default search action
SSIRI 2009: Shanghai, China
- Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3758-0
Keynotes
- Jifeng He:
Probabilistic Programming With Coordination and Compensation. 1 - Bhavani Thuraisingham:
Security Engineering: Developments and Directions. 2-3 - Jeff Offutt:
Automatic Test Data Generation : Who, When and Where ?. 4 - Frances Paulisch:
Reliability for Software-Based Systems. 5 - Rudolf Siebenhofer:
Complexity - Interoperability - Deployment of Software. 6
Compositionality
- Xinhuai Tang, Sizhe Sun, Xiaozhou Yuan, Delai Chen:
Automated Web Service Composition System on Enterprise Service Bus. 9-13 - Hichem Boudali, Hasan Sözer, Mariëlle Stoelinga:
Architectural Availability Analysis of Software Decomposition for Local Recovery. 14-22 - David A. Cape, Bruce M. McMillin, Benjamin W. Passer, Mayur Thakur:
Recursive Decomposition of Progress Graphs. 23-31
Runtime Systems
- Chao Xu, Jinghui Gu, Ling Lin, Alei Liang, Haibing Guan:
CacheBit: A Multisource-Multitarget Cache Instrumentation Tool. 35-39 - Fuyuan Zhang, Zhengwei Qi, Haibing Guan, Xuezheng Liu, Mao Yang, Zheng Zhang:
FiLM: A Runtime Monitoring Tool for Distributed Systems. 40-46 - Pradeep Varma, Vijay K. Naik:
Scheduling and Controlling Semantics for Distributed Resource Based Computing Engines. 47-56
Vulnerability Detection and Defense
- Qiang Zhang, Yuan Luo, Chuliang Weng, Minglu Li:
A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems. 59-64 - JeeHyun Hwang, Tao Xie, Vincent C. Hu:
Detection of Multiple-Duty-Related Security Leakage in Access Control Policies. 65-74 - Jin-Cherng Lin, Jan-Min Chen, Chou-Chuan Chen, Yu-Shu Chien:
A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense. 75-81
Aspect-Oriented Programming
- Jia Lv, Jing Ying, Minghui Wu, Tao Jiang, Fanwei Zhu:
Verifying Aspect-Oriented Programs Using Open Temporal Logic. 85-92 - Pradeep Varma:
Anchored Text for Software Weaving and Merging. 93-100 - Kun Tian, Kendra M. L. Cooper, Kang Zhang, Huiqun Yu:
A Classification of Aspect Composition Problems. 101-109
Verification
- Chunying Zhao, Kang Zhang, Jie Hao, W. Eric Wong:
Visualizing Multiple Program Executions to Assist Behavior Verification. 113-122 - Yong Li, Yu Zhang, Yiyun Chen, Ming Fu:
On the Verification of Strong Atomicity in Programs Using STM. 123-131 - Conghua Zhou, Li Chen, Shiguang Ju, Zhifeng Liu:
State Space Reduction for Verifying Noninterference. 132-138
Security Requirements
- Jing Du, Ye Yang, Qing Wang:
An Analysis for Understanding Software Security Requirement Methodologies. 141-149 - Hédi Hamdi, Mohamed Mosbah:
A DSL Framework for Policy-Based Security of Distributed Systems. 150-158 - Ju An Wang, Minzhe Guo, Hao Wang, Min Xia, Linfeng Zhou:
Environmental Metrics for Software Security Based on a Vulnerability Ontology. 159-168
Testing
- Heejin Kim, Byoungju Choi, W. Eric Wong:
Performance Testing of Mobile Applications at the Unit Test Level. 171-180 - Lijun Lun, Xuemei Ding:
Analyzing Relation between Software Architecture Testing Criteria on Test Sequences. 181-186 - Madhu Kilari, Qiyu Huang, Tongdan Jin:
Six-Sigma Based Performance Verification in Early Development of Automatic Test Equipment. 187-192 - Fevzi Belli, Axel Hollmann, Markus Kleinselbeck:
A Graph-Model-Based Testing Method Compared with the Classification Tree Method for Test Case Generation. 193-200
Modeling, Analysis, and Forensics
- Chunxiang Xu, Hanpin Wang, Wanling Qu, Meixia Zhu, Yu Huang:
A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics. 203-211 - Chin-Yu Huang, Tsui-Ying Hung, Chao-Jung Hsu:
Software Reliability Prediction and Analysis Using Queueing Models with Multiple Change-Points. 212-221 - Lingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang, Yu Liu:
ReconBin: Reconstructing Binary File from Execution for Software Analysis. 222-229 - Ryan Q. Hankins, Tetsutaro Uehara, Jigang Liu:
A Comparative Study of Forensic Science and Computer Forensics. 230-239
Security
- Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin:
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS. 243-252 - Ching-Fan Lee, Justie Su-tzu Juan:
An Efficient and Secure Multi-secret Image Sharing Scheme with General Access Structure. 253-259 - Ming-Jheng Li, Ying-Hsuan Chang, Justie Su-tzu Juan:
Efficient Multi-secret Sharing Scheme Using Room Square. 260-266
Short Papers I
- Pejman Salehi, Ferhat Khendek, Maria Toeroe, Abdelwahab Hamou-Lhadj, Abdelouahed Gherbi:
Checking Service Instance Protection for AMF Configurations. 269-274 - Lirong Dai:
