Conceptual Models for Assessment & Assurance of Dependability, Security and Privacy in the Eternal CONNECTed World
暂无分享,去创建一个
Valérie Issarny | Silvano Chiaradonna | Felicita Di Giandomenico | Antinisca Di Marco | Mark Rouncefield | Fabio Martinelli | Ilaria Matteucci | Antonia Bertolino | Marta Kwiatkowska | Gabriele Costa | Hongyang Qu | François Taïani | Romina Spalazzese | Paul Grace | Rachid Saadi | Paolo Masci | Antonino Sabetta | François Taïani | F. Martinelli | M. Rouncefield | A. Bertolino | F. Giandomenico | I. Matteucci | V. Issarny | A. Marco | M. Kwiatkowska | Gabriele Costa | S. Chiaradonna | P. Grace | Hongyang Qu | Romina Spalazzese | A. Sabetta | P. Masci | R. Saadi
[1] Henrik Ejersbo Jensen,et al. Reachability Analysis of Probabilistic Systems by Successive Refinements , 2001, PAPM-PROBMIV.
[2] Alessio Lomuscio,et al. MCMAS: A Model Checker for the Verification of Multi-Agent Systems , 2009, CAV.
[3] Amjad Nusayr. AOP as a formal framework for runtime monitoring , 2008, FSEDS '08.
[4] Ilaria Matteucci,et al. Enforcing private policy via security-by-Contract , 2010 .
[5] Kyung-Goo Doh,et al. Trust Type Based Semantic Web Services Assessment and Selection , 2008, 2008 10th International Conference on Advanced Communication Technology.
[6] Oscar Naim,et al. Invasiveness of Performance Instrumentation Measurements on Mulitprocessors , 1994, Applications in Parallel and Distributed Computing.
[7] Gianfranco Ciardo,et al. A Characterization of the Stochastic Process Underlying a Stochastic Petri Net , 1994, IEEE Trans. Software Eng..
[8] Standard Glossary of Software Engineering Terminology , 1990 .
[9] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[10] Brian Randell,et al. Facing up to Faults , 2000 .
[11] Richard J. Moore. Dynamic Probes and Generalised Kernel Hooks Interface for Linux , 2000, Annual Linux Showcase & Conference.
[12] Gianfranco Balbo,et al. Introduction to Stochastic Petri Nets , 2002, European Educational Forum: School on Formal Methods and Performance Analysis.
[13] Andrea Bondavalli,et al. Quantitative Evaluation of Distributed Algorithms Using the Neko Framework: The NekoStat Extension , 2005, LADC.
[14] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[15] Marta Z. Kwiatkowska,et al. Stochastic Model Checking , 2007, SFM.
[16] William J. Stewart,et al. Introduction to the numerical solution of Markov Chains , 1994 .
[17] Andrea Bondavalli,et al. Model-Based Evaluation as a Support to the Design of Dependable Systems , 2005 .
[18] Silvano Chiaradonna,et al. Dependability Analysis of Diffusion Protocols in Wireless Networks with Heterogeneous Node Capabilities , 2010, 2010 European Dependable Computing Conference.
[19] Valérie Issarny,et al. Towards a formalization of mediating connectors for on the fly interoperability , 2009, 2009 Joint Working IEEE/IFIP Conference on Software Architecture & European Conference on Software Architecture.
[20] Miklós Telek,et al. Non-Exponential Stochastic Petri Nets: an Overview of Methods and Techniques , 1997 .
[21] Lea Viljanen,et al. Towards an Ontology of Trust , 2005, TrustBus.
[22] J. Golbeck,et al. FilmTrust: movie recommendations using trust in web-based social networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[23] T. W. Anderson,et al. Resilient Computing Systems , 1987 .
[24] Fabio Massacci,et al. Extending Security-by-Contract with Quantitative Trust on Mobile Devices , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[25] Wojciech Penczek,et al. LDYIS: a Framework for Model Checking Security Protocols , 2008, Fundam. Informaticae.
[26] T. Anderson,et al. Resilient computing systems: vol. 1 , 1986 .
[27] Audun Jøsang,et al. Semantic Constraints for Trust Transitivity , 2005, APCCM.
[28] Kishor S. Trivedi,et al. Recent Developments in Non-Markovian Stochastic Petri Nets , 1998, J. Circuits Syst. Comput..
