default search action
2nd DASC 2006: Indianapolis, Indiana, USA
- Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA. IEEE Computer Society 2006, ISBN 0-7695-2539-3
Introduction
- Message from the General Co-Chairs.
- Organizing Committees.
- Referees.
Session 1: Autonomic Computing and Selfware
- Yuan-Shun Dai, Michael G. Hinchey, Manish Madhusoodan, James L. Rash, Xukai Zou:
A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System. 3-10 - Ian A. Troxel, Alan D. George:
Adaptable and Autonomic Mission Manager for Dependable Aerospace Computing. 11-18 - Joaquín Peña, Michael G. Hinchey, Roy Sterritt, Antonio Ruiz Cortés, Manuel Resinas:
A Model-Driven Architecture Approach for Modeling, Specifying and Deploying Policies in Autonomous and Autonomic Systems. 19-30
Session 2: Cryptography
- Li Bai:
A Reliable (k, n) Image Secret Sharing Scheme. 31-36 - Jong Youl Choi, Philippe Golle, Markus Jakobsson:
Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. 37-44 - Na Guo, Laurence Tianruo Yang, Man Lin, John P. Quinn:
A Parallel GNFS Integrated with the Block Wiedemann's Algorithm for Integer Factorization. 45-50 - Sining Liu, Brian King, Wei Wang:
A CRT-RSA Algorithm Secure against Hardware Fault Attacks. 51-60
Session 3: Autonomic Computing and Monitoring
- Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog:
A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation. 61-68 - Tetsuya Masuishi, Koichi Shibata, Yasuyuki Oki, Kinji Mori:
Autonomous Decentralized Load Tracking Techniques and Evaluation. 69-76 - Tadashi Dohi, Tatsuya Ozaki, Naoto Kaio:
Optimal Checkpoint Placement with Equality Constraints. 77-84 - Ruiping Ma, Liudong Xing, Howard E. Michel:
Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. 85-94
Session 4: Reliability and Security Modeling
- Anil Bazaz, James D. Arthur, Joseph G. Tront:
Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. 95-102 - Sung-Whan Woo, Omar Hussain Alhazmi, Yashwant K. Malaiya:
Assessing Vulnerabilities in Apache and IIS HTTP Servers. 103-110 - Takao Ando, Hiroyuki Okamura, Tadashi Dohi:
Estimating Markov Modulated Software Reliability Models via EM Algorithm. 111-118 - Gustavo A. Chaparro-Baquero, Nayda G. Santiago, Wilson Rivera, J. Fernando Vega-Riveros:
Measuring Quantitative Dependability Attributes in Digital Publishing Using Petri Net Workflow Modeling. 119-128
Session 5: Autonomy Supported by Grid and Pervasive Computing
- Xuejun Yang, Xiangli Qu, Chunmei Gui:
Towards Reliable Rating Filtering in Grid Reputation Systems: A Pre-Evaluating Set Based Bias-Tuned Approach1. 129-136 - Zhaoyu Liu, Dichao Peng:
A Security-Supportive Middleware Architecture for Pervasive Computing. 137-144 - Songqiao Han, Shensheng Zhang, Yong Zhang:
Self-Adaptive Pervasive Computing Application Based on Code Mobility. 145-154
Session 6: Network Security
- T. Paul Parker, Shouhuai Xu:
Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. 155-162 - Zhaoyu Liu, Roopesh Uppala:
A Dynamic Countermeasure Method for Large-Scale Network Attacks. 163-170 - Ahmad Patooghy, Seyed Ghassem Miremadi, A. Javadtalab, Mahdi Fazeli, Navid Farazmand:
A Solution to Single Point of Failure Using Voter Replication and Disagreement Detection. 171-176 - Zijiang Yang, Shiyong Lu, Ping Yang:
Runtime Security Verification for Itinerary-Driven Mobile Agents. 177-186
Session 7: Self-Adaptation and Scheduling
- Thanikesavan Sivanthi, Ulrich Killat:
A Satisficing MOMIP Framework for Reliable Real-time Application Scheduling. 187-194 - Qinghui Tang, Sandeep K. S. Gupta, Daniel Stanzione, Phil Cayton:
Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based Datacenters. 195-202 - Guoqing Yang, Hong Li, Zhaohui Wu:
SmartC: A Component-Based Hierarchical Modeling Language for Automotive Electronics. 203-210
Session 8: Autonomous Intrusion Detection
- Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham:
On Recognizing Virtual Honeypots and Countermeasures. 211-218 - Naixue Xiong, Yanxiang He, Yan Yang, Laurence Tianruo Yang, Chao Peng:
A Self-Tuning Multicast Flow Control Scheme Based on Autonomic Technology. 219-226 - Yuan-Shun Dai, Michael G. Hinchey, Mingrui Qi, Xukai Zou:
Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons. 227-234 - Emmanuel Hooper:
Intelligent Autonomic Strategy to Attacks in Network Infrastructure Protection: Feedback Methods to IDS, Using Policies, Alert Filters and Firewall Packet Filters for Multiple Protocols. 235-244
Session 9: Autonomy in Sensor Networks
- M. Masadeh Bani Yassein, Mohamed Ould-Khaoua, Lewis M. Mackenzie, Stylianos Papanastasiou:
Performance Evaluation of Adjusted Probabilistic Broadcasting in MANETs. 245-249 - Akhilesh Shrestha, Liudong Xing, Hong Liu:
Infrastructure Communication Reliability of Wireless Sensor Networks. 250-257 - Hui Kang, Xiaolin Li, Patrick J. Moran:
Autonomic Sensor Networks: A New Paradigm for Collaborative Information Processing. 258-268
Session 10: Automated Trust Management
- Xuehai Peng, Chuang Lin:
Architecture of Trustworthy Networks. 269-276 - Avinash Srinivasan, Joshua Teitelbaum, Jie Wu:
DRBTS: Distributed Reputation-based Beacon Trust System. 277-283 - Will Tao, Robert Steele:
Trusted Mobile Interaction via Extended Digital Certificates. 284-292
Session 11: Access Control
- Andrew Prunicki, Tzilla Elrad:
Aclamate: An AOSD Security Framework for Access Control. 293-300 - Omkar J. Tilak, Rajeev R. Raje, Xukai Zou:
Composing Access Control Policies of Distributed Components. 301-307 - Junda Liu, Lin Ning, Yibo Xue, Dongsheng Wang:
PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network. 308-314 - Weiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao:
An Algorithm for Privacy-Preserving Quantitative Association Rules Mining. 315-324
Session 12: Autonomic Computing and Context Awareness
- Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Governatori:
Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. 325-332 - Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny Wong:
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. 333-340 - Philip K. McKinley, Farshad A. Samimi, Jonathan K. Shapiro, Chiping Tang:
Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services. 341-348
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.