Security Variability Design and Analysis in an Aspect Oriented Software Architecture. 275-280 - Ying Jiang, Ying-Na Li, Shan-Shan Hou, Lu Zhang:
Test-Data Generation for Web Services Based on Contract Mutation. 281-286
Fast Abstracts
- Ryan Q. Hankins, Tetsutaro Uehara, Jigang Liu:
A Turing Machine-Based Model for Computer Forensic Reconstruction. 289-290 - Hae-Min Moon, Sung Bum Pan:
Implementation of the Privacy Protection in Video Surveillance System. 291-292 - Michael Jiang, Yaping Liu, Xinzheng Gu:
An Approach to Improving Reliability for Distributed Video-Based Monitoring Systems. 293-294
Student Doctoral Program I
- Xiaolong Deng, Bai Wang, Bin Wu, Shengqi Yang:
Research and Evaluation on Modularity Modeling in Community Detecting of Complex Network Based on Information Entropy. 297-302 - Haibo Yu, Tsunenori Mine, Makoto Amamiya:
Semantic ACP2P Information Retrieval Method. 303-308 - David Kammler, Junqing Guan, Gerd Ascheid, Rainer Leupers, Heinrich Meyr:
A Fast and Flexible Platform for Fault Injection and Evaluation in Verilog-Based Simulations. 309-314
Panel
- Rajesh Subramanyan:
Panel Description: Evolving Software Models for Global Organizations. 317 - Mao Boying:
Position Statement: Evolving Software Models for Global Organizations. 318-319 - Uttiya Basu:
Position Statement: Evolving Software Models for Global Organizations. 320
T4CIA Workshop I
- Jun Pang, Bao Tang:
Message from T4CIA Workshop Co-chairs. 323 - Rudolf Siebenhofer:
Systematic Cooperation between Industry and Universities . 324 - Qin Liu, Wenqiang Zheng, JunFei Ma:
Improving Test Quality by a Test Type Analysis Based Method. 325-328 - Lili Diao, Hao Wang:
A Safe Approach to Shrink Email Sample Set while Keeping Balance between Spam and Normal. 329-334
Short Papers II
- Hong Sun, Vincenzo De Florio, Ning Gui, Raf Hens, Bert Vankeirsbilck, Bart Dhoedt, Chris Blondia:
Adaptation Strategies for Performance Failure Avoindance. 337-341 - Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner:
Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field Locality. 342-347 - Matthias Schnelte:
Generating Test Cases for Timed Systems from Controlled Natural Language Specifications. 348-353
Workshop II
- Prasad Bokil, Priyanka Darke, Ulka Shrotri, R. Venkatesh:
Automatic Test Data Generation for C Programs. 359-368 - Yingxin Ren, Qing Gu, Jingxian Qi, Daoxu Chen:
Reliability Prediction of Web Service Composition Based on DTMC. 369-375 - Bao Tang:
Panel: Increase Industry and Academy Cooperation in Testing Technologies and Tools for Critical Industry Applications. 376
MVV Workshop
- Alessandro Basso, Alexander Bolotov, Vladimir Getov:
Temporal Specification and Deductive Verification of a Distributed Component Model and Its Environment. 379-386 - Fevzi Belli, Axel Hollmann, Sascha Padberg:
Communication Sequence Graphs for Mutation-Oriented Integration Testing. 387-392 - Tugkan Tuglular, Özgür Kaya, Can Arda Muftuoglu, Fevzi Belli:
Directed Acyclic Graph Modeling of Security Policies for Firewall Testing. 393-398
Short Papers III
- Anmin Xie, Guodong Chen, Yonggang Wang, Zhong Chen, Jian-bin Hu:
A New Method to Generate Attack Graphs. 401-406 - Sathish Pinagapani, Dianxiang Xu, Jun Kong:
A Comparative Study of Access Control Languages. 407-412 - Sung-Jin Lim, Hae-Min Moon, Seung-Hoon Chae, Yongwha Chung, Sung Bum Pan:
JPEG 2000 and Digital Watermarking Technique Using in Medical Image. 413-416 - Binbin Qu, Yin Huang, Xiaodong Xie, Yansheng Lu:
A Developed Dynamic Environment Fault Injection Tool for Component Security Testing. 417-422
Student Doctoral Program II
- Marcin Barylski, Henryk Krawczyk:
Multidimensional Approach to Quality Analysis of IPSec and HTTPS Applications. 425-430 - Naganathan E. R, Eugene X. P:
Software Stability Model (SSM) for Building Reliable Real Time Computing Systems. 431-435 - Xucheng Tang, Beijun Shen:
Extending Model Driven Architecture with Software Security Assessment. 436-441
Fast Abstracts II
- Jueliang Hu, Zuohua Ding, Geguang Pu:
Path-Based Approach to Integration Testing. 445-446 - Aida Omerovic, Ketil Stølen:
Simplifying Parametrization of Bayesian Networks in Prediction of System Quality. 447-448 - Zuohua Ding, Mingyue Jiang:
Reliability Computing for Service Composition. 449-450 - Ajit Srividya, Kovur Krishna Mohan, Ajit Kumar Verma:
Improvement of QoS in Process Centric Software Development Using ANP. 451-452
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.