The Community for Technology Leaders
Dependable, Autonomic and Secure Computing, IEEE International Symposium on (2006)
Indiana University-Purdue University, Indianapolis, USA
Sept. 29, 2006 to Oct. 1, 2006
ISBN: 0-7695-2539-3
TABLE OF CONTENTS
Introduction

Referees (PDF)

pp. xiii-xiv
Session 1: Autonomic Computing and Selfware

A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System (Abstract)

Manish Madhusoodan , Indiana University - Purdue University, USA
Xukai Zou , Indiana University - Purdue University, USA
Michael Hinchey , NASA Goddard Space Flight Center, USA
Yuan-Shun Dai , Indiana Unversity - Purdue University, USA
James L. Rash , NASA Goddard Space Flight Center, USA
pp. 3-10

Adaptable and Autonomic Mission Manager for Dependable Aerospace Computing (Abstract)

Alan D. George , University of Florida, USA
Ian A. Troxel , University of Florida, USA
pp. 11-18

A Model-Driven Architecture Approach for Modeling, Specifying and Deploying Policies in Autonomous and Autonomic Systems (Abstract)

Joaquin Pena , University of Seville, Spain
Manuel Resinas , University of Seville, Spain
Antonio Ruiz-Cortes , University of Seville, Spain
Roy Sterritt , University of Ulster, Northern Ireland
Michael G. Hinchey , NASA Goddard Space Flight Center, USA
pp. 19-30
Session 2: Cryptography

A Reliable (k, n) Image Secret Sharing Scheme (Abstract)

Li Bai , Temple University, USA
pp. 31-36

Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware (Abstract)

Philippe Golle , Palo Alto Research Center, USA
Jong Youl Choi , Indiana Univ. at Bloomington, USA
Markus Jakobsson , Indiana Univ. at Bloomington, USA
pp. 37-44

A Parallel GNFS Integrated with the Block Wiedemann?s Algorithm for Integer Factorization (Abstract)

Na Guo , St. Francis Xavier University, Canada
Man Lin , St. Francis Xavier University, Canada
Laurence T. Yang , St. Francis Xavier University, Canada
John P. Quinn , St. Francis Xavier University, Canada
pp. 45-50

A CRT-RSA Algorithm Secure against Hardware Fault Attacks (Abstract)

Wei Wang , Indiana University - Purdue University, USA
Sining Liu , Indiana University - Purdue University, USA
Brian King , Indiana University - Purdue University, USA
pp. 51-60
Session 3: Autonomic Computing and Monitoring

A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation (Abstract)

Sven J. Knapskog , Norwegian University of Science and Technology, Norway
Karin Sallhammar , Norwegian University of Science and Technology, Norway
Bjarne E. Helvik , Norwegian University of Science and Technology, Norway
pp. 61-68

Autonomous Decentralized Load Tracking Techniques and Evaluation (Abstract)

Kinji Mori , Tokyo Institute of Technology, Japan
Tetsuya Masuishi , Hitachi Ltd.
Koichi Shibata , Hitachi Ltd.
Yasuyuki Oki , Hitachi Ltd.
pp. 69-76

Optimal Checkpoint Placement with Equality Constraints (Abstract)

Tatsuya Ozaki , Hiroshima University, Japan
Naoto Kaio , Hiroshima Shudo University, Japan
Tadashi Dohi , Hiroshima University, Japan
pp. 77-84

Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks (Abstract)

Howard E. Michel , University of Massachusetts Dartmouth, USA
Liudong Xing , University of Massachusetts Dartmouth, USA
Ruiping Ma , University of Massachusetts Dartmouth, USA
pp. 85-94
Session 4: Reliability and Security Modeling

Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective (PDF)

Joseph G. Tront , Virginia Tech, USA
James D. Arthur , Virginia Tech, USA
Anil Bazaz , Microsoft, Inc., USA
pp. 95-102

Assessing Vulnerabilities in Apache and IIS HTTP Servers (Abstract)

