Abstract is missing.
- Avoiding common security flaws in composed service-oriented systemsMichael Atighetchi, Partha Pratim Pal, Joseph P. Loyall, Asher Sinclair. 1-6 [doi]
- On limitations of using cloud storage for data replicationChristian Cachin, Birgit Junker, Alessandro Sorniotti. 1-6 [doi]
- People-oriented cyber securityGreg Frazier. 1 [doi]
- Evidence of log integrity in policy-based security monitoringMirko Montanari, Jun Ho Huh, Derek Dagit, Rakesh Bobba, Roy H. Campbell. 1-6 [doi]
- ROSE: : FTTransform - A source-to-source translation framework for exascale fault-tolerance researchJacob Lidman, Daniel J. Quinlan, Chunhua Liao, Sally A. McKee. 1-6 [doi]
- TinyChecker: Transparent protection of VMs against hypervisor failures with nested virtualizationCheng Tan, Yubin Xia, Haibo Chen, Binyu Zang. 1-6 [doi]
- TRONE: Trustworthy and Resilient Operations in a Network EnvironmentAntonio Casimiro, Paulo Veríssimo, Diego Kreutz, Filipe Araujo, Raul Barbosa, Samuel Neves, Bruno Sousa, Marilia Curado, Carlos Silva, Rajeev Gandhi, Priya Narasimhan. 1-6 [doi]
- A model for security analysis of smart metersFarid Molazem Tabrizi, Karthik Pattabiraman. 1-6 [doi]
- Towards incorporating human intelligence into online security solutionsSaman A. Zonouz, Robin Berthier, Negin Arhami. 1-2 [doi]
- Improving resilience of SOA services along space-time dimensionsQuyen L. Nguyen, Arun Sood. 1-6 [doi]
- Design and implementation of a hardware checkpoint/restart coreAshwin A. Mendon, Ron Sass, Zachary K. Baker, Justin L. Tripp. 1-6 [doi]
- A programming model for resilience in extreme scale computingSaurabh Hukerikar, Pedro C. Diniz, Robert F. Lucas. 1-6 [doi]
- On the complexity of scheduling checkpoints for computational workflowsYves Robert, Frédéric Vivien, Dounia Zaidouni. 1-6 [doi]
- Does partial replication pay off?Jon Stearley, Kurt B. Ferreira, David J. Robinson, Jim Laros, Kevin T. Pedretti, Dorian Arnold, Patrick G. Bridges, Rolf Riesen. 1-6 [doi]
- Osprey: Operating system for predictable cloudsJan Sacha, Jeff Napper, Sape J. Mullender, Jim McKie. 1-6 [doi]
- A rigorous approach to the design of resilient cyber-physical systems through co-simulationJohn S. Fitzgerald, Ken Pierce, Carl Gamble. 1-6 [doi]
- MILS-related information flow control in the avionic domain: A view on security-enhancing software architecturesKevin Muller, Michael Paulitsch, Sergey Tverdyshev, Holger Blasum. 1-6 [doi]
- Asynchronous checkpoint migration with MRNet in the Scalable Checkpoint / Restart LibraryKathryn Mohror, Adam Moody, Bronis R. de Supinski. 1-6 [doi]
- An independent verification of errors and vulnerabilities in SaaS cloudRajeshwari Ganesan, Santonu Sarkar, Naveen Tewari. 1-6 [doi]
- Smart checklists for human-intensive medical systemsGeorge S. Avrunin, Lori A. Clarke, Leon J. Osterweil, Julian M. Goldman, Tracy Rausch. 1-6 [doi]
- Toward a high availability cloud: Techniques and challengesCuong Pham, Phuong Cao, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 1-6 [doi]
- Defending against VM rollback attackYubin Xia, Yutao Liu, Haibo Chen, Binyu Zang. 1-5 [doi]
- The TClouds architecture: Open and resilient cloud-of-clouds computingPaulo Veríssimo, Alysson Neves Bessani, Marcelo Pasin. 1-6 [doi]
- Towards resiliency in embedded medical monitoring devicesHoma Alemzadeh, Catello Di Martino, Zhanpeng Jin, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 1-6 [doi]
- Invited talk: A model and simulation for user-centric automation devices and systemsJane W.-S. Liu. 1 [doi]
- Invited talk: Challenges in Medical Cyber-Physical SystemsInsup Lee. 1 [doi]
- An evaluation of difference and threshold techniques for efficient checkpointsSean Hogan, Jeff R. Hammond, Andrew A. Chien. 1-6 [doi]
- Energy considerations in checkpointing and fault tolerance protocolsMohammed el Mehdi Diouri, Olivier Glück, Laurent Lefèvre, Franck Cappello. 1-6 [doi]
- Dependability as a cloud service - a modular approachJan S. Rellermeyer, Saurabh Bagchi. 1-6 [doi]
- Models for dependability and sustainability analysis of data center cooling architecturesGustavo Rau de Almeida Callou, Paulo Romero Martins Maciel, Dietmar Tutsch, Julian Araujo. 1-6 [doi]
- Invited talk: Virtual coaches in health careDaniel P. Siewiorek. 1 [doi]
- Chaotic-identity maps for robustness estimation of exascale computationsNageswara S. V. Rao. 1-6 [doi]
- A scalable double in-memory checkpoint and restart scheme towards exascaleGengbin Zheng, Xiang Ni, Laxmikant V. Kalé. 1-6 [doi]
- A study of fault-tolerance characteristics of data center networksYang Liu, Dong Lin, Jogesh K. Muppala, Mounir Hamdi. 1-6 [doi]
- A security analysis of Amazon's Elastic Compute Cloud serviceEngin Kirda. 1 [doi]
- Utilizing linear subspaces to improve cloud securityDavid Zage, James Obert. 1-6 [doi]
- A message-logging protocol for multicore systemsEsteban Meneses, Xiang Ni, Laxmikant V. Kalé. 1-6 [doi]
- Physical attack protection with human-secure virtualization in data centersJakub Szefer, Pramod A. Jamkhedkar, Yu-Yuan Chen, Ruby B. Lee. 1-6 [doi]