2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX最新文献

筛选
英文 中文
A Performance Management System for Telecommunication Network Using AI Techniques 基于人工智能技术的电信网络绩效管理系统
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.32
Shaoyan Zhang, Rui Zhang, Jianmin Jiang
{"title":"A Performance Management System for Telecommunication Network Using AI Techniques","authors":"Shaoyan Zhang, Rui Zhang, Jianmin Jiang","doi":"10.1109/DepCoS-RELCOMEX.2008.32","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.32","url":null,"abstract":"Anomaly detection has become more and more difficult for telecommunication network due to the various trends of networking technologies and the growing number of unauthorized activities in the performance data. This paper builds up a performance management system based on the one-class-support vector machine (OCSVM) and k-means clustering algorithm, which achieves not only the automatic detection of network anomalies but also the clustering of the anomalies with different levels. The OCSVM detects the anomalies by solving an optimal problem to separate the nominal data from the anomalies; these detected anomalies are then classified into minor, medium and severe levels using k-means clustering. The real telecommunication performance data are employed in this paper for the investigation, and the numerical results demonstrate the promising performance of this system.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132306110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Intelligent Maritime Workplace using IT technologies 运用资讯科技的智能海事工作场所
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.41
D. Gourgoulis, C. Yakinthos
{"title":"An Intelligent Maritime Workplace using IT technologies","authors":"D. Gourgoulis, C. Yakinthos","doi":"10.1109/DepCoS-RELCOMEX.2008.41","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.41","url":null,"abstract":"IT technologies over the past years have shown a rapid growth, on the contrary this increase of e-commerce and e-work in the maritime industry is not as intense as in any other field. E-commerce and e-work is still at its embryonic stages, however, the annual rate of increase suggest that in very few years this share will have grown dramatically. Thus, it is time to get prepared. The aim of the present paper is to present a new maritime intelligent workplace based weather information system and decision support for high-speed maritime transport. It has been achieved by linking fixed/mobile communications with navigation/positioning, efficient transmission and delivery over the geo-information network. These services will allow the shipmaster to have seamless access to, and interaction with intelligent, customised (route based) rich content multimedia information on the efficient and safe navigation passage for passengers, freights and the environment both on board ship and inland.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124478138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dependability Evaluation of Service-oriented Information System Using Computer Simulation and Post-processing Results 基于计算机仿真和后处理结果的服务型信息系统可靠性评估
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.18
Lukasz Bagrij, K. Michalska, Marek Woda
{"title":"Dependability Evaluation of Service-oriented Information System Using Computer Simulation and Post-processing Results","authors":"Lukasz Bagrij, K. Michalska, Marek Woda","doi":"10.1109/DepCoS-RELCOMEX.2008.18","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.18","url":null,"abstract":"In times of known hacking techniques as well as malicious software ubiquity, mostly commercialized information systems are seriously threaten. For this reason nowadays network security and dependable operation has become a major priority for design and implementation. Looking for powerful means network engineers started to often use computer simulation technique as a way for better understanding and development of complex computer systems. Therefore, plenitude of specialized development initiatives appeared in last few years. Currently network simulators are tools useful not only for creating new and better protocols, but also become money savers. By extending their functionalities e.g. post-processing capabilities for evaluating security and dependability metrics they turn out to be a fundamental state of the art network management platforms. This paper presents the information system, proposes metrics definitions, and describes the procedure of their evaluation using a simulator and a post-processing module.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"59 22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ElGamal Signature Scheme Immune to Fault Analysis 不受故障分析影响的电子签名方案
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.55
Maciej Nikodem
{"title":"ElGamal Signature Scheme Immune to Fault Analysis","authors":"Maciej Nikodem","doi":"10.1109/DepCoS-RELCOMEX.2008.55","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.55","url":null,"abstract":"Fault attacks have been introduced in late 90's and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the fault analysis. Unfortunately, only a few propositions to overcome this threat have been proposed. Moreover most works focus on secret key cryptosystems (e.g. AES, RC6, Blowfish) and the RSA encryption and signing algorithm. On the other hand much less attention have been paid to other signature and identification schemes.In this paper we will investigate the fault attack on the ElGamal signature scheme. We briefly present two attacks on this scheme and propose a modification that ensures immunity to transient and permanent faults. This is achieved without using comparisons, at cost of increased computational overhead similar to signature verification.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126663813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non-Centralized Key Pre-Distribution in Computer Networks 计算机网络中的非集中密钥预分发
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.47
Alexander Frolov, I. Shchurov
