default search action
SSIRI 2011: Jeju Island, Korea
- Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea. IEEE Computer Society 2011, ISBN 978-0-7695-4453-3
Secure Software Development
- Omar el Ariss, Jianfei Wu, Dianxiang Xu:
Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts. 1-10 - Seok-Won Lee:
Probabilistic Risk Assessment for Security Requirements: A Preliminary Study. 11-20 - Michael Eonsuk Shin, Snehadeep Sethia, Nipul Patel:
Component-Based Malicious Software Engineer Intrusion Detection. 21-30
Verification & Validation
- Selim Ciraci, Hasan Sözer, Mehmet Aksit, Wilke Havinga:
Execution Constraint Verification of Exception Handling on UML Sequence Diagrams. 31-40 - Arjan J. de Roo, Hasan Sözer, Mehmet Aksit:
Runtime Verification of Domain-Specific Models of Physical Characteristics in Control Software. 41-50 - Andy Restrepo, W. Eric Wong:
Validation of SDL-Based Architectural Design Models: New Coverage Criteria. 51-59
Monitoring
- Shih-Chien Chou:
Using Partial Ordered Numbers to Control Information Flows. 60-69 - Changzhi Zhao, Wei Dong, Martin Leucker, Zhichang Qi:
Security Goals Assurance Based on Software Active Monitoring. 70-79 - Ki-Seong Lee, Chan-Gun Lee:
Model-Driven Monitoring of Time-Critical Systems Based on Aspect-Oriented Programming. 80-87
Security Modeling
- Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park, Suntae Kim:
A Feature-Based Modeling Approach for Building Hybrid Access Control Systems. 88-97 - JingZheng Wu, Liping Ding, Yongji Wang, Wei Han:
A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph. 98-107 - Mirco Kuhlmann, Karsten Sohr, Martin Gogolla:
Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL. 108-117
Software Quality Analysis
- HyeonJeong Kim, Doo-Hwan Bae, Vidroha Debroy, W. Eric Wong:
Deriving Data Dependence from/for UML State Machine Diagrams. 118-126 - Jianwen Xiang, Kazuo Yanoo, Yoshiharu Maeno, Kumiko Tadano:
Automatic Synthesis of Static Fault Trees from System Models. 127-136 - Aida Omerovic, Bjørnar Solhaug, Ketil Stølen:
Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study. 137-146
Software Testing
- Mahmuda Asrafi, Huai Liu, Fei-Ching Kuo:
On Testing Effectiveness of Metamorphic Relations: A Case Study. 147-156 - Tugkan Tuglular, Gurcan Gercek:
Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing. 157-164 - Bing-Han Li, Shiuhpyng Shieh:
RELEASE: Generating Exploits Using Loop-Aware Concolic Execution. 165-173
Reliability Improvement
- Ennan Zhai, Liping Ding, Sihan Qing:
Towards a Reliable Spam-Proof Tagging System. 174-181 - Jong-Phil Kim, Jang-Eui Hong:
Dynamic Service Replacement to Improve Composite Service Reliability. 182-188 - Mohammad Hamdaqa, Ladan Tahvildari:
ReLACK: A Reliable VoIP Steganography Approach. 189-197
Safety & Validation
- W. Eric Wong, Andrea Demel, Vidroha Debroy, Michael F. Siok:
Safe Software: Does It Cost More to Develop? 198-207 - Lirong Dai, Yan Bai:
An Organization-Driven Approach for Enterprise Security Development and Management. 208-215 - Flora Amato, Massimo Felici, Paola Lanzi, Giulia Lotti, Luca Save, Alessandra Tedeschi:
Trust Observations in Validation Exercises. 216-223
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.