DASC C

46 papers

YearTitle / Authors
2006A CRT-RSA Algorithm Secure against Hardware Fault Attacks.
Sining Liu, Brian King, Wei Wang
2006A Dynamic Countermeasure Method for Large-Scale Network Attacks.
Zhaoyu Liu, Roopesh Uppala
2006A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation.
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog
2006A Model-Driven Architecture Approach for Modeling, Specifying and Deploying Policies in Autonomous and Autonomic Systems.
Joaquín Peña, Michael G. Hinchey, Roy Sterritt, Antonio Ruiz Cortés, Manuel Resinas
2006A Parallel GNFS Integrated with the Block Wiedemann's Algorithm for Integer Factorization.
Na Guo, Laurence Tianruo Yang, Man Lin, John P. Quinn
2006A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System.
Yuan-Shun Dai, Michael G. Hinchey, Manish Madhusoodan, James L. Rash, Xukai Zou
2006A Reliable (k, n) Image Secret Sharing Scheme.
Li Bai
2006A Satisficing MOMIP Framework for Reliable Real-time Application Scheduling.
Thanikesavan Sivanthi, Ulrich Killat
2006A Security-Supportive Middleware Architecture for Pervasive Computing.
Zhaoyu Liu, Dichao Peng
2006A Self-Tuning Multicast Flow Control Scheme Based on Autonomic Technology.
Naixue Xiong, Yanxiang He, Yan Yang, Laurence Tianruo Yang, Chao Peng
2006A Solution to Single Point of Failure Using Voter Replication and Disagreement Detection.
Ahmad Patooghy, Seyed Ghassem Miremadi, Abbas Javadtalab, Mahdi Fazeli, Navid Farazmand
2006Aclamate: An AOSD Security Framework for Access Control.
Andrew Prunicki, Tzilla Elrad
2006Adaptable and Autonomic Mission Manager for Dependable Aerospace Computing.
Ian A. Troxel, Alan D. George
2006An Algorithm for Privacy-Preserving Quantitative Association Rules Mining.
Weiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao
2006Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems.
Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Governatori
2006Architecture of Trustworthy Networks.
Xuehai Peng, Chuang Lin
2006Assessing Vulnerabilities in Apache and IIS HTTP Servers.
Sung-Whan Woo, Omar Hussain Alhazmi, Yashwant K. Malaiya
2006Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring.
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny Wong
2006Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons.
Yuan-Shun Dai, Michael G. Hinchey, Mingrui Qi, Xukai Zou
2006Autonomic Sensor Networks: A New Paradigm for Collaborative Information Processing.
Hui Kang, Xiaolin Li, Patrick J. Moran
2006Autonomous Decentralized Load Tracking Techniques and Evaluation.
Tetsuya Masuishi, Koichi Shibata, Yasuyuki Oki, Kinji Mori
2006Composing Access Control Policies of Distributed Components.
Omkar J. Tilak, Rajeev R. Raje, Xukai Zou
2006DRBTS: Distributed Reputation-based Beacon Trust System.
Avinash Srinivasan, Joshua Teitelbaum, Jie Wu
2006Estimating Markov Modulated Software Reliability Models via EM Algorithm.
Takao Ando, Hiroyuki Okamura, Tadashi Dohi
2006Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks.
Ruiping Ma, Liudong Xing, Howard E. Michel
2006Infrastructure Communication Reliability of Wireless Sensor Networks.
Akhilesh Shrestha, Liudong Xing, Hong Liu
2006Intelligent Autonomic Strategy to Attacks in Network Infrastructure Protection: Feedback Methods to IDS, Using Policies, Alert Filters and Firewall Packet Filters for Multiple Protocols.
Emmanuel Hooper
2006Measuring Quantitative Dependability Attributes in Digital Publishing Using Petri Net Workflow Modeling.
Gustavo A. Chaparro-Baquero, Nayda G. Santiago, Wilson Rivera, J. Fernando Vega-Riveros
2006Message from the General Co-Chairs.
2006Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective.
Anil Bazaz, James D. Arthur, Joseph G. Tront
2006On Recognizing Virtual Honeypots and Countermeasures.
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham
2006Optimal Checkpoint Placement with Equality Constraints.
Tadashi Dohi, Tatsuya Ozaki, Naoto Kaio
2006Organizing Committees.
2006PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network.
Junda Liu, Lin Ning, Yibo Xue, Dongsheng Wang
2006Performance Evaluation of Adjusted Probabilistic Broadcasting in MANETs.
M. Masadeh Bani Yassein, Mohamed Ould-Khaoua, Lewis M. Mackenzie, Stylianos Papanastasiou
2006Referees.
2006Runtime Security Verification for Itinerary-Driven Mobile Agents.
Zijiang Yang, Shiyong Lu, Ping Yang
2006Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA
2006Self-Adaptive Pervasive Computing Application Based on Code Mobility.
Songqiao Han, Shensheng Zhang, Yong Zhang
2006Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services.
Philip K. McKinley, Farshad A. Samimi, Jonathan K. Shapiro, Chiping Tang
2006SmartC: A Component-Based Hierarchical Modeling Language for Automotive Electronics.
Guoqing Yang, Hong Li, Zhaohui Wu
2006Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware.
Jong Youl Choi, Philippe Golle, Markus Jakobsson
2006Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based Datacenters.
Qinghui Tang, Sandeep K. S. Gupta, Daniel Stanzione, Phil Cayton
2006Towards Reliable Rating Filtering in Grid Reputation Systems: A Pre-Evaluating Set Based Bias-Tuned Approach1.
Xuejun Yang, Xiangli Qu, Chunmei Gui
2006Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks.
T. Paul Parker, Shouhuai Xu
2006Trusted Mobile Interaction via Extended Digital Certificates.
Will Tao, Robert Steele