Abstract is missing.
- Path Sensitive Analysis for Security FlawsMary Lou Soffa. 3 [doi]
- Transaction CalculusJifeng He. 4 [doi]
- Assurance Technology of System Test Based on Operators AspectsMasayuki Matsumoto. 5 [doi]
- Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security InspectionHolger Peine, Marek Jawurek, Stefan Mandel. 9-18 [doi]
- Low Cost Secure Computation for the General Client-Server Computation ModelLiangliang Xiao, I-Ling Yen, Farokh B. Bastani. 19-26 [doi]
- Evaluating Security Risks following a Compliance PerspectiveReinaldo de Barros Correia, Luci Pirmez, Luiz F. Rust da Costa Carmo. 27-36 [doi]
- On the Comparison of Network Attack Datasets: An Empirical AnalysisRobin Berthier, Dave Korman, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda. 39-48 [doi]
- On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical AnalysisDanielle Chrun, Michel Cukier, Gerry Sneeringer. 49-58 [doi]
- The Deployment of a Darknet on an Organization-Wide Network: An Empirical AnalysisRobin Berthier, Michel Cukier. 59-68 [doi]
- A Scalable Checkpoint Encoding Algorithm for Diskless CheckpointingZizhong Chen, Jack Dongarra. 71-79 [doi]
- HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across NetworksQin Li, Jinpeng Huai, Jianxin Li, Tianyu Wo, Minxiong Wen. 80-88 [doi]
- Towards Secure Trust Bootstrapping in Pervasive Computing EnvironmentSheikh Iqbal Ahamed, Md. Endadul Hoque, Farzana Rahman, Mohammad Zulkernine. 89-96 [doi]
- Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) DiscriminationDebmalya Biswas, Thomas Gazagnaire, Blaise Genest. 97-106 [doi]
- A Low Energy Soft Error-Tolerant Register File Architecture for Embedded ProcessorsMahdi Fazeli, S. N. Ahmadian, Seyed Ghassem Miremadi. 109-116 [doi]
- Randomization Based Probabilistic Approach to Detect Trojan CircuitsSusmit Jha, Sumit Kumar Jha. 117-124 [doi]
- On the Integrity of Lightweight CheckpointsRaul Barbosa, Johan Karlsson. 125-134 [doi]
- A Fast Performance Analysis Tool for Multicore, Multithreaded Communication ProcessorsHun Jung, Miao Ju, Hao Che, Zhijun Wang. 135-144 [doi]
- Random Relaxation Abstractions for Bounded Reachability Analysis of Linear Hybrid Automata: Distributed Randomized Abstractions in Model CheckingSumit Kumar Jha, Susmit Jha. 147-153 [doi]
- Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical SystemsJonas Elmqvist, Simin Nadjm-Tehrani. 154-164 [doi]
- A Few Remarks about Formal Development of Secure SystemsÉric Jaeger, Thérèse Hardin. 165-174 [doi]
- Verification of Exception Control Flows and Handlers Based on Architectural ScenariosPatrick Henrique da S. Brito, Rogério de Lemos, Cecília M. F. Rubira. 177-186 [doi]
- Localizing Program Errors via Slicing and ReasoningFei Pu, Yan Zhang. 187-196 [doi]
- A Timed Extension of Property Sequence ChartPengcheng Zhang, Bixin Li, Mingjie Sun. 197-206 [doi]
- An Interaction-Based Test Sequence Generation Approach for Testing Web ApplicationsWenhua Wang, Sreedevi Sampath, Yu Lei, Raghu Kacker. 209-218 [doi]
- Automated Generation of Test Cases from Contract-Oriented Specifications: A CSP-Based ApproachHakim Belhaouari, Frédéric Peschanski. 219-228 [doi]
- Mutation-Based Testing of Format String BugsHossain Shahriar, Mohammad Zulkernine. 229-238 [doi]
- Formally Sound Refinement of Spi Calculus Protocol Specifications into Java CodeAlfredo Pironti, Riccardo Sisto. 241-250 [doi]
- A Multi-Periodic Synchronous Data-Flow LanguageJulien Forget, Frédéric Boniol, David Lesens, Claire Pagetti. 251-260 [doi]
- Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal SpecificationsKohei Sakurai, Péter Bokor, Neeraj Suri. 261-270 [doi]
- At What Level of Granularity Should We be Componentizing for Software Reliability?Atef Mohamed, Mohammad Zulkernine. 273-282 [doi]
