{"title":"Reliability - security model","authors":"N. Schneidewind","doi":"10.1109/ICECCS.2006.71","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.71","url":null,"abstract":"This paper includes the conditional probability of security failures given the occurrence of reliability failures. To our knowledge, this is the first research to perform this type of integration of reliability and security. It was necessary for us to use hypothetical but realistic probability distributions and parameters because, unfortunately, cyber attack data is not publicly available. In our model, we calculate error rates between predicted and actual values of reliability and security quantities. We provide a discussion of the policy implications for mitigating reliability and security problems based on model results. Our approach is most applicable to critical infrastructure systems","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126991295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Steve A. Schneider, H. Treharne, Ana Cavalcanti, J. Woodcock
{"title":"A layered behavioural model of platelets","authors":"Steve A. Schneider, H. Treharne, Ana Cavalcanti, J. Woodcock","doi":"10.1109/ICECCS.2006.80","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.80","url":null,"abstract":"There is great interest in the application of nanotechnology to medicine, but concerns for safety are paramount. We present a modelling technique based on CSP and B as a starting point for simulation of networks of nano-robots. The model and the simulations are central features of our proposed approach to the construction of safety cases for nanomedicine applications, and complex networks of cooperating components in general. Our work is based on a case study: the clotting behaviour of (artificial) platelets. We present a model, and discuss its analysis and uses","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132614291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation of Java Card component development using the B method","authors":"D. Déharbe, B. Gomes, A. Moreira","doi":"10.1109/ICECCS.2006.51","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.51","url":null,"abstract":"This paper presents a method for the rigorous development of Java Card smart card applications, using the B method. Its main feature is to abstract the particularities of Java Card and smart card aware applications from the specifier as much as possible. In the proposed approach, the specification of the application logic does not need to take into account the specific aspects of the Java Card platform (in particular, communication between the card acceptance device and the smart card itself). A sequence of pre-established refinements is then applied to the original specification to yield an implementation-level B description of the component, which can then be used to synthesize Java Card code. This method reduces significantly the required amount of user-interaction and improves productivity. An interesting side-effect of this approach is that the specification may be reused with any other platform of implementation","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132266350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Davies, James Welch, Alessandra Cavarra, E. Crichton
{"title":"On the generation of object databases using booster","authors":"J. Davies, James Welch, Alessandra Cavarra, E. Crichton","doi":"10.1109/ICECCS.2006.65","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.65","url":null,"abstract":"This paper shows how ideas from a combination of formal techniques can be used to enable the automatic generation of databases from precise object models. It explores how the specification of an object database design can be formalized in terms of method preconditions, method postconditions, and invariant properties - many of which will correspond to integrity constraints for the data representation. Individual method specifications can be completed to reflect constraints expressed elsewhere in the model, composed to specify transactions, and then translated into executable code, to produce a reliable data store with a programming interface. The process of completion, composition, and translation may be automated to produce a model-driven approach to the development of object databases","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biologically-inspired concepts for self-management of complexity","authors":"Roy Sterritt, M. Hinchey","doi":"10.1109/ICECCS.2006.52","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.52","url":null,"abstract":"Inherent complexity in large-scale applications may be impossible to eliminate or even ameliorate despite a number of promising advances. In such cases, the complexity must be tolerated and managed. Such management may be beyond the abilities of humans, or require such overhead as to make management by humans unrealistic. A number of initiatives inspired by concepts in biology have arisen for self-management of complex systems. We present some ideas and techniques we have been experimenting with, inspired by lesser-known concepts in biology that show promise in protecting complex systems and represent a step towards self-management of complexity","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126601494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification of control systems using Circus","authors":"Ana Cavalcanti, P. Clayton","doi":"10.1109/ICECCS.2006.72","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.72","url":null,"abstract":"The design of control systems is usually based on diagrammatic definitions of control laws. The independent use of Z and CSP to verify their implementations has been successful, even for very large applications; high levels of automation have been achieved with tools based on a theorem prover called ProofPower. We have extended this approach to integrate the use of Z and CSP using a notation called Circus; as a result, we can handle a larger set of diagrams and prove more properties of the implementation. In this paper, we show how we can reuse the existing tools and experience to provide automation in the context of the new technique. This gives us confidence in its applicability in industry","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128090598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A tool-supported review approach to detecting structural consistency violations","authors":"Yuting Chen, Shaoying Liu, Fumiko Nagoya","doi":"10.1109/ICECCS.2006.46","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.46","url":null,"abstract":"The application of specification-based program verification techniques (e.g., testing, review, and proof) faces strong challenges in practice when the gap between the structure of a specification and that of its program is large. In this paper, we describe a tool-supported review approach to detecting structural consistency violations by introducing the review method, discussing the design and implementation of the tool, and presenting a case study to assess the effectiveness of the tool and identify points for further improvement","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134291074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the complexity of design in imaging software","authors":"Magnus E. Larsson, P. Laplante","doi":"10.1109/ICECCS.2006.64","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.64","url":null,"abstract":"Recent evidence raised the possibility that algorithm rich software, such as in imaging processing, is more complex than other kinds (Sangwan, 2005). To further investigate this contention a set of complexity metrics were computed for two sets of open source Java software systems. The results suggest that there is little or no difference in software complexity between an imaging application, and \"conventional\" software, such as a simple database querying system. The tests suggest that the overall complexity of the system depends more on the software design knowledge of the engineers than the kind of system that is constructed","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116023004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A real-time high-fidelity driving simulator system based on PC clusters","authors":"Duoduo Liao","doi":"10.1109/ICECCS.2006.45","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.45","url":null,"abstract":"There are many challenges to create a real-time high-fidelity driving simulator based on PC clusters with multi-channeled projector support, while still maintaining at least 30 frame rates for complex scenes. This paper describes how such a system was conceived and implemented to support behavioral research on highway safety and operations. The real highway safety research study is used to compare the driver behavior derived from real-world roadway data with data collected in a simulated environment to valid the simulator. The hardware and software architectures are discussed in detail, respectively. Such architectures have been constructed to support upgradeability, scalability, extendibility, and flexibility. The experimental results of the real study are shown in daytime and nighttime, respectively. The conclusions and future work are described in the end","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116160156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient dynamic multikeys in Enterprise JavaBeans","authors":"R. Klemm","doi":"10.1109/ICECCS.2006.54","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.54","url":null,"abstract":"The J2EE platform allows the rapid development of a large class of complex and robust server-side applications. However, some J2EE constraints pose serious challenges to the development of J2EE applications that interact with legacy systems outside the originally targeted J2EE domain. One such constraint is the static nature of identities of entity Enterprise JavaBeans (EJBs). We present a case study that motivates the introduction of dynamic sets of identities of entity EJBs, which we call dynamic multikeys, and describe five different ways of implementing dynamic multikeys based on static EJB identities. We compare the characteristics of our dynamic multikey solutions and demonstrate through performance tests that one of them is superior from a performance point of view. However, each one of the slower solutions offers distinct advantages that may make it attractive to some developers and for applications where the performance of dynamic multikeys is not a critical factor","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}