{"title":"Non-Centralized Key Pre-Distribution in Computer Networks","authors":"Alexander Frolov, I. Shchurov","doi":"10.1109/DepCoS-RELCOMEX.2008.47","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.47","url":null,"abstract":"The technology of confidential connections in a computer network using key information pre-distributed independently and may be simultaneously in its segments or domains is proposed. Some key pre-distribution schemes are generalized using well-known hashing method. To support the proposed technology the modification of Kerberos-type protocol is considered. The proposal allows us to decrease an amount of secret key information that should be sent from its generator to the network participants. The considered approaches and key pre-distribution schemes correspond to peculiarities of mobile networks owing to the facts that participants should'n implement asymmetric cryptographic systems and the public key certification service; moreover the communication phase don't suppose any interconnection with trusted authority key distribution center.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121752827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Decision Diagrams for Reliability Analysis of Multi-State System 多状态系统可靠性分析决策图
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.54
E. Zaitseva, V. Levashenko
{"title":"Decision Diagrams for Reliability Analysis of Multi-State System","authors":"E. Zaitseva, V. Levashenko","doi":"10.1109/DepCoS-RELCOMEX.2008.54","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.54","url":null,"abstract":"Multi-state system (MSS) is one a mathematical model used in reliability analysis to describe a system having some working efficiency. We propose new methods for MSS description by decision diagrams that well know in algebra logic and in multiple-value logic in particular. We propose dynamic reliability indices for estimation of MSS reliability and elaborate algorithms for calculation of dynamic reliability indices on basis of MSS representation by decision diagram.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121798517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Comprehensive Planning Platform Framework for Managing Service-Oriented Information Systems 面向服务的信息系统管理综合规划平台框架
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.17
Marek Woda, Lukasz Bagrij
{"title":"Comprehensive Planning Platform Framework for Managing Service-Oriented Information Systems","authors":"Marek Woda, Lukasz Bagrij","doi":"10.1109/DepCoS-RELCOMEX.2008.17","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.17","url":null,"abstract":"Proposed framework provides methodologies and tools for enhancing information systems dependability by assisting in planning the system operations. For that reason the following steps are taken: model the system, analyze its expected behaviour to identify potential problems and weaknesses, and finally automatically generate the system configurations according to various operational modes. The approach postulate for creating: the models and tools to express the policies (dependability, detection and reaction) as well as for describing the target system, its operation modes and threats.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127575851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of SOA Security Metrics Using Attack Graphs 使用攻击图评估SOA安全度量
J. Magott, Marek Woda
{"title":"Evaluation of SOA Security Metrics Using Attack Graphs","authors":"J. Magott, Marek Woda","doi":"10.1504/IJCCBS.2010.031712","DOIUrl":"https://doi.org/10.1504/IJCCBS.2010.031712","url":null,"abstract":"First, different security metrics are presented. A proposal of risk assessment for service oriented architecture (SOA) is given. This proposal is based on service availability metrics. First metric represents costs (extend of damage), when the service is not available. The second one is a probability that the service is available. Foundations for calculating this probability by simulation using attack graphs are given. The attack graph is a representation of actions that end in a state where an intruder achieved his/her goal. A model of intrusion detection system is given too.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131335065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Dependable SoPC-Based On-board Ice Protection System: From Research Project to Implementation 可靠的基于sopc的车载防冰系统:从研究项目到实施
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.43
Y. Prokhorova, V. Kharchenko, S. Ostroumov, S. Yatsenko, Mykola Sidorenko, B. Ostroumov
{"title":"Dependable SoPC-Based On-board Ice Protection System: From Research Project to Implementation","authors":"Y. Prokhorova, V. Kharchenko, S. Ostroumov, S. Yatsenko, Mykola Sidorenko, B. Ostroumov","doi":"10.1109/DepCoS-RELCOMEX.2008.43","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.43","url":null,"abstract":"Both dependability of computer on-board systems (CBS), and the size and the weight limitations are very important characteristics. Basic aviation and aerospace CBSs requirements and some development principles are considered. The multi-version lifecycle of FPGA-based CBS as system-on-programmable-chip (SoPC) is described. The several dependable SoPC architectures are researched and assessed: one-version two-channel, two-version two-channel and two-version four-channel systems. The method of the architectural adaptation is considered as the means for physical and design faults tolerating. Itpsilas based on composition of a few versions embedded to the chip. The checking and reconfiguration block as intellectual property core and elements ofice protection system development and implementation process are given as the practical example of application of proposed technique.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126470702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Autonomy and Cooperation as Factors of Dependability in Wireless Sensor Network 自主与协作:无线传感器网络的可靠性因素
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.50
J. Nikodem
{"title":"Autonomy and Cooperation as Factors of Dependability in Wireless Sensor Network","authors":"J. Nikodem","doi":"10.1109/DepCoS-RELCOMEX.2008.50","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.50","url":null,"abstract":"In the paper we explore relationships between autonomy, cooperation and dependability in wireless sensors network (WSN). We consider WSN as a set of sensors deployed insome area. These sensors must act autonomously and cooperatively to achieve both their particular self-interested and global goals. In proposed approach we determine cooperation and autonomy abstractions and consider them in the context of three basic relations (sub-ordination, tolerance, collision). In such way we expand 2D space (autonomy, cooperation) onto 3D partially or totally ordered relational space. Proposed conceptual framework provides a powerful paradigm to conceive, model, support and manage dynamically organising complex systems.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134644439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信