{"title":"Automatic Temporal Evaluation of the Accessibility of the World Wide Web and Its Standards Conformance","authors":"H. Dworak","doi":"10.1109/DepCoS-RELCOMEX.2008.27","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.27","url":null,"abstract":"Whereas the appliance of the document object model yields extensible markup language documents with complete well-formedness, it does have the potential of outputting invalid code. We present current techniques for measuring the accessibility and standards conformance of Web sites. The techniques are then applied to perform a temporal analysis of a dynamically driven test case, which is in contrast to the hitherto tendency emphasising the Web standards conformance of static pages. We introduce an easy to use, cross-browser approach to validate the source code in the interim period between loading and unloading of a single Web page and show that it handles the test case in the correct manner.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114451860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection System against Overload and Distributed Denial of Service Attacks","authors":"Ervin Tóth, Zoltán Hornák, G. Tóth","doi":"10.1504/IJCCBS.2010.031711","DOIUrl":"https://doi.org/10.1504/IJCCBS.2010.031711","url":null,"abstract":"Detection of, and protection from overload and denial of service attacks is a common problem in information system servers. Such situation may be the result of simple overload, such as increased service request rate during peak hours, or a malicious distributed attack originating from many computers. This article describes a solution to this problem, focusing on protection mechanisms against both natural and malicious overload, based on analyzing the queue of requests - which, as described in this paper, is chosen to be unlimited. Furthermore, detection and protection scheme against blocking and crash-bug exploiting attacks is presented. The described algorithms were implemented within the dependability and security by enhanced reconfigurability (DESEREC) EU FP6 integrated project.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132282132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Krzysztof Kepa, F. Morgan, Krzysztof Kosciuszkiewicz, T. Surmacz
{"title":"SeReCon: A Trusted Environment for SoPC Design","authors":"Krzysztof Kepa, F. Morgan, Krzysztof Kosciuszkiewicz, T. Surmacz","doi":"10.1109/DepCoS-RELCOMEX.2008.56","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.56","url":null,"abstract":"Problems of fraud, theft, impersonation and counterfeiting have migrated into computing and digital communication technology. Reconfigurable computing (RC) (e.g., FPGA) systems blur the boundary between hardware and software. As reconfigurable computing systems become more popular, concerns arise about their security and privacy. Run-time partial reconfiguration provides the flexibility of hardware, but at the same time may compromise security and integrity of the embedded system design. This paper discusses potential threats to such systems and describes SeReCon, a secure reconfiguration controller, as a countermeasure. SeReCon supports intellectual property protection within the FPGA and provides secure run-time management of designs within FPGA. The fundamentals of the SeReCon trusted computing base are described. Various IP Block processing scenarios are proposed. Early implementation results are reported.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116630887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organization of AES Cryptographic Unit for Low Cost FPGA Implementation","authors":"Lukasz Krukowski, J. Sugier","doi":"10.1109/DepCoS-RELCOMEX.2008.36","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.36","url":null,"abstract":"This paper discusses different design options for realization of AES cryptographic algorithm in programmable logic devices and illustrates them with practical results of hardware implementation. The discussion begins with those aspects of the four basic cipher transformations that are essential for realization with resources available in FPGA devices, then moves to various possible organizations of the cipher unit and concludes with efficiency and size comparison of results obtained after implementation of the AES-128 version of the method in Spartan-3 devices from Xilinx. Instead of searching for a \"global optimum\" specific low-cost FPGA implementation, the paper summarizes main directions of design development that are viable today and evaluates them by a case study example.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123614946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of System Workload Time Characteristic Using UML Timing Diagrams","authors":"Dariusz Dymek, L. Kotulski","doi":"10.1109/DepCoS-RELCOMEX.2008.58","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.58","url":null,"abstract":"Timing diagrams are one of the new types of diagrams introduced in UML ver. 2.0. They are the tool which allows us to characterize the behavior of system components with respect to time parameter. In this paper we propose a method of using Timing Diagrams to estimate the overloading of the boundary elements of the system in the earliest possible stage of system designing - based only on the Use Case diagrams and some additional information concerning the behavior of the user of the future system. Some methodology of gathering and evaluating of this information is also presented.