DocumentCode :
1834841
Title :
[Title page i]
fYear :
2008
fDate :
3-5 Dec. 2008
Abstract :
The following topics are dealt with: path sensitive analysis; security flaws; transaction calculus; system test; security goal indicator trees; security inspection; client-server computation model; security risks; network attack datasets; security metrics; intrusion prevention; diskless checkpointing; hypervisor controlled mobile IP; virtual machine live migration; embedded processors; Trojan circuit detection; multithreaded communication protocol; bounded reachability analysis; program error slicing; interaction-based test sequence generation; contract-oriented specifications; string bugs; Spi calculus protocol specifications; Java code; safety-critical time triggered systems; software reliability analysis; layered memory architecture; sensor nodes security; fault-tolerant mobile ad hoc networks; peer-to-peer storage systems; distributed data management; ripple-based context-cognizant service discovery; service-oriented systems; UML2 sequence diagrams; grammar-based reverse engineering; cryptographic protocols; colored Petri nets; and reuse-oriented password authentication.
Keywords :
IP networks; Java; Petri nets; Unified Modeling Language; ad hoc networks; authorisation; checkpointing; client-server systems; cryptographic protocols; data privacy; formal specification; formal verification; invasive software; memory architecture; microprocessor chips; mobile radio; multi-threading; peer-to-peer computing; program debugging; program slicing; program testing; reachability analysis; reverse engineering; safety-critical software; software architecture; software fault tolerance; software metrics; ubiquitous computing; wireless sensor networks; Java code; Spi calculus protocol specifications; Trojan circuit detection; UML2 sequence diagrams; bounded reachability analysis; client-server computation model; colored Petri nets; contract-oriented specifications; cryptographic protocols; diskless checkpointing; distributed data management; embedded processors; fault-tolerant mobile ad hoc networks; grammar-based reverse engineering; hypervisor controlled mobile IP; interaction-based test sequence generation; intrusion prevention; layered memory architecture; multithreaded communication protocol; network attack datasets; path sensitive analysis; peer-to-peer storage systems; program error slicing; reuse-oriented password authentication; ripple-based context-cognizant service discovery; safety-critical time triggered systems; security flaws; security goal indicator trees; security inspection; security metrics; security risks; sensor nodes security; service-oriented systems; software reliability analysis; string bugs; system test; transaction calculus; virtual machine live migration;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
High Assurance Systems Engineering Symposium, 2008. HASE 2008. 11th IEEE
Conference_Location :
Nanjing
ISSN :
1530-2059
Print_ISBN :
978-0-7695-3482-4
Type :
conf
DOI :
10.1109/HASE.2008.1
Filename :
4708849
Link To Document :
بازگشت