- A Comparative Study into Architecture-Based Safety Evaluation Methodologies Using AADL s Error Annex and Failure Propagation ModelsLars Grunske, Jun Han. 283-292 [doi]
- Software Quality Improvement via Pattern-Based Model RefactoringDae-Kyoo Kim. 293-302 [doi]
- A Novel Model for Component-Based Software Reliability AnalysisFan Zhang, Xingshe Zhou, Junwen Chen, Yunwei Dong. 303-309 [doi]
- Automotive Safety Case A Qualitative Case Study of Drivers, Usages, and IssuesFredrik Törner, Peter Öhman. 313-322 [doi]
- Detection and Diagnosis of Recurrent Faults in Software Systems by Invariant AnalysisMiao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward. 323-332 [doi]
- Automated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning TechniquesJicheng Fu, Farokh B. Bastani, I-Ling Yen. 333-342 [doi]
- Layered Memory Architecture for High IO Intensive Information Services to Achieve TimelinessHironao Takahashi, Hafiz Farooq Ahmad, Kinji Mori. 343-349 [doi]
- Securing Sensor Nodes Against Side Channel AttacksKanthakumar Pongaliur, Zubin Abraham, Alex X. Liu, Li Xiao, Leo Kempel. 353-361 [doi]
- Power Optimization in Fault-Tolerant Mobile Ad Hoc NetworksOliviero Riganelli, Radu Grosu, Samir R. Das, C. R. Ramakrishnan, Scott A. Smolka. 362-370 [doi]
- A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL SystemKun Bai, Peng Liu. 373-382 [doi]
- Secure, Highly Available, and High Performance Peer-to-Peer Storage SystemsYunqi Ye, I-Ling Yen, Liangliang Xiao, Bhavani M. Thuraisingham. 383-391 [doi]
- Privacy, Preservation and Performance: The 3 P s of Distributed Data ManagementBobji Mungamuru, Hector Garcia-Molina. 392-401 [doi]
- A Novel Ripple-Based Context-Cognizant Service Discovery Method in Autonomous Decentralized Community SystemKhalid Mahmood, Satoshi Niki, Xiaodong Lu, Kinji Mori. 405-413 [doi]
- Architecture Centric System Design for Supporting Reconfiguration of Service Oriented SystemsWang Chu, Depei Qian. 414-423 [doi]
- A Self-Managing Brokerage Model for Quality Assurance in Service-Oriented SystemsDaniel Robinson, Gerald Kotonya. 424-433 [doi]
- Formalize UML 2 Sequence DiagramsHui Shen, Aliya Virani, Jianwei Niu. 437-440 [doi]
- Towards the Service Composition Through BusesQin Li, Huibiao Zhu, Jifeng He. 441-444 [doi]
- Designing, Modelling and Verifying a Container Terminal System Using UPPAALQuan Zu, Miaomiao Zhang, Jing Liu, Qingfeng Du. 445-448 [doi]
- A Grammar-Based Reverse Engineering Framework for Behavior VerificationChunying Zhao, Kang Zhang. 449-452 [doi]
- Checking Inconsistency of Rule Sets in Active Real-Time DatabasesJian Zhang. 453-456 [doi]
- An Integrated Model to Analyze Cryptographic Protocols with Colored Petri NetsJin Wei, Guiping Su, Meng Xu. 457-460 [doi]
- Reliability Design for Large Scale Storage SystemsKai Du, Huaimin Wang, Shuqiang Yang, Yingwen Chen, Yan Wen. 463-466 [doi]
- A New Fault-Tolerant Wormhole Routing Scheme in Tori with Convex FaultsLingfu Xie, Du Xu, Qing Yao, Lei Song. 467-470 [doi]
- Using Multi-Level Security Annotations to Improve Software AssuranceEryk Kylikowski, Riccardo Scandariato, Wouter Joosen. 471-474 [doi]
- DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password SecurityHua Wang, Yao Guo, Xiangqun Chen. 475-478 [doi]
- Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission ValueRobert K. Abercrombie, Frederick T. Sheldon, Ali Mili. 479-482 [doi]
- Methodology for Service-Oriented Management of Security Assurance in Communication InfrastructuresAlbin Zuccato, Samuel Dubus, Evren Bulut. 483-486 [doi]
- Jasmine: A Tool for Model-Driven Runtime Verification with UML Behavioral ModelsZhou Zhou, Linzhang Wang, Zhanqi Cui, Xin Chen, Jianhua Zhao. 487-490 [doi]