2009 Fourth International Conference on Dependability of Computer Systems

June 30 2009-July 2 2009

Filter Results

Displaying Results 1 - 25 of 55
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2537 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (479 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s):ix - xi
    Request permission for commercial reuse | PDF file iconPDF (962 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Ontology-Based Security Problem Definition and Solution for the Common Criteria Compliant Development Process

    Publication Year: 2009, Page(s):3 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    The paper shows how to apply a new ontology-based approach to the security problem definition (SPD), which is the key stage of the IT security development process compliant with the ISO/IEC 15408 Common Criteria standard. The SPD specifies threats, security policies and assumptions concerning the developed target of evaluation (TOE). On the SPD basis the security objectives (SO) are elaborated exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UML 2 Interaction Overview Diagram Validation

    Publication Year: 2009, Page(s):11 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    UML 2 interaction overview diagram, IOD for short, is a variant of UML activity diagrams where the nodes may be interaction diagrams. Introduced on the UML 2 version, this diagram gathers benefits related to specific and global behaviors. When the nodes are sequence diagrams, it allows a valuated control flow specification. We propose in this paper an approach to validate the IOD notation. The val... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimal Büchi Automata for Certain Classes of LTL Formulas

    Publication Year: 2009, Page(s):17 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    In this paper we calculate the minimal number of states of Buchi automata which encode some classes of linear temporal logic (LTL) formulas that are frequently used in model checking. Among others, we show that the minimal size of a Buchi automaton accepting the formula Pi0p1 Lambda ... Lambda Pi0pn is n+1, the minimal size of Buchi automaton accepting the formula 0p1 View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extended Dependability Analysis of Information and Control Systems by FME(C)A-technique: Models, Procedures, Application

    Publication Year: 2009, Page(s):25 - 32
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (849 KB) | HTML iconHTML

    This paper addresses the problems associated with dependability analysis of complex information and control systems (I&CS). FME(C)A-technique is proposed as a unified approach to I&CS dependability assessment. Classic philosophy is extended by introducing new items into assessed objects, relevant causes, assessed effects, assessed attributes and used means. FME(C)A-tables and models for de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Languages of CTL and RTCTL Calculi in Real-Time Analysis of a System Described by a Fault Tree with Time Dependencies

    Publication Year: 2009, Page(s):33 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (985 KB) | HTML iconHTML

    Minimal cut sets are one of the main results of analysis of fault trees with time dependencies. They contain events leading to a hazard (root of the tree). The events have minimal and maximal time intervals from both their start and end times to the possible appearance of the hazard. These informations may be useful in real-time operation of a system, for which the fault tree was constructed. To a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability of Safety-Critical Computer Systems through Component-Based Evolution

    Publication Year: 2009, Page(s):42 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB) | HTML iconHTML

    Modification causes of safety-critical computer systems and its components and procedures of evolution analysis are discussed in the paper. An evolutional-component model of computer systems has been developed for evoluability assessment. This model is applied to formalize analysis of pre-developed software and hardware OTS-components by use of vector operations in structured multilevel space ldqu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UML-Based Reliability Modeling of Network Services, a UDP Echo Service Case Study

    Publication Year: 2009, Page(s):50 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    In the paper, we discuss state space reliability modeling formalism of distributed systems and services compliant with UML metamodel. Behavior of modeled application system we describe in terms of states. Service generation process we represent as a sequence of application system states. State space approach allows us to define dependence between application system components via dependence betwee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separating Users' Views in a Development Process for Agile Methods

    Publication Year: 2009, Page(s):61 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Agile methods require a rigorous development process that takes into account a permanent involvement of user in all development steps. Several advanced researches have treated the various aspects of agile development methods. However, they lack rigorous and specific processes based on explicit and detailed definition of userspsila organization and interaction during development process. In this pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dataflow Approach to Testing Java Programs

    Publication Year: 2009, Page(s):69 - 76
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Code based (ldquowhite boxrdquo) approach to testing can be divided into two main types: control flow coverage and data flow coverage methods. Dataflow testing was introduced for structural programming languages and later adopted for object languages. Among many tools supporting code based testing of object programs, only JaBUTi and DFC (data flow coverage) support dataflow testing of Java program... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of a Java Fault Injector for Exhaustif® SWIFI Tool

    Publication Year: 2009, Page(s):77 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (541 KB) | HTML iconHTML

    Java is a successful programming environment and its use has grown from little embedded applications until enterprise network servers based on J2EE. This intensive use of Java demands the validation of their fault tolerance mechanisms to avoid unexpected behavior of the applications at runtime. This paper describes the design and implementation of a fault injector for the ldquoExhaustifreg View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Concept of a Web Application Blending Thin and Fat Client Architectures

    Publication Year: 2009, Page(s):84 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    Rich Internet applications and Web application frameworks treat user agents as either thin or fat clients. Whereas the former approach does not take advantage of the increasing potential of modern Web browsers, the latter requires the availability of their scripting engine. Although the majority of users allow the source code to be interpreted by their clients, some consider it to be a security th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design and Implementation of a Documentation Generator for the PRISM Language

    Publication Year: 2009, Page(s):91 - 98
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (426 KB) | HTML iconHTML

    PRISM is a tool for formal modelling and analysis of systems which exhibit random or probabilistic behaviour. Having developed a documentation generator for its language, we explain the design and the corresponding implementation of our extension to PRISM. The paper consists of a study of the unobtrusive enhancements to the parser of the original code base in order to construct software analogous ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Rejuvenation for Higher Levels of VoIP Availability and Mean Time to Failure

    Publication Year: 2009, Page(s):99 - 106
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    Recently, voice over Internet protocol (VoIP) has become an evolutionary technology in the communication area. Despite its innovative nature, VoIP faces some problems such as resource degradation on the server supporting the system. In this paper a VoIP system consisting of the main parts that can affect the VoIP service such as SIP servers, routers, ISP internet service provider, firewalls and fi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model Based Framework for Specifying and Executing Fault Injection Experiments

    Publication Year: 2009, Page(s):107 - 114
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (514 KB) | HTML iconHTML

    Dependability is a fundamental property of computer systems operating in critical environment. The measurement of dependability (and thus the assessment of the solutions applied to improve dependability) typically relies on controlled fault injection experiments that are able to reveal the behavior of the system in case of faults (to test error handling and fault tolerance) or extreme input condit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison of Structural Testing Strategies Based on Subdomain Testing and Random Testing

    Publication Year: 2009, Page(s):115 - 122
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Both partition testing and random testing methods are commonly followed practice towards selection of test cases. For partition testing, the programpsilas input domain is divided into subsets, called subdomains, and one or more representatives from each subdomain are selected to test the program. In random testing test cases are selected from the entire programpsilas input domain randomly. The mai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Siphon-Based Verification of Component Compatibility

    Publication Year: 2009, Page(s):123 - 132
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    In component-based systems, two interacting components are compatible if any sequence of services requested by one component can be provided by the other. This concept of compatibility can easily be extended to a set of interacting components. Checking the compatibility of interacting components is essential for any dependable software system. Recently, an approach to verification of component com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.