{"title":"Behavioral aspects for agent-based models of resilient urban systems","authors":"Thomas Brudermann, Y. Yamagata","doi":"10.1109/DSNW.2013.6615537","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615537","url":null,"abstract":"This paper discusses behavioral aspects for agent-based models of resilient urban systems. Human behavior in emergency situations is not driven by rational deliberation, but usually based on intuitive decision making and on heuristics. With high levels of risk and uncertainty, mass-psychological propensities tend to occur as well: People no longer orientate themselves to facts, but to other people. Mal-adaptive decision making heuristics might entail information cascades and irrational decisions on the collective level. Based on previously developed agent-based models, we draft a concept for integrating such behavioral aspects into models of urban emergencies.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132022677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for runtime V&V in business-critical Service Oriented Architectures","authors":"Cristiana Areias","doi":"10.1109/DSNW.2013.6615518","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615518","url":null,"abstract":"Service Oriented Architectures (SOA) present features that allow companies to react quickly to changes through the provision of new or modified services in their environments. However, the application of verification and validation (V&V) techniques in such environments is a very challenging task, due to their complexity and dynamic nature, hampering the application of traditional V&V. In this context, this paper justifies the needs for a runtime V&V approach, presents a framework for its implementation in critical SOA systems, and discusses some important challenges that must be addressed.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125228815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Golden-run alignment for analysis of robustness testing results: dealing with diagnostics issues","authors":"G. S. Lemos, E. Martins","doi":"10.1109/DSNW.2013.6615510","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615510","url":null,"abstract":"For the analysis of robustness testing results, comparison with a golden run is commonly used to determine whether robustness failures occurred or not. One limitation of this approach is that traditional comparison techniques require the system to have a repeatable behavior under the same workload, whether or not in presence of faults. This limits the applicability of this technique, since most systems have indeterminist behavior due to concurrency, for example. Moreover, tools that use golden-run comparison hardly ever give information about what are the common patterns of behavior between the golden-run and a faulty trace and where there are deviations due to action of fault-tolerance mechanisms, for example. In this paper, we show how the use of sequence alignment algorithms, from computational biology, can be of help. Besides allowing the determination of regions of similarities between two sequences that are not exactly equal, these algorithms present results in a visual form, highlighting the different zones where there are common patterns between the two sequences. We also point out other ways in which alignment algorithms can be useful as well.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131550231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Fenz, T. Neubauer, R. Accorsi, Thomas G. Koslowski
{"title":"FORISK: Formalizing information security risk and compliance management","authors":"Stefan Fenz, T. Neubauer, R. Accorsi, Thomas G. Koslowski","doi":"10.1109/DSNW.2013.6615533","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615533","url":null,"abstract":"Regulatory frameworks and economic pressure demand decision makers to define mitigation strategies for their operational IT risks. However, recent studies indicate the lack of IS knowledge at the management level is one reason for inadequate or nonexistent IS risk management strategies because existing approaches fall short of meeting decision makers' needs. This paper presents the FORISK project that provides a new approach to support decision makers in interactively defining the optimal set of resilient measures and security controls according to regulations and standards. FORISK addresses three essential, yet unsolved research problems: (i) the formal representation of IS standards and domain knowledge, (ii) the reliable risk determination, (iii) and the (semi-)automated countermeasure definition.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132480904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Storage-efficient data replica number computation for multi-level priority data in distributed storage systems","authors":"Chris X. Cai, Cristina L. Abad, R. Campbell","doi":"10.1109/DSNW.2013.6615512","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615512","url":null,"abstract":"Distributed storage systems often use replication for improved availability, performance and scalability. In this paper, we consider the case of using file replication to improve the availability of different classes of files, where some classes are more “important” than others and more replicas are created for them to achieve improved availability. The question we attempt to answer is: given a fixed storage budget for storing replicas, what is the number of replicas of each file class to create to maximize the (weighted) overall availability of files? We present our work towards a replica number computation algorithm that takes into account a storage budget, a configurable maximum expected percentage of failed nodes, and weights for different file classes. Simulation results show that our algorithm is able to improve the availability of the prioritized files with higher weights, has a low computation time and can utilize storage space efficiently when total storage space scales to a large size.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114456520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Cinque, Domenico Cotroneo, C. Rodríguez-Domínguez, J. L. Garrido
{"title":"Automatic collection of failure data from the iOS platform","authors":"M. Cinque, Domenico Cotroneo, C. Rodríguez-Domínguez, J. L. Garrido","doi":"10.1109/DSNW.2013.6615508","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615508","url":null,"abstract":"The increasing complexity of smart phones makes them more susceptible to accidental failures. However, there is still little understanding on the dependability behavior of modern smart phones. In this paper, we propose the design and implementation of a logger to collect relevant failure data from iOS devices, such as iPhone and iPad. The preliminary use of the logger on real-world devices shows that it is able to collect meaningful failure data and to provide interesting insight on the dependability behavior of iOS.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124816659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Kaâniche, Michael Harrison, H. Kopetz, D. Siewiorek
{"title":"2nd workshop on open resilient human-aware cyber-physical systems","authors":"M. Kaâniche, Michael Harrison, H. Kopetz, D. Siewiorek","doi":"10.1109/DSNW.2013.6615524","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615524","url":null,"abstract":"Cyber-physical systems (CPS) are tight integrations of computation, networking, and physical objects. Recent advances in pervasive and ubiquitous information processing, driven by major breakthroughs in cyber-physical technology are paving the way towards a more hospitable and sustainable future via a more efficient management of our environment: homes, work places, open areas, etc. Examples of relevant applications include: future automotive and transportation systems featuring intensive sensing and open data communication devices, robot-assisted communication and cooperation in search and rescue missions, enhanced situation awareness in public urban spaces, assistance and monitoring in everyday life for elderly or handicapped people, smart resilient and secure heterogeneous energy grids, etc.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}