By Topic

2010 Fourth International Conference on Secure Software Integration and Reliability Improvement

9-11 June 2010

Filter Results

Displaying Results 1 - 25 of 42
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (313 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Message from Steering Committee Chairs

    Publication Year: 2010, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (170 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2010, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (130 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (128 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s):xii - xiv
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2010, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Keynote abstracts

    Publication Year: 2010, Page(s):xvii - xx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB)

    Summary form only given. Despite their popularity and importance, pointer-based programs posed a major challenge for software verification. In this talk, we present a specification mechanism that is precise, concise and modular for automated verification of pointer-based programs. Our approach is built on top of separation logic that follows from pioneering works by Reynolds and O'Hearn. We focus ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and Implementing Complex Systems with Timebands

    Publication Year: 2010, Page(s):1 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (679 KB) | HTML iconHTML

    We describe how to use a timeband architecture to model real-time requirements. The architecture separates requirements that use different time units, producing a family of models. Each model is characterised by its granularity and precision. These models are then linked using superposition, a kind of event refinement, and a loose synchronisation of their time units, with respect to their precisio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recent Catastrophic Accidents: Investigating How Software was Responsible

    Publication Year: 2010, Page(s):14 - 22
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB) | HTML iconHTML

    Areas crucial to life such as medicine, transportation, nuclear-energy research and industry, aeronautics, and others, all make use of software in one way or another. However, the application of software to such domains means that the software may now become safety-critical such that an error in the software or an error in its use could have devastating consequences. This paper reviews 14 recent a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Verification of Safety Critical Systems: A Case Study on Pacemaker

    Publication Year: 2010, Page(s):23 - 32
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (491 KB) | HTML iconHTML

    The pacemaker challenge proposed by Software Quality Research Laboratory is looking for formal methods to produce precise and reliable systems. Safety critical systems like pacemaker need to guarantee important properties (like deadlock-free, safety, etc.), which concern human lives. Formal methods have been applied in designing safety critical systems with verified desirable properties. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Anomalies in Semantic Web Rules

    Publication Year: 2010, Page(s):33 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    The current Semantic Web ontology language has been designed to be both expressive for specifying complex concepts and decidable for automated reasoning. In recent years, the Semantic Web Rules Language has been proposed to add more expressiveness to the family of ontology languages. However the inclusion of rules has created new challenges of not only verifying the consistency of an ontology, but... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Checking a Lazy Concurrent List-Based Set Algorithm

    Publication Year: 2010, Page(s):43 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Concurrent objects are notoriously difficult to design correctly, and high performance algorithms that make little or no use of locks even more so. In this paper, we present a formal verification of a lazy concurrent list-based set using model checking techniques. The algorithm supports insertion, removal, and membership testing of a list entry under optimistic locking scheme. The algorithm has no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • YAWL2DVE: An Automated Translator for Workflow Verification

    Publication Year: 2010, Page(s):53 - 59
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    Workflow management systems (WfMSs) have gained increasing attention recently as an important technology to improve information system development in dynamic and distributed organizations. However the absence of verification facilities in most WfMSs causes the resulting implementation of large and complex workflow models to be at risk of undesirable runtime executions. This problem of design valid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable V&V Effort Estimation for Ultra-Large-Scale Systems

    Publication Year: 2010, Page(s):60 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    Project planning requires early-on effort estimation. As such, predictions into the future are made with some degree of unavoidable uncertainty. It is likely that some of those predictions will be proven wrong. Thus, solid techniques and concrete procedures are needed to reduce the inaccuracy of estimates. This paper is motivated by practical industrial experiences. It presents a scalable techniqu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aligning Security Requirements and Security Assurance Using the Common Criteria

    Publication Year: 2010, Page(s):69 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    This paper presents a new approach, which attempts to provide a basic framework in which security requirements and security assurance can be aligned in a uniform and concise way in a single requirements modelling methodology. This framework aims at providing security requirements modelling method for the system development as well as security assurance under the Common Criteria (IEC/ISO 15408), an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Agent-Based System to Support Assurance of Security Requirements

    Publication Year: 2010, Page(s):78 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1264 KB) | HTML iconHTML

    Current approaches to evaluating security assurance either focus on the software development stage or at the end product software. However, most often, it is after the deployment or implementation phase that specified security requirements may be violated. This may be due to improper deployment of the security measures, environmental hazards or to the fact that the assumptions under which the secu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Based Argument Analysis for Evolving Security Requirements

    Publication Year: 2010, Page(s):88 - 97
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    Software systems are made to evolve in response to changes in their contexts and requirements. As the systems evolve, security concerns need to be analysed in order to evaluate the impact of changes on the systems. We propose to investigate such changes by applying a meta-model of evolving security requirements, which draws on requirements engineering approaches, security analysis, argumentation a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure Type-Aware Reliability Assessment with Component Failure Dependency

    Publication Year: 2010, Page(s):98 - 105
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    Most of the existing reliability assessment techniques assume that components fail independently and consider different types of failures equally. By disregarding component failure dependency, these techniques assume inappropriately that a component failure does not affect any other component and it directly leads to a system failure. Also, by considering different failure types equally, reliabili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Reliability Modeling with Integrated Test Coverage

    Publication Year: 2010, Page(s):106 - 112
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB) | HTML iconHTML

    The models to predicate software reliability using test coverage (TC) have been widely studied in recent years. An increasing number of TC based software reliability models (TC-SRMs) have been developed. Meanwhile, to quantify the degree of effectiveness of software testing comprehensively, over ten kinds of TC measures have been proposed and each of them has its strength and weakness. A common pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.