


default search action
SSIRI 2009: Shanghai, China
- Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3758-0

Keynotes
- Jifeng He:

Probabilistic Programming With Coordination and Compensation. 1 - Bhavani Thuraisingham:

Security Engineering: Developments and Directions. 2-3 - Jeff Offutt:

Automatic Test Data Generation : Who, When and Where ?. 4 - Frances Paulisch:

Reliability for Software-Based Systems. 5 - Rudolf Siebenhofer:

Complexity - Interoperability - Deployment of Software. 6
Compositionality
- Xinhuai Tang, Sizhe Sun, Xiaozhou Yuan, Delai Chen:

Automated Web Service Composition System on Enterprise Service Bus. 9-13 - Hichem Boudali, Hasan Sözer, Mariëlle Stoelinga

:
Architectural Availability Analysis of Software Decomposition for Local Recovery. 14-22 - David A. Cape, Bruce M. McMillin

, Benjamin W. Passer, Mayur Thakur:
Recursive Decomposition of Progress Graphs. 23-31
Runtime Systems
- Chao Xu, Jinghui Gu, Ling Lin, Alei Liang, Haibing Guan:

CacheBit: A Multisource-Multitarget Cache Instrumentation Tool. 35-39 - Fuyuan Zhang, Zhengwei Qi, Haibing Guan, Xuezheng Liu, Mao Yang, Zheng Zhang:

FiLM: A Runtime Monitoring Tool for Distributed Systems. 40-46 - Pradeep Varma, Vijay K. Naik:

Scheduling and Controlling Semantics for Distributed Resource Based Computing Engines. 47-56
Vulnerability Detection and Defense
- Qiang Zhang, Yuan Luo, Chuliang Weng, Minglu Li:

A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems. 59-64 - JeeHyun Hwang, Tao Xie, Vincent C. Hu

:
Detection of Multiple-Duty-Related Security Leakage in Access Control Policies. 65-74 - Jin-Cherng Lin, Jan-Min Chen, Chou-Chuan Chen, Yu-Shu Chien:

A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense. 75-81
Aspect-Oriented Programming
- Jia Lv, Jing Ying, Minghui Wu, Tao Jiang, Fanwei Zhu:

Verifying Aspect-Oriented Programs Using Open Temporal Logic. 85-92 - Pradeep Varma:

Anchored Text for Software Weaving and Merging. 93-100 - Kun Tian, Kendra M. L. Cooper, Kang Zhang, Huiqun Yu:

A Classification of Aspect Composition Problems. 101-109
Verification
- Chunying Zhao, Kang Zhang, Jie Hao, W. Eric Wong:

Visualizing Multiple Program Executions to Assist Behavior Verification. 113-122 - Yong Li, Yu Zhang, Yiyun Chen, Ming Fu:

On the Verification of Strong Atomicity in Programs Using STM. 123-131 - Conghua Zhou, Li Chen, Shiguang Ju, Zhifeng Liu:

State Space Reduction for Verifying Noninterference. 132-138
Security Requirements
- Jing Du, Ye Yang, Qing Wang:

An Analysis for Understanding Software Security Requirement Methodologies. 141-149 - Hédi Hamdi, Mohamed Mosbah

:
A DSL Framework for Policy-Based Security of Distributed Systems. 150-158 - Ju An Wang, Minzhe Guo, Hao Wang, Min Xia, Linfeng Zhou:

Environmental Metrics for Software Security Based on a Vulnerability Ontology. 159-168
Testing
- Heejin Kim, Byoungju Choi, W. Eric Wong:

Performance Testing of Mobile Applications at the Unit Test Level. 171-180 - Lijun Lun, Xuemei Ding:

Analyzing Relation between Software Architecture Testing Criteria on Test Sequences. 181-186 - Madhu Kilari, Qiyu Huang

, Tongdan Jin:
Six-Sigma Based Performance Verification in Early Development of Automatic Test Equipment. 187-192 - Fevzi Belli, Axel Hollmann, Markus Kleinselbeck:

A Graph-Model-Based Testing Method Compared with the Classification Tree Method for Test Case Generation. 193-200
Modeling, Analysis, and Forensics
- Chunxiang Xu, Hanpin Wang, Wanling Qu, Meixia Zhu, Yu Huang:

A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics. 203-211 - Chin-Yu Huang, Tsui-Ying Hung, Chao-Jung Hsu:

Software Reliability Prediction and Analysis Using Queueing Models with Multiple Change-Points. 212-221 - Lingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang, Yu Liu:

ReconBin: Reconstructing Binary File from Execution for Software Analysis. 222-229 - Ryan Q. Hankins, Tetsutaro Uehara

, Jigang Liu:
A Comparative Study of Forensic Science and Computer Forensics. 230-239
Security
- Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin:

Provable Secure AKA Scheme with Reliable Key Delegation in UMTS. 243-252 - Ching-Fan Lee, Justie Su-tzu Juan

:
An Efficient and Secure Multi-secret Image Sharing Scheme with General Access Structure. 253-259 - Ming-Jheng Li, Ying-Hsuan Chang, Justie Su-tzu Juan

:
Efficient Multi-secret Sharing Scheme Using Room Square. 260-266
Short Papers I
- Pejman Salehi, Ferhat Khendek

, Maria Toeroe, Abdelwahab Hamou-Lhadj
, Abdelouahed Gherbi
:
Checking Service Instance Protection for AMF Configurations. 269-274 - Lirong Dai:

