Sciweavers

COMPSAC
2009
IEEE
14 years 6 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
COMPSAC
2009
IEEE
14 years 6 months ago
Defending Battery Exhaustion Attacks on Mobile Systems
Battery Exhaustion Attack is a “denial of service” attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the ...
Sungyong Shin, Taek Lee, Hoh Peter In
COMPSAC
2009
IEEE
14 years 6 months ago
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data ful...
Rafael Accorsi
COMPSAC
2009
IEEE
14 years 6 months ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...
COMPSAC
2009
IEEE
14 years 6 months ago
Reliability Modeling for the Advanced Electric Power Grid: A Proposal for Doctoral Research
The advanced electric power grid is a cyber-physical system comprised of physical components such as power generators and transmission lines, and cyber components that control the...
Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin
COMPSAC
2009
IEEE
14 years 6 months ago
Software Input Space Modeling with Constraints among Parameters
—This paper considers the task of software test case generation from a large space of values of input parameters. The purpose of the paper is to create a model of software input ...
Sergiy A. Vilkomir, W. Thomas Swain, Jesse H. Poor...
COMPSAC
2009
IEEE
14 years 6 months ago
System Safety Requirements as Control Structures
Along with the popularity of software-intensive systems, the interactions between system components and between humans and software applications are becoming more and more complex...
Zhe Chen, Gilles Motet
COMPSAC
2009
IEEE
14 years 6 months ago
The Design and Implementation of a Bare PC Email Server
— This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing sta...
George H. Ford Jr., Ramesh K. Karne, Alexander L. ...
COMPSAC
2009
IEEE
14 years 6 months ago
Traceability ReARMed
Jörn David, Maximilian Koegel, Helmut Naughto...