HASE 2008:
Nanjing,
China
11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008.
IEEE Computer Society 2008
Keynotes
System Security
Network Security
Distributed Systems
- Zizhong Chen, Jack Dongarra:
A Scalable Checkpoint Encoding Algorithm for Diskless Checkpointing.
71-79
- Qin Li, Jinpeng Huai, Jianxin Li, Tianyu Wo, Minxiong Wen:
HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks.
80-88
- Sheikh Iqbal Ahamed, Md. Endadul Hoque, Farzana Rahman, Mohammad Zulkernine:
Towards Secure Trust Bootstrapping in Pervasive Computing Environment.
89-96
- Debmalya Biswas, Thomas Gazagnaire, Blaise Genest:
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination.
97-106
Embedded Systems
Formal verification,
specification and implementation I
Formal verification,
specification and implementation II
Testing
Formal verification,
specification and implementation III
Quality,
Reliability,
and Safety
High assurance systems and programs
- Fredrik Törner, Peter Öhman:
Automotive Safety Case A Qualitative Case Study of Drivers, Usages, and Issues.
313-322
- Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward:
Detection and Diagnosis of Recurrent Faults in Software Systems by Invariant Analysis.
323-332
- Jicheng Fu, Farokh B. Bastani, I-Ling Yen:
Automated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning Techniques.
333-342
- Hironao Takahashi, Hafiz Farooq Ahmad, Kinji Mori:
Layered Memory Architecture for High IO Intensive Information Services to Achieve Timeliness.
343-349
Ad hoc network
Data management systems
Service-oriented Computing
Short papers I
- Hui Shen, Aliya Virani, Jianwei Niu:
Formalize UML 2 Sequence Diagrams.
437-440
- Qin Li, Huibiao Zhu, Jifeng He:
Towards the Service Composition Through Buses.
441-444
- Quan Zu, Miaomiao Zhang, Jing Liu, Qingfeng Du:
Designing, Modelling and Verifying a Container Terminal System Using UPPAAL.
445-448
- Chunying Zhao, Kang Zhang:
A Grammar-Based Reverse Engineering Framework for Behavior Verification.
449-452
- Jian Zhang:
Checking Inconsistency of Rule Sets in Active Real-Time Databases.
453-456
- Jin Wei, Guiping Su, Meng Xu:
An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets.
457-460
Short papers II
- Kai Du, Huaimin Wang, Shuqiang Yang, Yingwen Chen, Yan Wen:
Reliability Design for Large Scale Storage Systems.
463-466
- Lingfu Xie, Du Xu, Qing Yao, Lei Song:
A New Fault-Tolerant Wormhole Routing Scheme in Tori with Convex Faults.
467-470
- Eryk Kylikowski, Riccardo Scandariato, Wouter Joosen:
Using Multi-Level Security Annotations to Improve Software Assurance.
471-474
- Hua Wang, Yao Guo, Xiangqun Chen:
DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security.
475-478
- Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value.
479-482
- Albin Zuccato, Samuel Dubus, Evren Bulut:
Methodology for Service-Oriented Management of Security Assurance in Communication Infrastructures.
483-486
- Zhou Zhou, Linzhang Wang, Zhanqi Cui, Xin Chen, Jianhua Zhao:
Jasmine: A Tool for Model-Driven Runtime Verification with UML Behavioral Models.
487-490
Copyright © Sun Mar 14 23:04:47 2010
by Michael Ley (ley@uni-trier.de)