Scheduled System Maintenance
On Friday, September 21, IEEE Xplore will undergo scheduled maintenance. Users may experience intermittent access from 2:30–4:00 pm ET (6:30–8:00 UTC). The site may be unavailable for approximately 60 minutes during this period.
We apologize for any inconvenience.

2006 International Conference on Dependability of Computer Systems

25-27 May 2006

Filter Results

Displaying Results 1 - 25 of 55
  • International Conference on Dependability of Computer Systems - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (266 KB)
    Freely Available from IEEE
  • International Conference on Dependability of Computer Systems - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • International Conference on Dependability of Computer Systems - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • International Conference on Dependability of Computer Systems -Table of contents

    Publication Year: 2006, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2006, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (238 KB) | HTML iconHTML
    Freely Available from IEEE
  • UML Based Reverse Engineering for the Verification of Railway Control Logics

    Publication Year: 2006, Page(s):3 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    The Unified Modeling Language (UML) is widely used as a high level object oriented specification language. In this paper we present a novel approach in which reverse engineering is performed using UML as the modeling language used to achieve a representation of the implemented system. The target is the core logic of a complex critical railway control system, which was written in an application spe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compatibility of Software Components - Modeling and Verification

    Publication Year: 2006, Page(s):11 - 18
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Component-based software engineering (CBSE) has been emerging as a promising approach to the development of large-scale software architectures in which software components with well-defined interfaces can be quickly assembled into complex software systems. However, assembled components must be compatible in the sense that any sequence of operations requested by one of the interacting components mu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feasibility Analysis of MDA-based Database Design

    Publication Year: 2006, Page(s):19 - 26
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    MDA is a modern approach to software system development. The paper proposes how database design may be embedded into such development process. It is shown how database models are associated with MDA models, and next qualitative analysis of problems that are concerned with transformation of databases models along with transformation of non-functional requirements is presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded Systems Modeling Language

    Publication Year: 2006, Page(s):27 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    Embedded System Modeling Language (EMLAN) is high-level, C-like language for modeling and model checking the embedded systems software. The language addresses a number of topics such as: partitioning of the system, concurrency, interrupts, synchronization mechanisms, time, data transformations, hardware interactions. Model checking of the EMLAN specification is based on translations into DT-CSM (d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • State Model of Service Reliability

    Publication Year: 2006, Page(s):35 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    We propose a simple formalism for modelling of a service reliability. A service is defined as an ordered set of states of a modelled application. In the model, a certain reliability is assigned to each application state. Reliability of a service is expressed in terms of above partial reliabilities View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partially automatic generation of fault-trees with time dependencies

    Publication Year: 2006, Page(s):43 - 50
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    In the paper, we concentrate on safety analysis of systems controlled by controller whose dynamics is expressed by UML state-chart. The idea of construction of the FT with time dependencies is as follows. The structure of the FT is created by human being. Time parameters of events and gates of the FT are determined partially automatically from UML state-charts of the controller and from dynamics o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Semantics and Reasoning about UML Class Diagram

    Publication Year: 2006, Page(s):51 - 59
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    The main way of coping with the complexity of software systems is to construct and use models expressed in UML. Unfortunately, the semantics (meaning) of models written in UML is not precisely defined. It may result in the incorrect interpretation of a model and make it hard to strictly verify a model and its transformation. In this paper we formally (mathematically) define UML class diagram and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Security Systems vs. Critical Information Infrastructure Protection Systems - Similarities and Differences

    Publication Year: 2006, Page(s):60 - 67
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    The paper concerns similarities and differences between the information security management systems (ISMS) and the critical information infrastructure protection systems (CIIP), to predict the extent of adaptation works so that the ISMS could be used in CIIP. The discussion deals with different aspects of both types of systems: standardization, used models, considered security or protection object... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux Systems