[29] Fabio Martinelli,et al. A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS , 2007, Electron. Notes Theor. Comput. Sci..
[30] Daisuke Okabe. Emergent Social Practices, Situations and Relations through Everyday Camera Phone Use , 2004 .
[31] Jason Gait,et al. A probe effect in concurrent programs , 1986, Softw. Pract. Exp..
[32] N. Luhmann. Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .
[33] C. Pasareanu,et al. Assume-guarantee testing , 2006, SAVCBS '05.
[34] Marta Z. Kwiatkowska,et al. Probabilistic symbolic model checking with PRISM: a hybrid approach , 2004, International Journal on Software Tools for Technology Transfer.
[35] Morris Sloman,et al. GEM: a generalized event monitoring language for distributed systems , 1997, Distributed Syst. Eng..
[36] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[37] Christoph Lenzen,et al. Tight bounds for clock synchronization , 2010, JACM.
[38] Tom Rodden,et al. Moving out from the control room: ethnography in system design , 1994, CSCW '94.
[39] Alessio Lomuscio,et al. Towards verifying compliance in agent-based web service compositions , 2008, AAMAS.
[40] B. P. Shah,et al. Analytic solution of stochastic activity networks with exponential and deterministic activities , 1998 .
[41] Toshiaki Yasue,et al. An Empirical Study of Method In-lining for a Java Just-in-Time Compiler , 2002, Java Virtual Machine Research and Technology Symposium.
[42] Jeffrey J. P. Tsai,et al. A noninvasive architecture to monitor real-time distributed systems , 1990, Computer.
[43] Michael Steiner,et al. Malicious- and Accidental-Fault Tolerance for Internet Applications , 2002 .
[44] Alessio Lomuscio,et al. Towards verifying contract regulated service composition , 2008, 2008 IEEE International Conference on Web Services.
[45] Marco Ajmone Marsan,et al. On Petri nets with deterministic and exponentially distributed firing times , 1986, European Workshop on Applications and Theory of Petri Nets.
[46] Arjun K. Gupta,et al. Beta Distribution , 2011, International Encyclopedia of Statistical Science.
[47] Joseph Y. Halpern,et al. Gossip-based ad hoc routing , 2002, IEEE/ACM Transactions on Networking.
[48] Jens Rasmussen,et al. The Definition of Human Error and a Taxonomy for Technical System Design , 1987 .
[49] Fabio Massacci,et al. Enhancing Java ME Security Support with Resource Usage Monitoring , 2008, ERCIM News.
[50] Michael K. Molloy. Performance Analysis Using Stochastic Petri Nets , 1982, IEEE Transactions on Computers.
[51] Cai-Nicolas Ziegler. Investigating Correlations of Trust and Interest Similarity-Do Birds of a Feather Really Flock Together ? , 2005 .
[52] Wouter Joosen,et al. Security-by-contract on the .NET platform , 2008, Inf. Secur. Tech. Rep..
[53] Fabio Martinelli,et al. A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application , 2008, ISoLA.
[54] Sheikh Iqbal Ahamed,et al. An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[55] Timothy W. Finin,et al. In reputation we believe: query processing in mobile ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[56] J. Shaoul. Human Error , 1973, Nature.
[57] Alessio Lomuscio,et al. Verifying Temporal and Epistemic Properties of Web Service Compositions , 2007, ICSOC.
[58] Algirdas Avizienis,et al. Design of fault-tolerant computers , 1967, AFIPS '67 (Fall).
[59] Reinhard German,et al. Non-Markovian Analysis , 2002, European Educational Forum: School on Formal Methods and Performance Analysis.
[60] Christel Baier,et al. On the Logical Characterisation of Performability Properties , 2000, ICALP.
[61] Valérie Issarny,et al. An incentive compatible reputation mechanism for ubiquitous computing environments , 2006, International Journal of Information Security.
[62] Fabio Martinelli,et al. Fine Grained Access Control with Trust and Reputation Management for Globus , 2007, OTM Conferences.
[63] Paola Inverardi,et al. Modeling of application- and middleware-layer interaction protocols , 2010 .
[64] Andrea Bondavalli,et al. A modeling methodology for hierarchical control system and its aplication , 2010, Journal of the Brazilian Computer Society.
[65] Ling Liu,et al. A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.
[66] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[67] Steve Howard,et al. Just what do the youth of today want? Technology appropriation by young people , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[68] Paulo Marques,et al. RAIL: code instrumentation for .NET , 2004, OOPSLA '04.
