2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX最新文献

筛选
英文 中文
Automatic Temporal Evaluation of the Accessibility of the World Wide Web and Its Standards Conformance 万维网可及性及其标准一致性的自动时间评价
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.27
H. Dworak
{"title":"Automatic Temporal Evaluation of the Accessibility of the World Wide Web and Its Standards Conformance","authors":"H. Dworak","doi":"10.1109/DepCoS-RELCOMEX.2008.27","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.27","url":null,"abstract":"Whereas the appliance of the document object model yields extensible markup language documents with complete well-formedness, it does have the potential of outputting invalid code. We present current techniques for measuring the accessibility and standards conformance of Web sites. The techniques are then applied to perform a temporal analysis of a dynamically driven test case, which is in contrast to the hitherto tendency emphasising the Web standards conformance of static pages. We introduce an easy to use, cross-browser approach to validate the source code in the interim period between loading and unloading of a single Web page and show that it handles the test case in the correct manner.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114451860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protection System against Overload and Distributed Denial of Service Attacks 防止系统过载和分布式拒绝服务攻击
Ervin Tóth, Zoltán Hornák, G. Tóth
{"title":"Protection System against Overload and Distributed Denial of Service Attacks","authors":"Ervin Tóth, Zoltán Hornák, G. Tóth","doi":"10.1504/IJCCBS.2010.031711","DOIUrl":"https://doi.org/10.1504/IJCCBS.2010.031711","url":null,"abstract":"Detection of, and protection from overload and denial of service attacks is a common problem in information system servers. Such situation may be the result of simple overload, such as increased service request rate during peak hours, or a malicious distributed attack originating from many computers. This article describes a solution to this problem, focusing on protection mechanisms against both natural and malicious overload, based on analyzing the queue of requests - which, as described in this paper, is chosen to be unlimited. Furthermore, detection and protection scheme against blocking and crash-bug exploiting attacks is presented. The described algorithms were implemented within the dependability and security by enhanced reconfigurability (DESEREC) EU FP6 integrated project.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132282132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SeReCon: A Trusted Environment for SoPC Design SeReCon: SoPC设计的可信环境
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.56
Krzysztof Kepa, F. Morgan, Krzysztof Kosciuszkiewicz, T. Surmacz
{"title":"SeReCon: A Trusted Environment for SoPC Design","authors":"Krzysztof Kepa, F. Morgan, Krzysztof Kosciuszkiewicz, T. Surmacz","doi":"10.1109/DepCoS-RELCOMEX.2008.56","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.56","url":null,"abstract":"Problems of fraud, theft, impersonation and counterfeiting have migrated into computing and digital communication technology. Reconfigurable computing (RC) (e.g., FPGA) systems blur the boundary between hardware and software. As reconfigurable computing systems become more popular, concerns arise about their security and privacy. Run-time partial reconfiguration provides the flexibility of hardware, but at the same time may compromise security and integrity of the embedded system design. This paper discusses potential threats to such systems and describes SeReCon, a secure reconfiguration controller, as a countermeasure. SeReCon supports intellectual property protection within the FPGA and provides secure run-time management of designs within FPGA. The fundamentals of the SeReCon trusted computing base are described. Various IP Block processing scenarios are proposed. Early implementation results are reported.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116630887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Organization of AES Cryptographic Unit for Low Cost FPGA Implementation 基于低成本FPGA实现的AES加密单元组织
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.36
Lukasz Krukowski, J. Sugier
{"title":"Organization of AES Cryptographic Unit for Low Cost FPGA Implementation","authors":"Lukasz Krukowski, J. Sugier","doi":"10.1109/DepCoS-RELCOMEX.2008.36","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.36","url":null,"abstract":"This paper discusses different design options for realization of AES cryptographic algorithm in programmable logic devices and illustrates them with practical results of hardware implementation. The discussion begins with those aspects of the four basic cipher transformations that are essential for realization with resources available in FPGA devices, then moves to various possible organizations of the cipher unit and concludes with efficiency and size comparison of results obtained after implementation of the AES-128 version of the method in Spartan-3 devices from Xilinx. Instead of searching for a \"global optimum\" specific low-cost FPGA implementation, the paper summarizes main directions of design development that are viable today and evaluates them by a case study example.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123614946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Estimation of System Workload Time Characteristic Using UML Timing Diagrams 用UML时序图估计系统工作负载时间特性
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.58
Dariusz Dymek, L. Kotulski
{"title":"Estimation of System Workload Time Characteristic Using UML Timing Diagrams","authors":"Dariusz Dymek, L. Kotulski","doi":"10.1109/DepCoS-RELCOMEX.2008.58","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.58","url":null,"abstract":"Timing diagrams are one of the new types of diagrams introduced in UML ver. 2.0. They are the tool which allows us to characterize the behavior of system components with respect to time parameter. In this paper we propose a method of using Timing Diagrams to estimate the overloading of the boundary elements of the system in the earliest possible stage of system designing - based only on the Use Case diagrams and some additional information concerning the behavior of the user of the future system. Some methodology of gathering and evaluating of this information is also presented.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Language for Failure Patterns and Application in Safety Analysis 失效模式语言及其在安全分析中的应用
