2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement最新文献

筛选
英文 中文
A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense 攻防战略决策与分析的博弈论方法
Jin-Cherng Lin, Jan-Min Chen, Chou-Chuan Chen, Yu-Shu Chien
{"title":"A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense","authors":"Jin-Cherng Lin, Jan-Min Chen, Chou-Chuan Chen, Yu-Shu Chien","doi":"10.1109/SSIRI.2009.27","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.27","url":null,"abstract":"The interactive behavior between the hacker and the defender is similar to information warfare. The process of attack and defend can be abstracted as a tree diagram and analyzed based on game theory. When a hacker launches an attack, he must do his best to get expected payoff. Similarly the defender may hope to protect system against attacker successfully by minimizing security investment. The tradeoff between attack and defense is hard to keep accurately by means of traditional experience rule. In this paper, we try to solve the problem quickly with the help of game theory. A simple and effective way based on the minimax theorem in game theory is presented. In zero-sum games, the minimax solution is the same as the Nash equilibrium. Thus those strategies listed in probability spread can satisfy both involvers. The result accords with the real scenario in common network environment.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128096372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Semantic ACP2P Information Retrieval Method 语义ACP2P信息检索方法
Haibo Yu, Tsunenori Mine, M. Amamiya
{"title":"Semantic ACP2P Information Retrieval Method","authors":"Haibo Yu, Tsunenori Mine, M. Amamiya","doi":"10.1109/SSIRI.2009.57","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.57","url":null,"abstract":"In this paper, a Semantic Agent-Community-based Peer-to-Peer information retrieval method called SACP2P method is proposed for reliable community Web information sharing. The evaluation experiment is performed and the result has shown that SACP2P method can aggregate information from different sources published through different methods (including Web content and Web services) and be effectiveness on reducing communication loads in a P2P network.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128899368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Turing Machine-Based Model for Computer Forensic Reconstruction 基于图灵机的计算机取证重建模型
Ryan Q. Hankins, T. Uehara, Jigang Liu
{"title":"A Turing Machine-Based Model for Computer Forensic Reconstruction","authors":"Ryan Q. Hankins, T. Uehara, Jigang Liu","doi":"10.1109/SSIRI.2009.41","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.41","url":null,"abstract":"Reconstruction is of critical importance for computer forensics: reliability depends on our ability to do so with a quantifiable degree of certainty. In this paper, we propose a new model for computer forensic reconstruction by creating a mathematical model of a computer system that reliably shows how computation progressed. Since the new model is Turing Machine-based, the reliability of other forensic reconstruction systems can be evaluated by comparing to this new model.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131841164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Graph-Model-Based Testing Method Compared with the Classification Tree Method for Test Case Generation 基于图模型的测试方法与分类树方法在测试用例生成中的比较
F. Belli, Axel Hollmann, Markus Kleinselbeck
{"title":"A Graph-Model-Based Testing Method Compared with the Classification Tree Method for Test Case Generation","authors":"F. Belli, Axel Hollmann, Markus Kleinselbeck","doi":"10.1109/SSIRI.2009.40","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.40","url":null,"abstract":"In automotive industry, mechanic control units are more and more replaced by electronic devices that are often aggregated in electronic control units (ECU). Systematic testing is one of the preferred industrial validation methods to ensure functionality of those ECUs. It is imperative to reduce the costs and improve the effectiveness of testing by automating the testing process. This paper introduces a model-based testing method using event sequence graphs and compares this approach with the classification tree method which is popular in automotive industry. A case study applies both methods to the formal specification of an adaptive cruise control unit for generation and selection of test cases. To enable a meaningful comparison, test costs and number of faults revealed by both methods will be compared.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics 基于死路消除语义的WS-BPEL流程建模与分析新方法
Chunxiang Xu, Hanpin Wang, Wanling Qu, Meixia Zhu, Yu Huang
{"title":"A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics","authors":"Chunxiang Xu, Hanpin Wang, Wanling Qu, Meixia Zhu, Yu Huang","doi":"10.1109/SSIRI.2009.37","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.37","url":null,"abstract":"Most of existing formal models for BPEL based Web Services composition are without description of dead-path-elimination semantics. There are Petri net based models describing the dead-path-elimination semantics, while the models are too big to handle large scale processes. In this paper, a new model called DPE net is advanced to describe the WS-BPEL process under the dead-path-elimination semantics. We give the DPE net models describing the basic control flow, relatively complete links semantics and dead-path-elimination semantics, and introduce how to analyze properties of the WS-BPEL process based on DPE Reachability Graph. The features of DPE net make the DPE net model for the WS-BPEL process smaller than the model based on P/T net. Moreover, the DPE Reachability Graph allows several transitions to be fired in one step, which reduces the reachability graph's size dramatically.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127850501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Position Statement: Evolving Software Models for Global Organizations 职位陈述:为全球组织发展软件模型
Uttiya Basu