[69] Terry Williams,et al. Probability and Statistics with Reliability, Queueing and Computer Science Applications , 1983 .
[70] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[71] Christel Baier,et al. Model-Checking Algorithms for Continuous-Time Markov Chains , 2002, IEEE Trans. Software Eng..
[72] A. Batavia,et al. Toward the development of consumer-based criteria for the evaluation of assistive devices. , 1990, Journal of rehabilitation research and development.
[73] Sharma Chakravarthy,et al. Event Specification and Processing for Advanced Applications: Generalization and Formalization , 2007, DEXA.
[74] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[75] Konrad Slind,et al. Monitoring distributed systems , 1987, TOCS.
[76] William H. Sanders,et al. The Mobius modeling tool , 2001, Proceedings 9th International Workshop on Petri Nets and Performance Models.
[77] Lubos Brim,et al. ProbDiVinE-MC: Multi-core LTL Model Checker for Probabilistic Systems , 2008, 2008 Fifth International Conference on Quantitative Evaluation of Systems.
[78] Marta Z. Kwiatkowska,et al. PRISM: probabilistic model checking for performance and reliability analysis , 2009, PERV.
[79] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[80] William H. Sanders,et al. A Unified Approach for Specifying Measures of Performance, Dependability and Performability , 1991 .
[81] Paul Dourish,et al. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena , 2006, Hum. Comput. Interact..
[82] Christof Fetzer,et al. Challenges in Making Pervasive Systems Dependable , 2003, Future Directions in Distributed Computing.
[83] Alex S. Taylor,et al. Age-old practices in the 'new world': a study of gift-giving between teenage mobile phone users , 2002, CHI.
[84] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[85] Nicolas Guelfi,et al. A metadata-based architectural model for dynamically resilient systems , 2007, SAC '07.
[86] Colin J. Fidge. Fundamentals of Distributed System Observation , 1996, IEEE Softw..
[87] Kishor S. Trivedi,et al. Automated Generation and Analysis of Markov Reward Models Using Stochastic Reward Nets , 1993 .
[88] Sharon Paradesi,et al. Integrating Behavioral Trust in Web Service Compositions , 2009, 2009 IEEE International Conference on Web Services.
[89] Abigail Sellen,et al. The ubiquitous camera: an in-depth study of camera phone use , 2005, IEEE Pervasive Computing.
[90] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[91] Andrea Bondavalli,et al. A Decomposition-Based Modeling Framework for Complex Systems , 2009, IEEE Transactions on Reliability.
[92] C. Geertz,et al. The Interpretation of Cultures , 1973 .
[93] William H. Sanders,et al. Dependability Evaluation Using Composed SAN-Based Reward Models , 1992, J. Parallel Distributed Comput..
[94] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[95] Radu Grosu,et al. Software monitoring with bounded overhead , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[96] J-C. Laprie,et al. DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..
[97] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[98] Joost-Pieter Katoen,et al. How Fast and Fat Is Your Probabilistic Model Checker? An Experimental Performance Comparison , 2007, Haifa Verification Conference.
[99] Silvano Chiaradonna,et al. Interdependency Analysis in Electric Power Systems , 2008, CRITIS.
[100] Thomas A. Henzinger,et al. Alternating-time temporal logic , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[101] Ian Sommerville,et al. Designing Dependable Digital Domestic Environments , 2003 .
[102] Fred Kröger,et al. Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.
[103] Gerard Tel,et al. Synchronous, asynchronous, and causally ordered communication , 1996, Distributed Computing.
[104] J. Hughes,et al. Designing with Care: Adapting Cultural Probes to Inform Design in Sensitive Settings , 2003 .
[105] Brendan Gregg,et al. Solaris(TM) Performance and Tools: DTrace and MDB Techniques for Solaris 10 and OpenSolaris (Solaris Series) , 2006 .
[106] Ernesto Damiani,et al. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems: Special Topic Section on Soft Approaches to Information Retrieval and Information Access on the Web , 2006 .
[107] Fabio Massacci,et al. Security-by-Contract (SxC) for Software and Services of Mobile Systems , 2009 .
[108] John F. Meyer,et al. Performability: A Retrospective and Some Pointers to the Future , 1992, Perform. Evaluation.
