Dependability and security models

KS Trivedi, DS Kim, A Roy… - 2009 7th International …, 2009 - ieeexplore.ieee.org
There is a need to quantify system properties methodically. Dependability and security
models have evolved nearly independently. Therefore, it is crucial to develop a classification …

[HTML][HTML] Quantitative security evaluation for software system from vulnerability database

H Okamura, M Tokuzane, T Dohi - 2013 - scirp.org
This paper proposes a quantitative security evaluation for software system from the
vulnerability data consisting of discovery date, solution date and exploit publish date based …

Availability analysis of an intrusion tolerant distributed server system with preventive maintenance

T Uemura, T Dohi, N Kaio - IEEE Transactions on Reliability, 2010 - ieeexplore.ieee.org
We consider availability models of an intrusion tolerant system, and investigate quantitative
effects of preventive maintenance based on security patch releases. The stochastic behavior …

A semi-markov survivability evaluation model for intrusion tolerant database systems

AH Wang, S Yan, P Liu - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
Survivability modeling and evaluation have gained increasing importance. Most existing
models assume that the distributions for transitions between states are exponential …

Quantitative evaluation of intrusion tolerant systems subject to DoS attacks via semi-Markov cost models

T Uemura, T Dohi - Emerging Directions in Embedded and Ubiquitous …, 2007 - Springer
In this paper we quantitatively evaluate the security of intrusion tolerant systems with
preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we …

[PDF][PDF] 入侵容忍实时数据库的半马尔可夫生存能力评价模型

陈长清, 裴小兵, 周恒, 刘云生 - 计算机学报, 2011 - cjc.ict.ac.cn
摘要针对事务和数据的实时特性, 给出了具有入侵容忍能力的实时数据库系统的体系架构.
基于实时性的要求和入侵检测存在的延迟, 提出了半马尔可夫评价模型, 对实时数据库在入侵 …

Indoor RSSI trilateral algorithm considering piecewise and space-scene

Y Shi, Y Long, F Lu, Z Xu, X Xiao… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Indoor positioning methods based on RSSI-distance mapping were mass used for less
surveying or mapping preparations or seldom additional devices, while the bottleneck is …

Diagrams for software synthesis

R Jullig, Y Srinivas - Proceedings of 8th Knowledge-Based …, 1993 - ieeexplore.ieee.org
The authors describe the formal environment at Kesteral for synthesizing programs. The
authors show that straightforward formalization, persistently applied at all levels of system …

Security evaluation for software system with vulnerability life cycle and user profiles

H Okamura, M Tokuzane, T Dohi - 2012 Workshop on …, 2012 - ieeexplore.ieee.org
This paper proposes the definition of a security criterion and security assessment based on
the criterion. More precisely, we present a stochastic model with a vulnerability life-cycle …

Availability analysis of a scalable intrusion tolerant architecture with two detection modes

T Uemura, T Dohi, N Kaio - … , CloudCom 2009, Beijing, China, December 1 …, 2009 - Springer
In this paper we consider a discrete-time availability model of an intrusion tolerant system
with two detection modes; automatic detection mode and manual detection mode. The …