Security Variability Design and Analysis in an Aspect Oriented Software Architecture. 275-280 - Ying Jiang, Ying-Na Li, Shan-Shan Hou, Lu Zhang:

Test-Data Generation for Web Services Based on Contract Mutation. 281-286
Fast Abstracts
- Ryan Q. Hankins, Tetsutaro Uehara

, Jigang Liu:
A Turing Machine-Based Model for Computer Forensic Reconstruction. 289-290 - Hae-Min Moon, Sung Bum Pan:

Implementation of the Privacy Protection in Video Surveillance System. 291-292 - Michael Jiang, Yaping Liu, Xinzheng Gu:

An Approach to Improving Reliability for Distributed Video-Based Monitoring Systems. 293-294
Student Doctoral Program I
- Xiaolong Deng, Bai Wang, Bin Wu, Shengqi Yang:

Research and Evaluation on Modularity Modeling in Community Detecting of Complex Network Based on Information Entropy. 297-302 - Haibo Yu, Tsunenori Mine, Makoto Amamiya:

Semantic ACP2P Information Retrieval Method. 303-308 - David Kammler, Junqing Guan, Gerd Ascheid, Rainer Leupers, Heinrich Meyr:

A Fast and Flexible Platform for Fault Injection and Evaluation in Verilog-Based Simulations. 309-314
Panel
- Rajesh Subramanyan:

Panel Description: Evolving Software Models for Global Organizations. 317 - Mao Boying:

Position Statement: Evolving Software Models for Global Organizations. 318-319 - Uttiya Basu:

Position Statement: Evolving Software Models for Global Organizations. 320
T4CIA Workshop I
- Jun Pang, Bao Tang:

Message from T4CIA Workshop Co-chairs. 323 - Rudolf Siebenhofer:

Systematic Cooperation between Industry and Universities . 324 - Qin Liu, Wenqiang Zheng, JunFei Ma:

Improving Test Quality by a Test Type Analysis Based Method. 325-328 - Lili Diao, Hao Wang:

A Safe Approach to Shrink Email Sample Set while Keeping Balance between Spam and Normal. 329-334
Short Papers II
- Hong Sun

, Vincenzo De Florio
, Ning Gui, Raf Hens, Bert Vankeirsbilck
, Bart Dhoedt, Chris Blondia:
Adaptation Strategies for Performance Failure Avoindance. 337-341 - Johannes Loinig, Christian Steger

, Reinhold Weiss, Ernst Haselsteiner:
Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field Locality. 342-347 - Matthias Schnelte:

Generating Test Cases for Timed Systems from Controlled Natural Language Specifications. 348-353
Workshop II
- Prasad Bokil, Priyanka Darke, Ulka Shrotri, R. Venkatesh:

Automatic Test Data Generation for C Programs. 359-368 - Yingxin Ren, Qing Gu, Jingxian Qi, Daoxu Chen:

Reliability Prediction of Web Service Composition Based on DTMC. 369-375 - Bao Tang:

Panel: Increase Industry and Academy Cooperation in Testing Technologies and Tools for Critical Industry Applications. 376
MVV Workshop
- Alessandro Basso, Alexander Bolotov, Vladimir Getov

:
Temporal Specification and Deductive Verification of a Distributed Component Model and Its Environment. 379-386 - Fevzi Belli, Axel Hollmann, Sascha Padberg:

Communication Sequence Graphs for Mutation-Oriented Integration Testing. 387-392 - Tugkan Tuglular

, Özgür Kaya, Can Arda Muftuoglu, Fevzi Belli:
Directed Acyclic Graph Modeling of Security Policies for Firewall Testing. 393-398
Short Papers III
- Anmin Xie, Guodong Chen, Yonggang Wang, Zhong Chen, Jian-bin Hu:

A New Method to Generate Attack Graphs. 401-406 - Sathish Pinagapani, Dianxiang Xu, Jun Kong:

A Comparative Study of Access Control Languages. 407-412 - Sung-Jin Lim, Hae-Min Moon, Seung-Hoon Chae

, Yongwha Chung, Sung Bum Pan:
JPEG 2000 and Digital Watermarking Technique Using in Medical Image. 413-416 - Binbin Qu, Yin Huang, Xiaodong Xie, Yansheng Lu:

A Developed Dynamic Environment Fault Injection Tool for Component Security Testing. 417-422
Student Doctoral Program II
- Marcin Barylski, Henryk Krawczyk:

Multidimensional Approach to Quality Analysis of IPSec and HTTPS Applications. 425-430 - Naganathan E. R, Eugene X. P:

Software Stability Model (SSM) for Building Reliable Real Time Computing Systems. 431-435 - Xucheng Tang, Beijun Shen:

Extending Model Driven Architecture with Software Security Assessment. 436-441
Fast Abstracts II
- Jueliang Hu, Zuohua Ding, Geguang Pu:

Path-Based Approach to Integration Testing. 445-446 - Aida Omerovic, Ketil Stølen:

Simplifying Parametrization of Bayesian Networks in Prediction of System Quality. 447-448 - Zuohua Ding, Mingyue Jiang:

Reliability Computing for Service Composition. 449-450 - Ajit Srividya, Kovur Krishna Mohan, Ajit Kumar Verma:

Improvement of QoS in Process Centric Software Development Using ANP. 451-452

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