[109] Bengt Jonsson,et al. A logic for reasoning about time and reliability , 1990, Formal Aspects of Computing.
[110] Alexandre Petrenko,et al. A formal approach to property testing in causally consistent distributed traces , 2006, Formal Aspects of Computing.
[111] Paolo Traverso,et al. At Your Service: Service-Oriented Computing from an EU Perspective , 2009 .
[112] Wei-Tek Tsai,et al. Towards dependable service-orientated computing systems , 2009, Simul. Model. Pract. Theory.
[113] Silvano Chiaradonna,et al. Simulation Models and Implementation of a Simulator for the Performability Analysis of Electric Power Systems Considering Interdependencies , 2007, 10th IEEE High Assurance Systems Engineering Symposium (HASE'07).
[114] Alessio Lomuscio,et al. A Data Symmetry Reduction Technique for Temporal-epistemic Logic , 2009, ATVA.
[115] Masahiro Fujita,et al. Multi-Terminal Binary Decision Diagrams: An Efficient Data Structure for Matrix Representation , 1997, Formal Methods Syst. Des..
[116] Marco Ajmone Marsan,et al. A class of generalized stochastic Petri nets for the performance evaluation of multiprocessor systems , 1984, TOCS.
[117] Kai Hwang,et al. GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks , 2008, IEEE Transactions on Knowledge and Data Engineering.
[118] Thomas Hérault,et al. Distribution, Approximation and Probabilistic Model Checking , 2006, PDMC@ICALP.
[119] Lionel Brunie,et al. T2D: a peer to peer trust management system based on disposition to trust , 2010, SAC '10.
[120] Antonia Bertolino,et al. Scaling up SLA monitoring in pervasive environments , 2007, ESSPE '07.
[121] Alessio Lomuscio,et al. Deontic Interpreted Systems , 2003, Stud Logica.
[122] M. Spezialetti,et al. A general approach to recognizing event occurrences in distributed computations , 1988, [1988] Proceedings. The 8th International Conference on Distributed.
[123] Peng Gao,et al. Formal Verification and Simulation for Performance Analysis for Probabilistic Broadcast Protocols , 2006, ADHOC-NOW.
[124] Lois Ann Scheidt,et al. Bridging the gap: a genre analysis of Weblogs , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[125] Rainer Unland,et al. On the semantics of complex events in active database management systems , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).
[126] Ronald Fagin,et al. Reasoning about knowledge , 1995 .
[127] Andrew Hinton,et al. PRISM: A Tool for Automatic Verification of Probabilistic Systems , 2006, TACAS.
[128] Helen Nissenbaum,et al. Users' conceptions of web security: a comparative study , 2002, CHI Extended Abstracts.
[129] Douglas C. Schmidt,et al. Guest Editor's Introduction: Model-Driven Engineering , 2006, Computer.
[130] Bonnie A. Nardi,et al. Blogging as social activity, or, would you let 900 million people read your diary? , 2004, CSCW.
[131] A. Colman,et al. The complexity of cooperation: Agent-based models of competition and collaboration , 1998, Complex..
[132] Petteri Nurmi,et al. A Bayesian framework for online reputation systems , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).
[133] Marta Z. Kwiatkowska,et al. Analysis of a gossip protocol in PRISM , 2008, PERV.
[134] Robert L. Wears,et al. Resilience Engineering: Concepts and Precepts , 2006, Quality and Safety in Health Care.
[135] Kishor S. Trivedi,et al. Techniques for System Dependability Evaluation , 2000 .
[136] Peter Scheuermann,et al. Active Database Systems , 2008, Wiley Encyclopedia of Computer Science and Engineering.
[137] Joost-Pieter Katoen,et al. The Ins and Outs of the Probabilistic Model Checker MRMC , 2009, 2009 Sixth International Conference on the Quantitative Evaluation of Systems.
[138] Caj Södergård,et al. Mobile television - technology and user experiences: Report on the Mobile-TV project , 2003 .
[139] Paola Inverardi,et al. Deciding Observational Congruence of Finite-State CCS Expressions by Rewriting , 1995, Theor. Comput. Sci..
[140] Budi Arief,et al. Computer security impaired by legitimate users , 2004, Comput. Secur..
[141] Athman Bouguettaya,et al. Reputation Propagation in Composite Services , 2009, 2009 IEEE International Conference on Web Services.
[142] Christian Schaefer,et al. Runtime monitoring for next generation Java ME platform , 2010, Comput. Secur..
