By Topic

Secure Software Integration and Reliability Improvement, 2009. SSIRI 2009. Third IEEE International Conference on

Date 8-10 July 2009

Filter Results

Displaying Results 1 - 25 of 81
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2206 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (74 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2009, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (68 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Keynote: Probabilistic Programming With Coordination and Compensation

    Publication Year: 2009, Page(s): 1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB)

    Failure is the typical phenomena of the execution of long-running transactions. To accommodate the random features of Internet-based computing we extend the Guarded Command Language by addition of probabilistic choice and coordination combinators. This paper deals with rollback and compensation mechanisms of the language by providing a probabilistic model. We also discuss algebraic properties of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote: Security Engineering: Developments and Directions

    Publication Year: 2009, Page(s):2 - 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB)

    Security Engineering is a critical component of systems engineering. When complex and large systems are put together, one needs to ensure that the systems are secure. Security engineering methodologies include gathering the security requirements, specifying the security policies, designing the security model, identifying the security critical components of the system design, security verification ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote: Automatic Test Data Generation : Who, When and Where ?

    Publication Year: 2009, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB)

    The past decade has seen exciting changes in how we develop and test software. Researchers have invented numerous techniques and criteria that are now mature enough to be ready for industrial use. During this time, the need for reliable software has grown enormously. The user base is expanding, technological advances put software into more mission-critical locations, software continues to grow in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote: Reliability for Software-Based Systems

    Publication Year: 2009, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    Reliability has long been a topic of importance, but as systems become increasingly complex, missioncritical, and pervasive, the importance grows even more. Many of today's systems are software-based and it is important that relevant techniques for reliability as well as other "-ilities" are also applied to such software-based systems. This presentation will present a selection of such techniques ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote: Complexity - Interoperability - Deployment of Software”: Are We on the Right Way of Progress in the Software Industry?

    Publication Year: 2009, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (141 KB)

    The testing of software is still not a favorite topic for graduates and engineers in the industry even some objective facts of effort, used time and rlevance for product quality, shows that testing has a more than proportional relevance in the overall software development lifecycle. The changes of the various paradigms in software development (evolution to new oerating systems and programming lang... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Web Service Composition System on Enterprise Service Bus

    Publication Year: 2009, Page(s):9 - 13
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    The fast and constant development of economic and computer network technology urges the building of enterprise integration platform, and quick delivery of new web services. These problems can be solved by applying technologies like Enterprise Service Bus (ESB) and automated web services composition. In this paper, we present an ESB based automated web service composition prototype. Our prototype D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural Availability Analysis of Software Decomposition for Local Recovery

    Publication Year: 2009, Page(s):14 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB) | HTML iconHTML

    Non-functional properties, such as timeliness, resource consumption and reliability are of crucial importance for today's software systems. Therefore, it is important to know the non-functional behavior before the system is put into operation. Preferably, such properties should be analyzed at design time, at an architectural level, so that changes can be made early in the system development proces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive Decomposition of Progress Graphs

    Publication Year: 2009, Page(s):23 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    Search of a state transition system is traditionally how deadlock detection for concurrent programs has been accomplished. This paper examines an approach to deadlock detection that uses geometric semantics involving the topological notion of dihomotopy to partition the state-space into components; after that the reduced state-space is exhaustively searched. Prior work partitioned the state-space ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CacheBit: A Multisource-Multitarget Cache Instrumentation Tool

    Publication Year: 2009, Page(s):35 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    The cache utilization seriously impacts on program performance, whereas the cache behavior is transparent to developers so that they cannot get opportunity to optimize their programs by reducing cache miss rates. This paper introduces a useful instrumentation tool, Cachebit, which is built with Crossbit - a dynamic binary translation (DBT) framework with intermediate instruction layer. Cachebit si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FiLM: A Runtime Monitoring Tool for Distributed Systems

    Publication Year: 2009, Page(s):40 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    It is well recognized that debugging or testing a distributed system is a great challenge. FiLM is a runtime monitoring tool that can monitor the execution of distributed applications against LTL specifications on finite traces. Implemented within the online predicate checking infrastructure D3S, FiLM models the execution of distributed applications as a trace of consistent global snaps... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling and Controlling Semantics for Distributed Resource Based Computing Engines

    Publication Year: 2009, Page(s):47 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB) | HTML iconHTML

    With the advent of autonomic and cloud computing, computation engines are getting redefined as dynamic configurations of heterogeneous, distributed resources. In this paper, we describe the operational semantics of scheduling and controlling of computation engines configured from component resources subject to dependency and capacity constraints and in accordance with policies and objectives such ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems

    Publication Year: 2009, Page(s):59 - 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Recommender systems could be applied in grid environment to help grid users select more suitable services by making high quality personalized recommendations. Also, recommendation could be employed in the virtual machines managing platform to measure the performance and creditability of each virtual machine. However, such systems have been shown to be vulnerable to profile injection attacks (shill... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Multiple-Duty-Related Security Leakage in Access Control Policies

    Publication Year: 2009, Page(s):65 - 74
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (513 KB) | HTML iconHTML

    Access control mechanisms control which subjects (such as users or processes) have access to which resources. To facilitate managing access control, policy authors increasingly write access control policies in XACML. Access control policies written in XACML could be amenable to multiple-duty-related security leakage, which grants unauthorized access to a user when the user takes multiple duties (e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense

    Publication Year: 2009, Page(s):75 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (769 KB) | HTML iconHTML

    The interactive behavior between the hacker and the defender is similar to information warfare. The process of attack and defend can be abstracted as a tree diagram and analyzed based on game theory. When a hacker launches an attack, he must do his best to get expected payoff. Similarly the defender may hope to protect system against attacker successfully by minimizing security investment. The tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifying Aspect-Oriented Programs Using Open Temporal Logic

    Publication Year: 2009, Page(s):85 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (721 KB) | HTML iconHTML

    The behavior model of traditional temporal logic is closed and symmetrical, while the behavior model of aspect-oriented programs is open and asymmetrical. When the programmer designs the base-code, he is not sure what aspects will be woven to it. It is indirect and difficult to specify and verify the behavior of aspect-oriented programs by using traditional temporal logic. In this paper, we propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anchored Text for Software Weaving and Merging

    Publication Year: 2009, Page(s):93 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (753 KB) | HTML iconHTML

    Text-based software merge/refactoring systems are predominantly used. Anchored text, a datatype with first-class location anchors and greater commutativity of software merge operations has been proposed recently. In this paper we develop anchored text as a novel weaver for simultaneous, separate concerns. Irregular, crosscutting concerns such as porting issues are applicable simultaneously (multi-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.