HASE 2008:
Nanjing,
China
11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008.
IEEE Computer Society 2008 BibTeX
Keynotes
System Security
Network Security
Distributed Systems
- Zizhong Chen, Jack Dongarra:
A Scalable Checkpoint Encoding Algorithm for Diskless Checkpointing.
71-79
Electronic Edition (link) BibTeX
- Qin Li, Jinpeng Huai, Jianxin Li, Tianyu Wo, Minxiong Wen:
HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks.
80-88
Electronic Edition (link) BibTeX
- Sheikh Iqbal Ahamed, Md. Endadul Hoque, Farzana Rahman, Mohammad Zulkernine:
Towards Secure Trust Bootstrapping in Pervasive Computing Environment.
89-96
Electronic Edition (link) BibTeX
- Debmalya Biswas, Thomas Gazagnaire, Blaise Genest:
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination.
97-106
Electronic Edition (link) BibTeX
Embedded Systems
Formal verification,
specification and implementation I
Formal verification,
specification and implementation II
Testing
Formal verification,
specification and implementation III
Quality,
Reliability,
and Safety
High assurance systems and programs
- Fredrik Törner, Peter Öhman:
Automotive Safety Case A Qualitative Case Study of Drivers, Usages, and Issues.
313-322
Electronic Edition (link) BibTeX
- Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward:
Detection and Diagnosis of Recurrent Faults in Software Systems by Invariant Analysis.
323-332
Electronic Edition (link) BibTeX
- Jicheng Fu, Farokh B. Bastani, I-Ling Yen:
Automated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning Techniques.
333-342
Electronic Edition (link) BibTeX
- Hironao Takahashi, Hafiz Farooq Ahmad, Kinji Mori:
Layered Memory Architecture for High IO Intensive Information Services to Achieve Timeliness.
343-349
Electronic Edition (link) BibTeX
Ad hoc network
Data management systems
Service-oriented Computing
Short papers I
- Hui Shen, Aliya Virani, Jianwei Niu:
Formalize UML 2 Sequence Diagrams.
437-440
Electronic Edition (link) BibTeX
- Qin Li, Huibiao Zhu, Jifeng He:
Towards the Service Composition Through Buses.
441-444
Electronic Edition (link) BibTeX
- Quan Zu, Miaomiao Zhang, Jing Liu, Qingfeng Du:
Designing, Modelling and Verifying a Container Terminal System Using UPPAAL.
445-448
Electronic Edition (link) BibTeX
- Chunying Zhao, Kang Zhang:
A Grammar-Based Reverse Engineering Framework for Behavior Verification.
449-452
Electronic Edition (link) BibTeX
- Jian Zhang:
Checking Inconsistency of Rule Sets in Active Real-Time Databases.
453-456
Electronic Edition (link) BibTeX
- Jin Wei, Guiping Su, Meng Xu:
An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets.
457-460
Electronic Edition (link) BibTeX
Short papers II
- Kai Du, Huaimin Wang, Shuqiang Yang, Yingwen Chen, Yan Wen:
Reliability Design for Large Scale Storage Systems.
463-466
Electronic Edition (link) BibTeX
- Lingfu Xie, Du Xu, Qing Yao, Lei Song:
A New Fault-Tolerant Wormhole Routing Scheme in Tori with Convex Faults.
467-470
Electronic Edition (link) BibTeX
- Eryk Kylikowski, Riccardo Scandariato, Wouter Joosen:
Using Multi-Level Security Annotations to Improve Software Assurance.
471-474
Electronic Edition (link) BibTeX
- Hua Wang, Yao Guo, Xiangqun Chen:
DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security.
475-478
Electronic Edition (link) BibTeX
- Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value.
479-482
Electronic Edition (link) BibTeX
- Albin Zuccato, Samuel Dubus, Evren Bulut:
Methodology for Service-Oriented Management of Security Assurance in Communication Infrastructures.
483-486
Electronic Edition (link) BibTeX
- Zhou Zhou, Linzhang Wang, Zhanqi Cui, Xin Chen, Jianhua Zhao:
Jasmine: A Tool for Model-Driven Runtime Verification with UML Behavioral Models.
487-490
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:14:16 2009
by Michael Ley (ley@uni-trier.de)