[143] Christel Baier,et al. LiQuor: A tool for Qualitative and Quantitative Linear Time analysis of Reactive Systems , 2006, Third International Conference on the Quantitative Evaluation of Systems - (QEST'06).
[144] Fabio Martinelli,et al. Enhancing grid security by fine-grained behavioral control and negotiation-based authorization , 2009, International Journal of Information Security.
[145] Håkan L. S. Younes. Ymer: A Statistical Model Checker , 2005, CAV.
[146] Álvaro Enrique Arenas,et al. Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach , 2008, ServiceWave.
[147] Esko Kurvinen,et al. Only when miss universe snatches me: teasing in MMS messaging , 2003, DPPI '03.
[148] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[149] Boudewijn R. Haverkort,et al. Markovian Models for Performance and Dependability Evaluation , 2002, European Educational Forum: School on Formal Methods and Performance Analysis.
[150] Luciano Baresi,et al. Smart monitors for composed services , 2004, ICSOC '04.
[151] Mikhail Dmitriev. Selective profiling of Java applications using dynamic bytecode instrumentation , 2004, IEEE International Symposium on - ISPASS Performance Analysis of Systems and Software, 2004.
[152] William H. Sanders,et al. Stochastic Activity Networks: Formal Definitions and Concepts , 2002, European Educational Forum: School on Formal Methods and Performance Analysis.
[153] Ali Movaghar,et al. Performability modeling with stochastic activity networks , 1985 .
[154] W. Keith Edwards,et al. Security automation considered harmful? , 2008, NSPW '07.
[155] Vitaly Shmatikov,et al. Analysis of probabilistic contract signing , 2002, J. Comput. Secur..
[156] William W. Gaver,et al. Design: Cultural probes , 1999, INTR.
[157] Mirco Tribastone. The PEPA Plug-in Project , 2007, Fourth International Conference on the Quantitative Evaluation of Systems (QEST 2007).
[158] Christopher J. Alberts,et al. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, Version 1.0 , 1999 .
[159] David E. Culler,et al. The ganglia distributed monitoring system: design, implementation, and experience , 2004, Parallel Comput..
[160] Enrico Macii,et al. Algebraic decision diagrams and their applications , 1993, Proceedings of 1993 International Conference on Computer Aided Design (ICCAD).
[161] Allen D. Malony,et al. A Generic and Configurable Source-Code Instrumentation Component , 2009, ICCS.
[162] Peter R. Pietzuch,et al. A Framework for Event Composition in Distributed Systems , 2003, Middleware.
[163] David Anthony Parker,et al. Implementation of symbolic model checking for probabilistic systems , 2003 .
[164] Giovanna Di Marzo Serugendo,et al. Robustness and Dependability of Self-Organizing Systems - A Safety Engineering Perspective , 2009, SSS.
[165] Paul Dourish,et al. How HCI interprets the probes , 2007, CHI.
[166] Markus Siegle,et al. Recent Extensions to the Stochastic Process Algebra Tool CASPA , 2008, 2008 Fifth International Conference on Quantitative Evaluation of Systems.
[167] Daniel W. Manchala,et al. Trust metrics, models and protocols for electronic commerce transactions , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[168] Jean-Claude Laprie,et al. From Dependability to Resilience , 2008, DSN 2008.
[169] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[170] R. Silverstone. Television And Everyday Life , 1994 .
[171] Athman Bouguettaya,et al. Reputation Bootstrapping for Trust Establishment among Web Services , 2009, IEEE Internet Computing.
[172] Marco Conti,et al. Lessons from an Ad hoc Network Test-Bed: Middleware and Routing Issues , 2005, Ad Hoc Sens. Wirel. Networks.
[173] Jean-Claude Laprie,et al. Dependable computing: concepts, limits, challenges , 1995 .
[174] Allison Druin,et al. Technology probes: inspiring design for and with families , 2003, CHI '03.
[175] Fabio Martinelli,et al. A Fine-Grained and X.509-Based Access Control System for Globus , 2006, OTM Conferences.
[176] Timo Ojala,et al. Mobile kärpät: a case study in wireless personal area networking , 2004, MUM '04.
[177] Shanshan Song,et al. Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.
[178] Andrea Bondavalli,et al. Service-Level Availability Estimation of GPRS , 2003, IEEE Trans. Mob. Comput..