication Year: 2008, Page(s):65 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Using mathematical methods for solving problems of reliability analysis, routing and performance of computer network (CN), which have more than 1000 nodes, requires compiling and operative renovation of CN topology matrix. In the paper such points are stated as: vector description of CN structure and rules, which provide the two-demensional image of CN structure, as well as algorithmic procedures ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability Aspects of e-Learning Systems

    Publication Year: 2008, Page(s):73 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    This work is devoted to dependability analysis of e-learning systems. Authors present technical aspects of the software part of e-learning systems (e-learning platforms, distant lectures, multimedia presentations and virtual laboratories). Next, a high availability approach to hardware part is discussed. It is followed by a short analysis of several dependability aspects (availability, usability, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hardware-in-the-Loop Simulation Environment for Real-Time Systems Development and Architecture Evaluation

    Publication Year: 2008, Page(s):80 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    In this paper we present a technology for integration of distributed real-time embedded systems (RTES) based on hardware-in-the loop simulation. The environment to support this technology is described. This environment also enables simulation-based evaluation of RTES architecture on early stages of RTES development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Tolerant Algorithm for Functional and Data Flow Parallel Programs Performance on Clusters

    Publication Year: 2008, Page(s):87 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    An approach and algorithm providing fault tolerant performance of functional and data flow parallel processes on clusters is presented in the paper. Main accent in the paper is on decentralized solution supporting of the fault tolerant computations and minimization of time and resources of the recovery process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application

    Publication Year: 2008, Page(s):95 - 102
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, standards conformity framework (SCF) containing methods ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Evaluation of Arguments in Trust Cases

    Publication Year: 2008, Page(s):103 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Trustworthiness of IT systems can be justified using the concept of a trust case. A trust case is an argument structure which encompasses justification and evidence supporting claimed properties of a system. It represents explicitly an expert's way of assessing that a certain object has certain properties. Trust cases can be developed collaboratively on the basis of evidence and justification of v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A True Random Number Generator with Built-in Attack Detection

    Publication Year: 2008, Page(s):111 - 118
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    True random number generators (TRNGs) are extensively used in cryptography, simulations and statistics. Metastability is a way to generate true random numbers. By using electromagnetic radiation, a flip-flop in a metastable state can be manipulated to a known state. In this work, we introduce and analyze the concept of a randomized bit-cell, being able to simultaneously produce random numbers and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conjugated Graph Grammars as a Mean to Assure Consistency of Systems of Conjugated Graphs

    Publication Year: 2008, Page(s):119 - 126
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Using graph grammars as a formal tool that supports the distributed system description necessitates a solution to both the problem of assurance of cohesion distributed subgraphs describing the system and making possible cooperation of (different) graph grammars (that will modify these graphs). The definition of conjugated graph grammars, introduced in the paper, seems to be a possible solution of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.