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.44
Ian Philip Wolforth, M. Walker, Y. Papadopoulos
{"title":"A Language for Failure Patterns and Application in Safety Analysis","authors":"Ian Philip Wolforth, M. Walker, Y. Papadopoulos","doi":"10.1109/DepCoS-RELCOMEX.2008.44","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.44","url":null,"abstract":"Components and families of components in mechatronic systems often exhibit failure characteristics that are independent of system context and repeatable across applications. In this paper, we show that it is possible to capture and reuse such patterns for the purposes of system safety analysis. We describe a language that enables expression of failure behaviour and describe a number of useful patterns in this language. The paper shows how careful reuse of failure patterns in conjunction with a tool that automates Fault Tree and Failure Modes and Effects Analysis can help to simplify complex safety assessments.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121329001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Availability of Discrete Transport System Simulated by SSF Tool 用SSF工具模拟离散运输系统的有效性
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.46
T. Walkowiak, J. Mazurkiewicz
{"title":"Availability of Discrete Transport System Simulated by SSF Tool","authors":"T. Walkowiak, J. Mazurkiewicz","doi":"10.1109/DepCoS-RELCOMEX.2008.46","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.46","url":null,"abstract":"A paper presents an approach to availability calculation of discrete transport system (DTS). The system is described by the formal model, which includes reliability and functional parameters of DTS. The availability and average availability of the system - defined in a functional way - is discussed as a function of different essential parameters when the DTS is organized. The proposed analysis is based on the modeling and simulating of the system behavior. Monte Carlo simulation is used to encourage reliability and stochastic functional parameters. The simulator is built using scalable simulation framework (SSF). No restriction on the system structure and on a kind of distribution is the main advantage of the method. The paper presents some exemplar system modeling and results.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122558016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Semi-Markov Availability Modeling of a Redundant System with Partial and Full Rejuvenation Actions 具有部分和完全恢复动作的冗余系统的半马尔可夫可用性建模
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.13
V. Koutras, A. Platis
{"title":"Semi-Markov Availability Modeling of a Redundant System with Partial and Full Rejuvenation Actions","authors":"V. Koutras, A. Platis","doi":"10.1109/DepCoS-RELCOMEX.2008.13","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.13","url":null,"abstract":"Software rejuvenation is a preventive maintenance technique to prevent failures in continuously running systems that experience software aging. In this paper, rejuvenation is modeled in a redundant computer system via a semi-Markov process in order to counteract software aging. The system can be switched into the standby unit automatically or manually in the case of a failure at the switching mechanism. Depending on the degradation of the system resources, the running node is either rejuvenated or continues serving and systempsilas steady-state availability is studied along with the optimal time to perform rejuvenation, which increases systempsilas availability. Moreover, an alternative rejuvenation modeling is introduced, in which two different actions; partial and full rejuvenation are performed according to the degradation level. The optimal rejuvenation policies for this case are also derived, leading the system to higher levels of availability.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131885576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Scalable Diversity-Oriented Decisions and Technologies for Dependable SoPC-Based Safety-Critical Computer Systems and Infrastructures 可靠的基于sopc的安全关键计算机系统和基础设施的可扩展多样性导向决策和技术
V. Kharchenko, V. Sklyar
{"title":"Scalable Diversity-Oriented Decisions and Technologies for Dependable SoPC-Based Safety-Critical Computer Systems and Infrastructures","authors":"V. Kharchenko, V. Sklyar","doi":"10.1504/IJCCBS.2010.031890","DOIUrl":"https://doi.org/10.1504/IJCCBS.2010.031890","url":null,"abstract":"An approach to development and implementation of multi-version technologies (MVT) for creating dependable system-on-programmable chip (SoPC)-based systems and infrastructures is described. It is based on a set of scalable diversity-oriented decisions selected by use of proposed MVT-graph. This technique is applied for development of nuclear power plants (NPP) instrumentation and control (I&C) platform. The diverse I&C platform RADIY designed, produced and supplied by company Radiy (Ukraine) is described and analyzed. Results of implementation of the suggested decisions and technologies in safety- critical dependable systems and infrastructures of Ukrainian NPPs are analyzed.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125258965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fuzzy strategies in modeling effects of technological implementations 技术实现效果建模中的模糊策略
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.28
H. Piech
{"title":"Fuzzy strategies in modeling effects of technological implementations","authors":"H. Piech","doi":"10.1109/DepCoS-RELCOMEX.2008.28","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.28","url":null,"abstract":"In our work we propose the method of steering the technological effects under assumption, that we be base on interval or fuzzy date data. Such character of data in use to technological model the von Neumann (or others) give us the possibility to compose permutation structures of technological parameters. It permits to formulate a vectors of control the technological process in larger range than in case of deterministic models (Brans and Mareshal,1994). On basis of created criteria functions we build the vector of intensity of growth economic effect, which permits to choose the optimal direction of investment (or modification) load.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114334475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信