The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 06 - November/December (vol. 8)
ISSN: 1545-5971
Regular Papers

An Entropy-Based Approach to Detecting Covert Timing Channels (Abstract)

Haining Wang , College of William and Mary, Williamsburg
Steven Gianvecchio , College of William and Mary, Williamsburg
pp. 785-797

A Numerical Method for the Evaluation of the Distribution of Cumulative Reward till Exit of a Subset of Transient States of a Markov Reward Model (Abstract)

Juan A. Carrasco , Universitat Politècnica de Catalunya, Barcelona
Víctor Suñé , Universitat Politècnica de Catalunya, Barcelona
pp. 798-809

Autonomic Trust Management for a Component-Based Software System (Abstract)

Christian Prehofer , Fraunhofer ESK, Munich
Zheng Yan , Nokia Research Center, Helsinki
pp. 810-823

Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes (Abstract)

László Czap , Budapest University of Technology and Economics, Budapest
Levente Buttyán , Budapest University of Technology and Economics, Budapest
István Vajda , Budapest University of Technology and Economics, Budapest
pp. 824-838

Fast Software Rejuvenation of Virtual Machine Monitors (Abstract)

Kenichi Kourai , Kyushu Institute of Technology, Fukuoka
Shigeru Chiba , Tokyo Institute of Technology, Tokyo
pp. 839-851

Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets (Abstract)

Hejiao Huang , Harbin Institute of Technology Shenzhen Graduate School, Shenzhen
Hélène Kirchner , INRIA Bordeaux Sud-Ouest, France, Talence
pp. 852-865

On Reliable Dissemination in Wireless Ad Hoc Networks (Abstract)

Gabriel Kliot , Microsoft Research, Redmond
Vadim Drabkin , Technion - Israel Institute of Technology, Haifa
Roy Friedman , Technion - Israel Institute of Technology, Haifa
Marc Segal , Technion - Israel Institute of Technology, Haifa
pp. 866-882

On the Complexity of Authorization in RBAC under Qualification and Security Constraints (Abstract)

Elisa Bertino , Purdue University, West Lafayette
Mikhail (Mike) J. Atallah , Purdue University, West Lafayette
Ninghui Li , Purdue University, West Lafayette
Qihua Wang , IBM Almaden Research Center, USA
Yuqing Sun , Shandong University, Jinan
pp. 883-897

On the Performance of Secure Vehicular Communication Systems (Abstract)

Giorgio Calandriello , Politecnico di Torino, Torino
Jean-Pierre Hubaux , LCA, IC, EPFL, Lausanne
Panos Papadimitratos , LCA, IC, EPFL, Lausanne
Antonio Lioy , Politecnico di Torino, Torino
pp. 898-912

Probabilistic Model-Driven Recovery in Distributed Systems (Abstract)

Kaustubh R. Joshi , AT&T Labs Research, Florham Park
William H. Sanders , University of Illinois at Urbana-Champaign, Urbana
Richard D. Schlichting , AT&T Labs Research, Florham Park
Matti A. Hiltunen , AT&T Labs Research, Florham Park
pp. 913-928
Short Papers

Fingerprinting RFID Tags (Abstract)

Dale R. Thompson , University of Arkansas, Fayetteville
Senthilkumar Chinnappa Gounder Periaswamy , University of Arkansas, Fayetteville
Jia Di , University of Arkansas, Fayetteville
pp. 938-943
103 ms
(Ver 3.1 (10032016))