Omar H. Alhazmi , Colorado State University, USA
Yashwant K. Malaiya , Colorado State University, USA
Sung-Whan Woo , Colorado State University, USA
pp. 103-110

Estimating Markov Modulated Software Reliability Models via EM Algorithm (Abstract)

Tadashi Dohi , Hiroshima University, Japan
Takao Ando , Hiroshima University, Japan
Hiroyuki Okamura , Hiroshima University, Japan
pp. 111-118

Measuring Quantitative Dependability Attributes in Digital Publishing Using Petri Net Workflow Modeling (Abstract)

Gustavo A. Chaparro-Baquero , University of Puerto Rico, Mayaguez Campus, PR, USA
Fernando Vega-Riveros , University of Puerto Rico, Mayaguez Campus, PR, USA
Nayda G. Santiago , University of Puerto Rico, Mayaguez Campus, PR, USA
Wilson Rivera , University of Puerto Rico, Mayaguez Campus, PR, USA
pp. 119-128
Session 5: Autonomy Supported by Grid and Pervasive Computing

Towards Reliable Rating Filtering in Grid Reputation Systems: A Pre-Evaluating Set Based Bias-Tuned Approach1 (Abstract)

Xiangli Qu , National University of Defense Technology, China
Chunmei Gui , National University of Defense Technology, China
Xuejun Yang , National University of Defense Technology, China
pp. 129-136

A Security-Supportive Middleware Architecture for Pervasive Computing (Abstract)

Dichao Peng , University of North Carolina at Charlotte, USA
Zhaoyu Liu , University of North Carolina at Charlotte, USA
pp. 137-144

Self-Adaptive Pervasive Computing Application Based on Code Mobility (Abstract)

Shensheng Zhang , Shanghai Jiaotong University, P.R. China
Yong Zhang , Shanghai Jiaotong University, P.R. China
Songqiao Han , Shanghai Jiaotong University, P.R. China
pp. 145-154
Session 6: Network Security

A Dynamic Countermeasure Method for Large-Scale Network Attacks (Abstract)

Roopesh Uppala , University of North Carolina at Charlotte, USA
Zhaoyu Liu , University of North Carolina at Charlotte, USA
pp. 163-170

A Solution to Single Point of Failure Using Voter Replication and Disagreement Detection (Abstract)

N. Farazmand , Sharif University of Technology, Iran
A. Patooghy , Sharif University of Technology, Iran
M. Fazeli , Sharif University of Technology, Iran
S. Gh. Miremadi , Sharif University of Technology, Iran
A. Javadtalab , Sharif University of Technology, Iran
pp. 171-176

Runtime Security Verification for Itinerary-Driven Mobile Agents (Abstract)

Shiyong Lu , Wayne State University, USA
Zijiang Yang , Western Michigan University, USA
Ping Yang , Binghamton University, USA
pp. 177-186
Session 7: Self-Adaptation and Scheduling

A Satisficing MOMIP Framework for Reliable Real-time Application Scheduling (Abstract)

Ulrich Killat , Hamburg University of Technology, Germany
Thanikesavan Sivanthi , Hamburg University of Technology, Germany
pp. 187-194

Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based Datacenters (Abstract)

Sandeep. K. S. Gupta , Arizona State University, USA
Daniel Stanzione , Arizona State University, USA
Qinghui Tang , Arizona State University, USA
Phil Cayton , Intel Corporation, USA
pp. 195-202

SmartC: A Component-Based Hierarchical Modeling Language for Automotive Electronics (Abstract)

Guoqing Yang , Zhejiang University, P.R. China
Hong Li , Zhejiang University, P.R. China
Zhaohui Wu , Zhejiang University, P.R. China
pp. 203-210
Session 8: Autonomous Intrusion Detection

A Self-Tuning Multicast Flow Control Scheme Based on Autonomic Technology (Abstract)

