The proceedings contain 32 papers. The special focus in this conference is on Formal Methods, Design for Dependability, security and Dependability of Medical systems. The topics include: Elicitation and validation of ...
ISBN:
(纸本)9783540201267
The proceedings contain 32 papers. The special focus in this conference is on Formal Methods, Design for Dependability, security and Dependability of Medical systems. The topics include: Elicitation and validation of graphical dependability models;visual modeling and verification of distributed reactive systems;automatic timeliness verification of a public mobile network;improving system reliability via model checking;safety lifecycle for developing safety critical artificial neural networks;quantitative reliability estimation of a computer-based motor protection relay using Bayesian networks;a dependability model for domestic systems;modelling and verification of layered security protocols;a constraint framework for the qualitative analysis of dependability goals;software tamper resistance using program certificates;developing high assurance systems: on the role of software tools;a unified tool for performance modelling and prediction;reliable data replication in a wireless medical emergency network;redundancy management for drive-by-wire computersystems;fault-tolerant communication system to improve safety in railway environments;dependable communication synthesis for distributed embedded systems;enhancing software safety by fault trees;on the role of traceability for standards compliance;tools supporting the communication of critical domain knowledge in high-consequence systems development;security policy configuration issues in grid computing environments;dependability and survivability of large complex critical infrastructures;the application of causal analysis techniques for computer-related mishaps;the characteristics of data in data-intensive safety-related systems and using IEC 61508 to guide the investigation of computer-related incidents and accidents.
Voice over IP is one of the most propulsive technologies today. Significant advantages of VoIP over conventional telephone system provide a major incentive for enterprises and service providers to use the new technolo...
详细信息
ISBN:
(纸本)078037763X
Voice over IP is one of the most propulsive technologies today. Significant advantages of VoIP over conventional telephone system provide a major incentive for enterprises and service providers to use the new technology. There is a variety of IP Telephony standards, which provide basic models for implementation of VoIP. However, some significant problems still need to be adequately solved. security, global administration and billing, emergency dialing plans and lawful interception are some of the areas that are being researched. This paper proposes a distributed system for the lawful interception in IP Telephony networks. The proposed system has scalable architecture, it supports various interception methods, and it can be deployed on various network infrastructures. In addition, the system design addresses various issues present in IP networks, for instance: security protocols, network configuration, and standardized data formats. A prototype of the interception system, based on the proposed architecture, has been implemented and tested.
For mission-critical, and safe-critical operations of medical information, financial, or administrative systems, a reliable and robust storage system is indispensable. The main purpose of our research is to develop a ...
详细信息
ISBN:
(纸本)0780381149
For mission-critical, and safe-critical operations of medical information, financial, or administrative systems, a reliable and robust storage system is indispensable. The main purpose of our research is to develop a high-confidential, reliable, and survivable storage system. So far, we've designed agents that provide five basic operations, e.g., store, retrieve, update, refer and delete. In this paper, we propose an automatic repair mechanism for this system. This repair mechanism makes the storage system more reliable. We will report an implementation of this autonomous distributed storage system, and evaluate the behavior of agents for basic operations and automatic repair mechanism by computational simulation.
Ad-Hoc networks unlike conventional networks consist of only mobile nodes and have no support infrastructure such as base stations as mobile switching. There exist serious security problems in these Ad-Hoc networks du...
详细信息
ISBN:
(纸本)088986392X
Ad-Hoc networks unlike conventional networks consist of only mobile nodes and have no support infrastructure such as base stations as mobile switching. There exist serious security problems in these Ad-Hoc networks due to the mobility of nodes. Unfortunately, there are still not many proper protocols for these problems. To provide secure routing in Ad-Hoc networks, it is essential to authenticate each node. Therefore, this paper proposes a token-based secure routing protocol in which each node should have a token in order to participate in the network operations for secure Ad-Hoc routing. The proposed protocol authenticates nodes with token, hash function, and digital signature so that it can provide safety to set up a routing path.
In the resent years, the term mobile agent is probably one of the most overused words in many applicable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very differ...
