No abstract available.
Preface
A Dependable Threshold Broadcast Encryption System for Key Distribution in Mobile Ad Hoc Network
The focus of this paper is to design a dependable ID-based threshold broadcast encryption (TBE) scheme, by which a center can distribute keys over a network, so that a privileged subset of users can collaborate to jointly compute a specific key. Then a ...
Current and Emerging Security, Trust, Dependability and Privacy Challenges in Mobile Telecommunications
We discuss the near-term and far-term security, trust and dependability challenges in wireless and mobile telecommunications, in an always-connected environment. We identify some relevant technological and threat trends and propose research priorities ...
The Design and Analysis of IN Disaster Tolerant System Based on Birth-Death Process
Key technologies of Disaster Tolerant Intelligent Network are briefly introduced at first. After the hot-standby Disaster Tolerant IN architecture is analyzed, a load-sharing mode is proposed which has no downtime during switchover. By constructing the ...
TMAC: Taint-Based Memory Protection via Access Control
Memory corruption attacks account for most parts of malicious attacks toward software security. Recently dynamic taint analysis is proposed and is gaining momentum. This proposed technique attempts to defeat attacks by checking the taintedness and ...
An Algorithm Based Fault Tolerant Scheme for Elliptic Curve Public-Key Cryptography
In this paper, an algorithm based fault tolerant (ABFT) scheme for Elliptic Curve Cryptography (ECC) public-key cipher is presented. By adding 2n+1 check sums, the proposed scheme is able to detect and correct up to three errors which may occur during ...
A Secure and Survivable Architecture for SCADA Systems
Industrial Systems are nowadays exposed to new kinds of malicious threats. The cause of this is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Networking Technologies for the ...
Quantitative Assessment for Organisational Security & Dependability
There are numerous metrics proposed to assess security and dependability of technical systems (e.g., number of defects per thousand lines of code). Unfortunately, most of these metrics are too low-level, and lack on capturing high-level system ...
Planning Dependability of Virtualised Networks
Virtualisation technologies widely affect best practice for dependability of services and networks, and suggest novel approaches for dependable configurations. Starting from an existing tool, that computes dependable configurations for traditional ...
AFPL2, an Abstract Language for Firewall ACLs with NAT Support
The design and management of firewall ACLs is a very hard and error-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-level language with a different functionality, syntax, and development environment. ...
Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT)
The number of malware attacks is increasing, Companies have invested millions of dollars in intrusion detection and intrusion prevention (ID/IP) technologies and products, yet many web servers are hacked every year. The current reactive methods of ...
Towards a Policy-Driven Framework for Managing Service Dependability
- Jorge Bernal Bernabe,
- Juan M. Marín Perez,
- Daniel J. Martínez Manzano,
- Manuel Gil Perez,
- Antonio F. Gómez Skarmeta
Many critical activities rely on the correct and uninterrupted operation of networked Computer Information Systems (CIS). Such systems are however exposed to many different kinds of risk, and thus many researches have been taking place for enabling them ...
An Appraisal to Assess the Security of Database Configurations
Database Management Systems (DBMS) have a long tradition in high security and several mechanisms needed to protect data have been proposed/consolidated in the database arena. However, the effectiveness of those mechanisms is very dependent on the actual ...
Formalizing Safety Requirements Using Controlling Automata
Safety is an important element of dependability. It is defined as the absence of accidents. Most accidents involving software-intensive systems have been system accidents, which are caused by unsafe inter-system or inter-component interactions. To ...
Lock-Free Synchronization of Data Flow between Time-Triggered and Event-Triggered Activities in a Dependable Real-Time System
Time-triggered execution of periodic tasks provides the cornerstone of dependable real-time systems. In addition, there is often a need for executing event-triggered activities while the system would be otherwise idle. If time-triggered and event-...
An Investigation of Fault Tolerance Behavior of 32-Bit DLX Processor
This paper presents a study of fault tolerance behavior of a 32-bit DLX processor. Simulation-based method has been applied to analyze the fault tolerance characteristic of this processor. This experiment is based on injection of 14000 faults among 70 ...
Gaining Assurance in a Voter-Verifiable Voting System
The literature on e-voting systems has many examples of discussion of the correctness of the computer and communication algorithms of such systems, as well as discussions of their vulnerabilities. However, a gap in the literature concerns the practical ...
A Logging Approach for Effective Dependability Evaluation of Complex Systems
The dependability evaluation and management of complex systems is often based on the collection of field data from event logs. Nevertheless, key decisions about log production and management are usually left to the late stages of development, leading to ...
Development of Applications Based on Security Patterns
- Daniel Serrano,
- José F. Ruiz,
- Antonio Munoz,
- Antonio Mana,
- Alvaro Armenteros,
- Beatriz Gallego-Nicaso Crespo
Current approaches for software development fail in the integration of security aspects. Usually, this is because of the software complexity and the specific expertise needed for the integration of modern security solutions. In this paper we present the ...
Hands on Dependability Economics
Contemporary societies (from individuals to organizations) depend on services delivered by systems to achieve individual goals, meaning that a system must have engineered and guaranteed dependability, regardless of continuous, rapid and unpredictable ...
Extending Test-Driven Development for Robust Web Services
Research and practice show that a large number of web services are deployed with robustness problems (i.e., presenting unexpected behaviors in the presence of invalid inputs). Test-driven development, particularly suitable for web service environments, ...
Dynamically Configurable Membership Support for Dependable Applications in Mobile Ad Hoc Networks
Mobile Ad hoc networks (MANETs) are characterised by the absence of a centralised infrastructure and are formed by heterogeneus mobile nodes. Power consumption and bandwidth are basic limitations for these systems. Dependability solutions and their ...
Almost Triggerless Writeset Extraction in Multiversioned Databases
Efficient writeset extraction and application is crucial in modern database replication protocols since they execute all transaction operations in a delegate replica, collecting and propagating the updates to all replicas when transactions request ...
Diagnosis Service for Software Component and Its Application to a Heterogeneous Sensor Data Management System
Component-based software development paradigm enables the construction of complex applications by assembling existing self-contained components. The cost of the software development process can then be sharply reduced. Current software systems are ...
Decision Support Console for System Administration Based on an Expert System Approach
- Francisco José de la Torre,
- Laura García Munoz,
- Roberto González Barahona,
- Maite Avelino Carmona,
- Manuel Gil Perez
What we propose is a decision support system to improve the dependability of highly interconnected Communications and Information Systems (CIS) that consists of the following. First, a framework to use expert knowledge based on a Rete algorithm to use ...
Managing the Impact of On-chip Temperature on the Lifetime Reliability of Reliably Overclocked Systems
Physical and environmental variations require the addition of safety margins to the clock frequency of digital systems, making it overly conservative. Aggressive, but reliable, dynamic clock frequency tuning mechanisms that achieve higher system ...