| 2006 | A CRT-RSA Algorithm Secure against Hardware Fault Attacks. Sining Liu, Brian King, Wei Wang |
| 2006 | A Dynamic Countermeasure Method for Large-Scale Network Attacks. Zhaoyu Liu, Roopesh Uppala |
| 2006 | A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation. Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog |
| 2006 | A Model-Driven Architecture Approach for Modeling, Specifying and Deploying Policies in Autonomous and Autonomic Systems. Joaquín Peña, Michael G. Hinchey, Roy Sterritt, Antonio Ruiz Cortés, Manuel Resinas |
| 2006 | A Parallel GNFS Integrated with the Block Wiedemann's Algorithm for Integer Factorization. Na Guo, Laurence Tianruo Yang, Man Lin, John P. Quinn |
| 2006 | A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System. Yuan-Shun Dai, Michael G. Hinchey, Manish Madhusoodan, James L. Rash, Xukai Zou |
| 2006 | A Reliable (k, n) Image Secret Sharing Scheme. Li Bai |
| 2006 | A Satisficing MOMIP Framework for Reliable Real-time Application Scheduling. Thanikesavan Sivanthi, Ulrich Killat |
| 2006 | A Security-Supportive Middleware Architecture for Pervasive Computing. Zhaoyu Liu, Dichao Peng |
| 2006 | A Self-Tuning Multicast Flow Control Scheme Based on Autonomic Technology. Naixue Xiong, Yanxiang He, Yan Yang, Laurence Tianruo Yang, Chao Peng |
| 2006 | A Solution to Single Point of Failure Using Voter Replication and Disagreement Detection. Ahmad Patooghy, Seyed Ghassem Miremadi, Abbas Javadtalab, Mahdi Fazeli, Navid Farazmand |
| 2006 | Aclamate: An AOSD Security Framework for Access Control. Andrew Prunicki, Tzilla Elrad |
| 2006 | Adaptable and Autonomic Mission Manager for Dependable Aerospace Computing. Ian A. Troxel, Alan D. George |
| 2006 | An Algorithm for Privacy-Preserving Quantitative Association Rules Mining. Weiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao |
| 2006 | Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Governatori |
| 2006 | Architecture of Trustworthy Networks. Xuehai Peng, Chuang Lin |
| 2006 | Assessing Vulnerabilities in Apache and IIS HTTP Servers. Sung-Whan Woo, Omar Hussain Alhazmi, Yashwant K. Malaiya |
| 2006 | Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny Wong |
| 2006 | Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons. Yuan-Shun Dai, Michael G. Hinchey, Mingrui Qi, Xukai Zou |
| 2006 | Autonomic Sensor Networks: A New Paradigm for Collaborative Information Processing. Hui Kang, Xiaolin Li, Patrick J. Moran |
| 2006 | Autonomous Decentralized Load Tracking Techniques and Evaluation. Tetsuya Masuishi, Koichi Shibata, Yasuyuki Oki, Kinji Mori |
| 2006 | Composing Access Control Policies of Distributed Components. Omkar J. Tilak, Rajeev R. Raje, Xukai Zou |
| 2006 | DRBTS: Distributed Reputation-based Beacon Trust System. Avinash Srinivasan, Joshua Teitelbaum, Jie Wu |
| 2006 | Estimating Markov Modulated Software Reliability Models via EM Algorithm. Takao Ando, Hiroyuki Okamura, Tadashi Dohi |
| 2006 | Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. Ruiping Ma, Liudong Xing, Howard E. Michel |
| 2006 | Infrastructure Communication Reliability of Wireless Sensor Networks. Akhilesh Shrestha, Liudong Xing, Hong Liu |
| 2006 | Intelligent Autonomic Strategy to Attacks in Network Infrastructure Protection: Feedback Methods to IDS, Using Policies, Alert Filters and Firewall Packet Filters for Multiple Protocols. Emmanuel Hooper |
| 2006 | Measuring Quantitative Dependability Attributes in Digital Publishing Using Petri Net Workflow Modeling. Gustavo A. Chaparro-Baquero, Nayda G. Santiago, Wilson Rivera, J. Fernando Vega-Riveros |
| 2006 | Message from the General Co-Chairs. |
| 2006 | Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. Anil Bazaz, James D. Arthur, Joseph G. Tront |
| 2006 | On Recognizing Virtual Honeypots and Countermeasures. Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham |
| 2006 | Optimal Checkpoint Placement with Equality Constraints. Tadashi Dohi, Tatsuya Ozaki, Naoto Kaio |
| 2006 | Organizing Committees. |
| 2006 | PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network. Junda Liu, Lin Ning, Yibo Xue, Dongsheng Wang |
| 2006 | Performance Evaluation of Adjusted Probabilistic Broadcasting in MANETs. M. Masadeh Bani Yassein, Mohamed Ould-Khaoua, Lewis M. Mackenzie, Stylianos Papanastasiou |
| 2006 | Referees. |
| 2006 | Runtime Security Verification for Itinerary-Driven Mobile Agents. Zijiang Yang, Shiyong Lu, Ping Yang |
| 2006 | Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA |
| 2006 | Self-Adaptive Pervasive Computing Application Based on Code Mobility. Songqiao Han, Shensheng Zhang, Yong Zhang |
| 2006 | Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services. Philip K. McKinley, Farshad A. Samimi, Jonathan K. Shapiro, Chiping Tang |
| 2006 | SmartC: A Component-Based Hierarchical Modeling Language for Automotive Electronics. Guoqing Yang, Hong Li, Zhaohui Wu |
| 2006 | Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. Jong Youl Choi, Philippe Golle, Markus Jakobsson |
| 2006 | Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based Datacenters. Qinghui Tang, Sandeep K. S. Gupta, Daniel Stanzione, Phil Cayton |
| 2006 | Towards Reliable Rating Filtering in Grid Reputation Systems: A Pre-Evaluating Set Based Bias-Tuned Approach1. Xuejun Yang, Xiangli Qu, Chunmei Gui |
| 2006 | Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. T. Paul Parker, Shouhuai Xu |
| 2006 | Trusted Mobile Interaction via Extended Digital Certificates. Will Tao, Robert Steele |