详细信息
ISBN:
(纸本)1932415165
In the resent years, the term mobile agent is probably one of the most overused words in many applicable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very different meanings in the area of artificial intelligence, network management, or distributedsystems. However, the use of mobile agent adds significant problems, primarily in the area of EC/EDI. As the use of internet has grown rapidly, the advances of the computer networking are extending the vision of on-line control beyond the walls of the single plant or even the individual firm. Electronic Data Interchange (EDI) is making many firms more comfortable with online interactions that cross company boundaries. The use of web browsers as a Common Gateway Interface(CGI) for a wide range of applications, and the ability of Java to support common programs across multiple distributed platforms, provide a common computational platform that can span a wide geographic range. Adding the mobile agents into the EC/EDI makes innovative approach to structure distributed applications. Therefore it is very important to control the roaming agents to keep one's privacy or property in distributed open networks. The surge in secure intranets for commercial applications provides a robust, secure environment to which trading partners can increasingly entrust their interactions to some mobile agents. In this paper, we introduce a mechanism to protect mobile agent itself from the malicious server he is visiting and also we introduce a mechanism to protect vital resources of the open systems as internet.
In this paper three different Service Discovery approaches based on centralized and distributed registries within so called Virtual Organizations are assessed. The first approach is a centralized model, the second a c...
详细信息
ISBN:
(纸本)088986392X
In this paper three different Service Discovery approaches based on centralized and distributed registries within so called Virtual Organizations are assessed. The first approach is a centralized model, the second a completely decentralized and the third is a hybrid of both models. The Grid environment is typically comprised of heterogeneous resources over wide-area networks, It addresses all distributed computing issues, especially the problem of service discovery. The benefits and drawbacks of all three models are discussed and a comparison regarding issues such as administration, management, scalability and security is followed. Furthermore, measurements are executed in order to investigate the performance of all three models, and a reliability analysis is conducted.
Embedded control applications such as drive-by-wire in cars require dependable interaction between various sensors, processors, and actuators. This paper addresses the design of low-cost communication networks guarant...
详细信息
ISBN:
(纸本)3540201262
Embedded control applications such as drive-by-wire in cars require dependable interaction between various sensors, processors, and actuators. This paper addresses the design of low-cost communication networks guaranteeing to meet both the performance and fault-tolerance requirements of such distributed applications. We develop a fault-tolerant allocation and scheduling method which maps messages on to a minimum-cost multiple-bus system to ensure predictable inter-processor communication. The proposed method targets time-division multiple access (TDMA) communication protocols, and is applicable to protocols such as FlexRay and TTP which have recently emerged as networking standards for embedded systems such as automobile controllers. Finally, we present a case study involving some advanced automotive control applications to show that our approach uses the available network bandwidth efficiently to achieve jitter-free message transmission.
With the advent and explosive growth of the global Internet, attacks including distributed denial of service (DDoS) attacks are becoming more popular and sophisticated. Most security works, however, have just focused ...
详细信息
ISBN:
(纸本)1932415165
With the advent and explosive growth of the global Internet, attacks including distributed denial of service (DDoS) attacks are becoming more popular and sophisticated. Most security works, however, have just focused on monitoring and protecting only organizational local networks. Attackers can be anywhere on the Internet and deploy collaborating agents to attack any site on the network so that it is becoming more difficult to respond against attacks just only site basis. We have recognized the need for an integrated network-wide defense framework (INwDF) which makes collaborative defenses and network-wide responses. In this paper we present and demonstrate the INwDF that facilitates network-wide intrusion detection and responses in large networks. We also present how to enforce response policies at the network ingress points using the hash-based auditing technique. Finally we show an early warning feature against the spoofed DDoS attacks on the INwDF.
The goal of our research is to develop a methodology for distributed control where the control activity is governed by a concurrent program that has "artificially intelligent" features. The test bed for this...
详细信息
The goal of our research is to develop a methodology for distributed control where the control activity is governed by a concurrent program that has "artificially intelligent" features. The test bed for this system is a computer-controlled model railroad. A high-level Petri net that incorporates the attributes of neural networks, timing, and Petri net color is used to model the system. A multi-threaded simulator provides the means to test centralized, partially distributed, and fully distributed control paradigms. This paper presents the model, the functionality, the development, and the features of the simulation software.
Enterprise security must take into account a holistic view of the network. Capturing security and vulnerability attributes of network services and systems is a critical aspect of effective vulnerability analysis and r...
详细信息
ISBN:
(纸本)1402075413
Enterprise security must take into account a holistic view of the network. Capturing security and vulnerability attributes of network services and systems is a critical aspect of effective vulnerability analysis and remediation. Unfortunately, this is not always possible due to the overhead associated with tracking distributed resources. Conventional tools create topological maps of a network and extract a signature of the state of individual components. However, these tools require human interpretation to be useful for security. The goal of network modeling for vulnerability analysis is to glean and interpret data from a variety of resources in order to create an abstract model of the security of a network. A sound network model is essential to the analysis of potential threats to a network.
暂无评论