Laurence T. Yang , St. Francis Xavier University, Canada
Yan Yang , Japan Advanced Institute of Science and Technology, Japan
N. Xiong , Wuhan University, PR.China
Yanxiang He , Japan Advanced Institute of Science and Technology, Japan
Chao Peng , Japan Advanced Institute of Science and Technology, Japan
pp. 219-226
Session 9: Autonomy in Sensor Networks

Performance Evaluation of Adjusted Probabilistic Broadcasting in MANETs (Abstract)

L. M. Mackenzie , University of Glasgow, UK
M. Masadeh Bani Yassein , University of Glasgow, UK
M. Ould Khaoua , University of Glasgow, UK
S. Papanastasiou , University of Glasgow, UK
pp. 245-249

Infrastructure Communication Reliability of Wireless Sensor Networks (Abstract)

Akhilesh Shrestha , University of Massachusetts Dartmouth, USA
Liudong Xing , University of Massachusetts Dartmouth, USA
Hong Liu , University of Massachusetts Dartmouth, USA
pp. 250-257

Autonomic Sensor Networks: A New Paradigm for Collaborative Information Processing (Abstract)

Xiaolin Li , Oklahoma State University, USA
Hui Kang , Oklahoma State University, USA
Patrick J. Moran , AirSprite Technologies, Inc., USA
pp. 258-268
Session 10: Automated Trust Management

Architecture of Trustworthy Networks (Abstract)

Chuang Lin , Tsinghua University, China
Xue-hai Peng , Tsinghua University, China
pp. 269-276

DRBTS: Distributed Reputation-based Beacon Trust System (Abstract)

Avinash Srinivasan , Florida Atlantic University, USA
Jie Wu , Florida Atlantic University, USA
Joshua Teitelbaum , Florida Atlantic University, USA
pp. 277-283

Trusted Mobile Interaction via Extended Digital Certificates (Abstract)

Robert Steele , University of Technology, Sydney, Australia
Will Tao , University of Technology, Sydney, Australia
pp. 284-292
Session 11: Access Control

Aclamate: An AOSD Security Framework for Access Control (Abstract)

Tzilla Elrad , Illinois Institute of Technology, USA
Andrew Prunicki , Illinois Institute of Technology, USA
pp. 293-300

Composing Access Control Policies of Distributed Components (Abstract)

Omkar J. Tilak , Purdue University Indianapolis, USA
Xukai Zou , Purdue University Indianapolis, USA
Rajeev R. Raje , Purdue University Indianapolis, USA
pp. 301-307

PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network (Abstract)

Yibo Xue , Tsinghua University, P.R.China
Junda Liu , Tsinghua University, P.R.China
Lin Ning , Tsinghua University, P.R.China
Dongsheng Wang , Tsinghua University, P.R.China
pp. 308-314

An Algorithm for Privacy-Preserving Quantitative Association Rules Mining (Abstract)

Liusheng Huang , University of Science and Technology of China
Yifei Yao , University of Science and Technology of China
Yonglong Luo , University of Science and Technology of China
Weiwei Jing , University of Science and Technology of China
Weijiang Xu , University of Science and Technology of China
pp. 315-324
Session 12: Autonomic Computing and Context Awareness

Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems (Abstract)

Chuchang Liu , Defence Science and Technology Organisation, Australia
Guido Governatori , The University of Queensland, Australia
Mehmet A. Orgun , Macquarie University, Australia
Ji Ma , Macquarie University, Australia
pp. 325-332

Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring (Abstract)

Samik Basu , Iowa State University, USA
Robyn R. Lutz , Iowa State University, USA
Natalia Stakhanova , Iowa State University, USA
Johnny Wong , Iowa State University, USA
pp. 333-340

Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services (Abstract)

Chiping Tang , Michigan State University, USA
Jonathan K. Shapiro , Michigan State University, USA
Farshad A. Samimi , Michigan State University, USA
Philip K. McKinley , Michigan State University, USA
pp. 341-348
Author Index

Author Index (PDF)

pp. 349-350
90 ms
(Ver )