{"title":"Position Statement: Evolving Software Models for Global Organizations","authors":"Uttiya Basu","doi":"10.1109/SSIRI.2009.69","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.69","url":null,"abstract":"In an increasingly global world, organizations are opening up to working across diverse geographies and providing goods and / or services across boundaries. This need to globalize stems from increased stakeholders demands on RoI, increased competition and an ever shrinking pie of the market share for organizations not able to adapt. Revenues and costs remain the two main driving factors. This need to globalize brings with it a multitude of operational challenges, including the need for a global IT program and a need for global software delivery. IT programs are increasingly architected at global levels, with specific local flavors to deal with a mix of operating environments and operational frameworks. Global software systems like this are characterized by their flexibility, fast speed of deployment, scalability and ability to adapt to local needs.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123074856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Directed Acyclic Graph Modeling of Security Policies for Firewall Testing 防火墙测试安全策略的有向无环图建模
Tugkan Tuglular, Özgür Kaya, Can Arda Muftuoglu, F. Belli
{"title":"Directed Acyclic Graph Modeling of Security Policies for Firewall Testing","authors":"Tugkan Tuglular, Özgür Kaya, Can Arda Muftuoglu, F. Belli","doi":"10.1109/SSIRI.2009.52","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.52","url":null,"abstract":"Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of rules where each rule is represented as a predicate and an action. This paper proposes modeling of firewall rules via directed acyclic graphs (DAG), from which test cases can be automatically generated for firewall testing. The approach proposed follows test case generation algorithm developed for event sequence graphs. Under a local area network setup with the aid of a specifically developed software for this purpose, generated test cases are converted to network test packets, test packets are sent to the firewall under test (FUT), and sent packets are compared with passed packets to determine test result.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"49 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120819317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Temporal Specification and Deductive Verification of a Distributed Component Model and Its Environment 分布式组件模型及其环境的时间规范和演绎验证
A. Basso, A. Bolotov, V. Getov
{"title":"Temporal Specification and Deductive Verification of a Distributed Component Model and Its Environment","authors":"A. Basso, A. Bolotov, V. Getov","doi":"10.1109/SSIRI.2009.61","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.61","url":null,"abstract":"In this paper we investigate the formalisation of distributed and long-running stateful systems using our normative temporal specification framework. We analyse aspects of a component-oriented Grid system, and the benefits of having a logic-based tool to perform automated and safe dynamic reconfiguration of its components. We describe which parts of this Grid system are involved in the reconfiguration process and detail the translation procedure into a state-based formal specification. Subsequently, we apply deductive verification to test whether dynamic reconfiguration can be performed. Finally, we analyse the procedure required to update our model for reconfiguration and justify the validity and the advantages of our methodology.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123577578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scheduling and Controlling Semantics for Distributed Resource Based Computing Engines 分布式资源计算引擎的调度与控制语义
P. Varma, V. Naik
{"title":"Scheduling and Controlling Semantics for Distributed Resource Based Computing Engines","authors":"P. Varma, V. Naik","doi":"10.1109/SSIRI.2009.29","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.29","url":null,"abstract":"With the advent of autonomic and cloud computing, computation engines are getting redefined as dynamic configurations of heterogeneous, distributed resources. In this paper, we describe the operational semantics of scheduling and controlling of computation engines configured from component resources subject to dependency and capacity constraints and in accordance with policies and objectives such as priorities and load balancing. The operational semantics provides a novel formal model in denotational style, for establishing properties like computability and dependability in the presence of faults and reported and unreported events. It supports dynamic features such as resource up and down events, synchronized startup, synchronized shutdown, and resource groups/virtual servers. An efficient, interpreter-based implementation using the specified semantics is suggested.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simplifying Parametrization of Bayesian Networks in Prediction of System Quality 简化贝叶斯网络在系统质量预测中的参数化
Aida Omerovic, K. Stølen
{"title":"Simplifying Parametrization of Bayesian Networks in Prediction of System Quality","authors":"Aida Omerovic, K. Stølen","doi":"10.1109/SSIRI.2009.36","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.36","url":null,"abstract":"Bayesian Networks (BNs) are a powerful means for modelling dependencies and predicting impacts of architecture design changes on system quality. The extremely demanding parametrization of BNs is however the main obstacle for their practical application, in spite of the extensive tool support. We have promising experiences from using a treestructured notation, that we call Dependency Views (DVs), for prediction of impacts of architecture design changes on system quality. Compared to BNs, DVs are far less demanding to parametrize and create. DVs have shown to be sufficiently expressive, comprehensible and feasible. Their weakness is however limited analytical power. Once created, BNs are more adaptable to changes, and more easily refined than DVs. In this paper we argue that DVs are fully compatible with BNs, in spite of different estimation approaches and concepts. A transformation from a DV to a BN preserves traceability and results in a complete BN. By defining a transformation from DVs to BNs, we have enabled reliable parametrization of BNs with significantly reduced effort, and can now exploit the strengths of both the DV and the BN approach.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133976615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信