By Topic

2010 Third International Conference on Dependability

18-25 July 2010

Filter Results

Displaying Results 1 - 25 of 37
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2360 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):viii - ix
    Request permission for commercial reuse | PDF file iconPDF (68 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • End-to-End Transfer Rate Adjustment Mechanism for VANET

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    In Vehicular Ad Hoc Network (VANET), the route between a source node and a destination node is intermittently broken. It is difficult to provide the reliable data transfer based on TCP because TCP is not adaptable to such networks such as VANET. Therefore, this paper proposes an end-to-end transfer rate adjustment mechanism in the application layer for VANET. The proposed mechanism consists of thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Randomized Consensus in Wireless Environments: A Case Where More is Better

    Publication Year: 2010, Page(s):7 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    In many emerging wireless scenarios, consensus among nodes represents an important task that must be accomplished in a timely and dependable manner. However, the sharing of the radio medium and the typical communication failures of such environments may seriously hinder this operation. In the paper, we perform a practical evaluation of an existing randomized consensus protocol that is resilient to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software-Implemented Fault Injection at Firmware Level

    Publication Year: 2010, Page(s):13 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    Software-implemented fault injection is an established method to emulate hardware faults in computer systems. Existing approaches typically extend the operating system by special drivers or change the application under test. We propose a novel approach where fault injection capabilities are added to the computer firmware. This approach can work without any modification to operating system and / or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A User Requirement-Driven Service Dynamic Personalized QoS Model

    Publication Year: 2010, Page(s):17 - 23
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    In Web Services composition, effectively appraising of QoS of Web Services is a main method of service selecting. Most of current QoS models do not consider the uncertainty, subjectivity, interacting and business relativity of the non-functional attributes of services. And they lack of the deep and thorough analysis of user requirements. Thus they are not able to provide sufficient support to serv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Formal Specification in Event-B to Probabilistic Reliability Assessment

    Publication Year: 2010, Page(s):24 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    Formal methods, in particular the B Method and its extension Event-B, have proven their worth in the development of many complex software-intensive systems. However, while providing us with a powerful development platform, these frameworks poorly support quantitative assessment of dependability attributes. Yet, such an assessment would facilitate not only system certification but also system devel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FTDIS: A Fault Tolerant Dynamic Instruction Scheduling

    Publication Year: 2010, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    In this work, we target the robustness for controller scheduler of type Tomasulo for SEU faults model. The proposed fault-tolerant dynamic scheduling unit is named FTDIS, in which critical control data of scheduler is protected from driving to an unwanted stage using Triple Modular Redundancy and majority voting approaches. Moreover, the feedbacks in voters produce recovery capability for detected... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability of a Network Monitoring Hardware

    Publication Year: 2010, Page(s):38 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (635 KB) | HTML iconHTML

    System dependability plays an important role in the realization of computer communication infrastructures and the everyday operations and maintenance of computer networks. Increased redundancy is used as a common practice to improve dependability, however in some cases duplication of a networking equipment is not desirable due to high cost or increased system complexity as a result of handling pot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimating Reliability of Mobile Agent System for Mobile Ad Hoc Networks

    Publication Year: 2010, Page(s):45 - 50
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    A mobile agent is a particular type of agent with the ability to migrate from one host to another where it can resume its execution. Mobile agents can be used in applications for wireless network to save bandwidth and time. In this paper we consider dependability aspect, especially reliability issues that need to be addressed before the mobile agents can be used for a broad range of commercial app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software-Implemented Hardware Error Detection: Costs and Gains

    Publication Year: 2010, Page(s):51 - 57
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Commercial off-the-shelf (COTS) hardware is becoming less and less reliable because of the continuously decreasing feature sizes of integrated circuits. But due to economic constraints, more and more critical systems will be based on basically unreliable COTS hardware. Usually in such systems redundant execution is used to detect erroneous executions. However, arithmetic codes promise much higher ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature Specific Control Flow Checking in COTS-Based Embedded Systems

    Publication Year: 2010, Page(s):58 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    While the Control Flow Checking (CFC) methods are using the ordinary instruction set and general Arithmetic and Logic Unit (ALU) features to protect the programs against the transient faults, this paper presents a new kind of CFC method, called feature specific CFC. The idea behind this method is using a specific internal hardware in modern processors which provides the ability to monitor internal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective Data Dissemination for Large-Scale Complex Critical Infrastructures

    Publication Year: 2010, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2453 KB) | HTML iconHTML

    Large-scale complex infrastructures are emerging as new computing platforms for the federation of world-wide mission critical systems over the Internet. However, standard approaches to data dissemination are still not adequate to the scale of these systems. The best-effort delivery guarantees of the Internet and the occurrence of node failures may compromise the correct and timely delivery of data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performability Comparison of Schedulability Conditions in Real-Time Embedded Systems

    Publication Year: 2010, Page(s):70 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    In modern safety-critical real-time embedded systems, performance and reliability are two most important parameters. The joint consideration of these two parameters is called performability. This paper evaluates and compares different schedulability conditions, which are used for scheduling tasks with fault-tolerant Rate-Monotonic (RM) algorithm, with respect to their performability. The task re-e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced Policies for the Administrative Delegation in Federated Environments

    Publication Year: 2010, Page(s):76 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    In existing federated identity management systems it is more and more necessary new set of advanced policies, such as policies for the administrative delegation. They allow administrators to delegate a subset of the system policies management to other users, who will have a much wider knowledge in the application area where these policies will be applied. In this paper, we present an infrastructur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on Trust-Based Web Service Provision Approaches

    Publication Year: 2010, Page(s):83 - 91
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB) | HTML iconHTML

    The basic tenet of Service-Oriented Computing (SOC) is the possibility of building distributed applications on the Web by using Web Services as fundamental building blocks. The proliferation of such services is considered the second wave of evolution in the Internet age, moving the Web from a collection of pages to a collections of services. Consensus is growing that this Web Service “revol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management

    Publication Year: 2010, Page(s):92 - 97
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Security vulnerabilities play an increasing role within dependability procedures for information systems. However, traditional vulnerability models present several general shortcomings when matched with today requirements. To overcome these limits, we propose a vulnerability ontology based on three main enhancements: deeper integration with system asset ontology, better modelling of cause-effect r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intrusion Tolerance Approach to Enhance Single Sign on Server Protection

    Publication Year: 2010, Page(s):98 - 103
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Modern IT systems have evolved into complex distributed systems that support thousands of users, with each user requiring access to several applications. Single sign on (SSO) provides a convenient facility for managing user authentication such that a user only logs into a system once in order to gain access to many protected applications. For this reason it becomes vitally important to secure the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Dependable Business Processes with Fault-Tolerance Approach

    Publication Year: 2010, Page(s):104 - 111
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    The management and automation of business processes have become an essential tasks within IT organizations. Companies could deploy business process management systems to automatize their business processes. BPMS needs to ensure that those are as dependable as possible. Fault tolerance techniques provide mechanisms to decrease the risk of possible faults in systems. In this paper, a framework for d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.