2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN)

27-30 June 2011

Filter Results

Displaying Results 1 - 25 of 82
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011, Page(s): 1
    Request permission for reuse | PDF file iconPDF (497 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s): i
    Request permission for reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Message from the general chair and conference coordinator

    Publication Year: 2011, Page(s):ii - iii
    Request permission for reuse | PDF file iconPDF (340 KB)
    Freely Available from IEEE
  • Message from the DCCS program chair

    Publication Year: 2011, Page(s): iv
    Request permission for reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Message from the PDS program chair

    Publication Year: 2011, Page(s): v
    Request permission for reuse | PDF file iconPDF (767 KB)
    Freely Available from IEEE
  • DSN 2011 organizers

    Publication Year: 2011, Page(s): vi
    Request permission for reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • DSN 2011 Steering Committee

    Publication Year: 2011, Page(s): vii
    Request permission for reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • DCCS 2011 Program Committee

    Publication Year: 2011, Page(s): viii
    Request permission for reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • DCCS 2011 reviewers

    Publication Year: 2011, Page(s): ix
    Request permission for reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • PDS 2011 Program Committee

    Publication Year: 2011, Page(s): x
    Request permission for reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • PDS 2011 reviewers

    Publication Year: 2011, Page(s): xi
    Request permission for reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Citation information

    Publication Year: 2011, Page(s): xii
    Request permission for reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): xiii
    Request permission for reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • DSN 2011 trademark information

    Publication Year: 2011, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • DSN 2011 plenary sessions

    Publication Year: 2011, Page(s): xv
    Request permission for reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Keynote: “Dependable computing in banking and finance industry”

    Publication Year: 2011, Page(s):xvi - xvii
    Request permission for reuse | PDF file iconPDF (146 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote: “Reliability and security of nano technologies”

    Publication Year: 2011, Page(s): xviii
    Request permission for reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • William C. Carter award paper

    Publication Year: 2011, Page(s): xix
    Request permission for reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • DCCS 2011 sessions

    Publication Year: 2011, Page(s):xx - xxix
    Request permission for reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • PDS 2011 sessions

    Publication Year: 2011, Page(s):xxx - xxxix
    Request permission for reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • DSN 2011 workshops

    Publication Year: 2011, Page(s):xl - xli
    Request permission for reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2011, Page(s):xlii - xliii
    Request permission for reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Uni-directional trusted path: Transaction confirmation on just one device

    Publication Year: 2011, Page(s):1 - 12
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1253 KB) | HTML iconHTML

    Commodity computer systems today do not include a full trusted path capability. Consequently, malware can control the user's input and output in order to reveal sensitive information to malicious parties or to generate manipulated transaction requests to service providers. Recent hardware offers compelling features for remote attestation and isolated code execution, however, these mechanisms are n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Boundless memory allocations for memory safety and high availability

    Publication Year: 2011, Page(s):13 - 24
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1448 KB) | HTML iconHTML

    Spatial memory errors (like buffer overflows) are still a major threat for applications written in C. Most recent work focuses on memory safety - when a memory error is detected at runtime, the application is aborted. Our goal is not only to increase the memory safety of applications but also to increase the application's availability. Therefore, we need to tolerate spatial memory errors at runtim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.