Abstract is missing.
- Benchmarking Untrustworthiness in DBMS ConfigurationsAfonso Araújo Neto, Marco Vieira. 1-8 [doi]
- A Weight-Based Symptom Correlation Approach to SQL Injection AttacksMassimo Ficco, Luigi Coppolino, Luigi Romano. 9-16 [doi]
- Detecting SQL Injection Vulnerabilities in Web ServicesNuno Antunes, Marco Vieira. 17-24 [doi]
- Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer GridsAna Cristina Oliveira, Lívia M. R. Sampaio, Stenio Flavio Fernandes, Francisco Vilar Brasileiro. 25-32 [doi]
- Probabilistic Estimation of Network Size and DiameterJorge C. S. Cardoso, Carlos Baquero, Paulo Sérgio Almeida. 33-40 [doi]
- A Timer-Free Fault Tolerant K-Mutual Exclusion AlgorithmMathieu Bouillaguet, Luciana Arantes, Luciana Sens. 41-48 [doi]
- Using Dependability, Performance, Area and Energy Consumption Experimental Measures to Benchmark IP CoresDavid de Andrés, Juan Carlos Ruiz, Pedro J. Gil. 49-56 [doi]
- Appraisals Based on Security Best Practices for Software ConfigurationsAfonso Araújo Neto, Marco Vieira. 57-64 [doi]
- BitTorrent Needs Psychiatric Guarantees: Quantifying How Vulnerable BitTorrent Swarms are to Sybil AttacksFelipe Pontes, Francisco Vilar Brasileiro, Nazareno Andrade. 65-72 [doi]
- Implementing Retry - Featuring AOPBruno Cabral, Paulo Marques. 73-80 [doi]
- Structuring Specifications with ModesAlexei Iliasov, Alexander Romanovsky, Fernando Luís Dotti. 81-88 [doi]
- Mapping Web-Based Applications Failures to FaultsRegina Lúcia de Oliveira Moraes, Bruno Teixeira de Abreu, Eliane Martins. 89-94 [doi]
- Comparative Analysis on the Impact of Defensive Programming Techniques for Safety-Critical SystemsAlex Ander Javarotti Zumalde, Jorge Martins Secall, João Battista Camargo Junior. 95-102 [doi]
- Architectural-Based Validation of Fault-Tolerant SoftwarePatrick H. S. Brito, Rogério de Lemos, Eliane Martins, Regina Lúcia de Oliveira Moraes, Cecília M. F. Rubira. 103-110 [doi]
- A Low-Cost On-Line Monitoring Mechanism for the FlexRay Communication ProtocolYasser Sedaghat, Seyed Ghassem Miremadi. 111-118 [doi]
- Dealing with Driver Failures in the Storage StackJorrit N. Herder, David Moolenbroek, Raja Appuswamy, Bingzheng Wu, Ben Gras, Andrew S. Tanenbaum. 119-126 [doi]
- A Proof-Carrying-Code Infrastructure for ResourcesHans-Wolfgang Loidl, Kenneth Mackenzie, Steffen Jost, Lennart Beringer. 127-134 [doi]
- From Object Replication to Database ReplicationFernnando Pedone, Rui Oliveira. 135 [doi]
- Experimental Methods for Computer Science ResearchRoy A. Maxion. 136 [doi]
- Dependability in the Time of ForensicsRoy A. Maxion. 137 [doi]
- Empirical Data-Driven Modeling for Dependability EnhancementMiroslaw Malek. 138 [doi]