Sciweavers

HASE
2008
IEEE
13 years 11 months ago
On the Integrity of Lightweight Checkpoints
This paper proposes a lightweight checkpointing scheme for real-time embedded systems. The goal is to separate concerns by allowing applications to take checkpoints independently ...
Raul Barbosa, Johan Karlsson
HASE
2008
IEEE
13 years 11 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
HASE
2008
IEEE
13 years 11 months ago
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination
For complex services, logging is an integral part of many middleware aspects, especially, transactions and monitoring. In the event of a failure, the log allows us to deduce the c...
Debmalya Biswas, Thomas Gazagnaire, Blaise Genest
HASE
2008
IEEE
13 years 11 months ago
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems
With the increasing complexity in software and electronics in safety-critical systems new challenges to lower the costs and decrease time-to-market, while preserving high assuranc...
Jonas Elmqvist, Simin Nadjm-Tehrani
HASE
2008
IEEE
13 years 11 months ago
Privacy, Preservation and Performance: The 3 P's of Distributed Data Management
Privacy, preservation and performance (“3 P’s”) are central design objectives for distributed data management systems. However, these objectives tend to compete with one ano...
Bobji Mungamuru, Hector Garcia-Molina
HASE
2008
IEEE
13 years 11 months ago
Formalize UML 2 Sequence Diagrams
— UML 1 sequence diagrams have been widely employed for modeling software requirements and design. UML 2 introduced many new features, such as Combined Fragments, to make sequenc...
Hui Shen, Aliya Virani, Jianwei Niu
HASE
2008
IEEE
13 years 11 months ago
A Few Remarks about Formal Development of Secure Systems
—Formal methods provide remarkable tools allowing for high levels of confidence in the correctness of developments. Their use is therefore encouraged, when not required, for the...
Éric Jaeger, Thérèse Hardin
HASE
2008
IEEE
13 years 11 months ago
A Grammar-Based Reverse Engineering Framework for Behavior Verification
A high assurance system requires both functional and nonfunctional correctness before the system is put into operation. To examine whether a system’s actual performance complies...
Chunying Zhao, Kang Zhang
HASE
2008
IEEE
13 years 11 months ago
Transaction Calculus
Jifeng He
HASE
2008
IEEE
13 years 11 months ago
Localizing Program Errors via Slicing and Reasoning
Model-based program debugging exploits discrepancies between the program behavior anticipated by a programmer and the program’s actual behavior when executed on a set of inputs....
Fei Pu, Yan Zhang