    Publication Year: 2006, Page(s):68 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    We address several common problems with transparent checkpointing and present solutions to these problems, with focus on graphical user interfaces and thread support. We describe two possible ways to retrieve the GUI state from the X-server, by using a proxy for the X-protocol and enhancing the X-server with an extension, and we present a performance analysis showing that the proposed approach doe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Fault Injection Testbench

    Publication Year: 2006, Page(s):76 - 83
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    Fault injection techniques are widely used in system dependability evaluation. In the paper we deal with the problem of enhancing classical fault injection tools in two aspects: improvement of experiment effectiveness and result analysis capabilities. In particular we discuss the problem of distributing fault injection processes within a computer network and collecting the simulation results in a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hazard Prevention by Forced Time Constraints

    Publication Year: 2006, Page(s):84 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Minimal cut sets resulting from fault tree analysis (FTA) indicate basic events which, if occur together, can contribute to a hazard. For some applications we can extend event description with timing information and the hazard becomes enabled only if some particular timing relationships occur among the events of a given cut set. In this article we present how the timing information can be introduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach for Evaluating Trust in IT Infrastructure

    Publication Year: 2006, Page(s):92 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    Trustworthiness of an IT infrastructure can be justified using the concept of trust case which denotes a complete and explicit structure encompassing all the evidence and argumentation supporting trust within a given context. A trust case is developed by making an explicit set of claims about the system of interest and showing how the claims are interrelated and supported by evidence. The approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction to the Dependability Modeling of Computer Systems

    Publication Year: 2006, Page(s):100 - 109
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    Computer systems and networks are considered as a union of all resources, i.e. hardware, software and people (users, administrators and managers), essential for the realization of predicted tasks. The system dependability is defined as a generalization of performability and reliability, combining the notions of both these terms. The functional-reliability models are based on the observation that o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survey of Recovery Schemes in MPLS Networks

    Publication Year: 2006, Page(s):110 - 118
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6406 KB) | HTML iconHTML

    To provide dependable services MPLS networks make use of a set of procedures (detection, notification and fault recovery) which seek to ensure appropriate protection for the traffic carried in the LSPs. When a fault happens in the active LSP, the recovery scheme must redirect the traffic to a recovery path (the protection LSP or recovery LSP) which bypasses the fault. The two basic recovery models... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • d-HMAC Dynamic HMAC function

    Publication Year: 2006, Page(s):119 - 126
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    In this paper, we want to enhance the powerful of HMAC function (key-hashed message authentication) to be more resistant against the exhaustive search attack and birthday attack by inventing d-HMAC function (dynamic HMAC function). To achieve our purpose we use dynamic values of ipad and opad. The values of ipad and opad are calculated in dynamic way instead of having fixed strings. The calculatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Aspects of SCADA and Corporate Network Interconnection: An Overview

    Publication Year: 2006, Page(s):127 - 134
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    SCADA (supervisory control and data acquisition) systems play an important role in industrial process. In the past, these used to be stand-alone models, with closed architecture, proprietary protocols and no external connectivity. Nowadays, SCADA rely on wide connectivity and open systems and are connected to corporate intranets and to the Internet for improve efficiency and productivity. SCADA ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building Dependable Intrusion Prevention Systems

    Publication Year: 2006, Page(s):135 - 142
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Intrusion prevention systems (IPSs) have become widely recognized as a powerful tool and an important element of IT security safeguards. Essential to every network intrusion prevention system is the ability to search through packets and identify patterns that match known attacks. Resource- and time-efficient string matching algorithms are therefore important for identifying these packets at the li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth control in redundant news server links

    Publication Year: 2006, Page(s):143 - 149
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Usenet news is a worldwide network of servers providing discussion forums with topics ranging from scientific research to hobbies, entertainment or politics. Redundant links between servers are used to provide fault tolerant operation of individual servers despite the possible network link failures. As the volume of news articles can take up to 200 gigabytes per day, this poses a problem of exhaus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.