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Language for Failure Patterns and Application in Safety Analysis","authors":"Ian Philip Wolforth, M. Walker, Y. Papadopoulos","doi":"10.1109/DepCoS-RELCOMEX.2008.44","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.44","url":null,"abstract":"Components and families of components in mechatronic systems often exhibit failure characteristics that are independent of system context and repeatable across applications. In this paper, we show that it is possible to capture and reuse such patterns for the purposes of system safety analysis. We describe a language that enables expression of failure behaviour and describe a number of useful patterns in this language. The paper shows how careful reuse of failure patterns in conjunction with a tool that automates Fault Tree and Failure Modes and Effects Analysis can help to simplify complex safety assessments.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121329001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Availability of Discrete Transport System Simulated by SSF Tool","authors":"T. Walkowiak, J. Mazurkiewicz","doi":"10.1109/DepCoS-RELCOMEX.2008.46","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.46","url":null,"abstract":"A paper presents an approach to availability calculation of discrete transport system (DTS). The system is described by the formal model, which includes reliability and functional parameters of DTS. The availability and average availability of the system - defined in a functional way - is discussed as a function of different essential parameters when the DTS is organized. The proposed analysis is based on the modeling and simulating of the system behavior. Monte Carlo simulation is used to encourage reliability and stochastic functional parameters. The simulator is built using scalable simulation framework (SSF). No restriction on the system structure and on a kind of distribution is the main advantage of the method. The paper presents some exemplar system modeling and results.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122558016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semi-Markov Availability Modeling of a Redundant System with Partial and Full Rejuvenation Actions","authors":"V. Koutras, A. Platis","doi":"10.1109/DepCoS-RELCOMEX.2008.13","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.13","url":null,"abstract":"Software rejuvenation is a preventive maintenance technique to prevent failures in continuously running systems that experience software aging. In this paper, rejuvenation is modeled in a redundant computer system via a semi-Markov process in order to counteract software aging. The system can be switched into the standby unit automatically or manually in the case of a failure at the switching mechanism. Depending on the degradation of the system resources, the running node is either rejuvenated or continues serving and systempsilas steady-state availability is studied along with the optimal time to perform rejuvenation, which increases systempsilas availability. Moreover, an alternative rejuvenation modeling is introduced, in which two different actions; partial and full rejuvenation are performed according to the degradation level. The optimal rejuvenation policies for this case are also derived, leading the system to higher levels of availability.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131885576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable Diversity-Oriented Decisions and Technologies for Dependable SoPC-Based Safety-Critical Computer Systems and Infrastructures","authors":"V. Kharchenko, V. Sklyar","doi":"10.1504/IJCCBS.2010.031890","DOIUrl":"https://doi.org/10.1504/IJCCBS.2010.031890","url":null,"abstract":"An approach to development and implementation of multi-version technologies (MVT) for creating dependable system-on-programmable chip (SoPC)-based systems and infrastructures is described. It is based on a set of scalable diversity-oriented decisions selected by use of proposed MVT-graph. This technique is applied for development of nuclear power plants (NPP) instrumentation and control (I&C) platform. The diverse I&C platform RADIY designed, produced and supplied by company Radiy (Ukraine) is described and analyzed. Results of implementation of the suggested decisions and technologies in safety- critical dependable systems and infrastructures of Ukrainian NPPs are analyzed.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125258965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy strategies in modeling effects of technological implementations","authors":"H. Piech","doi":"10.1109/DepCoS-RELCOMEX.2008.28","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.28","url":null,"abstract":"In our work we propose the method of steering the technological effects under assumption, that we be base on interval or fuzzy date data. Such character of data in use to technological model the von Neumann (or others) give us the possibility to compose permutation structures of technological parameters. It permits to formulate a vectors of control the technological process in larger range than in case of deterministic models (Brans and Mareshal,1994). On basis of created criteria functions we build the vector of intensity of growth economic effect, which permits to choose the optimal direction of investment (or modification) load.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114334475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}