|
|
Meeting Hosts |
Dongseon Kim (University of Canterburry, NZ) |
Program-at-a-Glance and Contents
Workshop on
Dependability and Security
|
Workshop |
Paulo Esteves-Veríssimo (University of Luxembourg) |
|
Paulo Esteves-Veríssimo, Dongseon
Kim, Takashi Nanya |
|
|
09:00
Paulo Verissimo, Dongseon Kim, Takashi Nanya: Introduction to the workshop |
|
|
09:15
Luigi Romano (University of Naples, Italy): Increasing digital security of
health related data on a systemic level |
|
|
09:45 Nick Multari (Pacific Northwest National Laboratory, USA): Asymmetric Cyber Resiliency |
|
|
10:00
Thomas Gross (Newcastle University,
UK): Dependable Research on the Human Dimensions of Cyber Security |
|
11:15
Takashi Nanya
(Tokyo University, Japan): FAQs on Dependability |
|
|
11:30
Roy Maxion (Carnegie Mellon University, USA): An Empirical Approach to Measuring Defense-in-Depth
as a Cloud-Based Service |
|
|
11:45
Marco Vieira (University of Coimbra, Portugal): Perspectives on Dependability
and Security Benchmarking |
|
17:00
Hermann Kopetz (University of Technology, Austria):
Emergent Phenomena in Cyber-Physical Systems-of-Systems |
|
|
17:15
Ian Welch (Victoria University of Wellington, NZ): Scalable Multipath BGP |
|
|
17:30 Haruo Yokota (Tokyo Institute of Technology, Japan): What
can we do to help after a disaster? |
|
09:00
Elmootazbellah N. Elnozahy
(King Abdullah University of Science and Technology, Saudi Arabia): An
Overview of Resilience in MPI 3.0 |
|
|
9:15 William Sanders (Information
Trust Institute, University of
Illinois, USA): Engineering in Cyber Resiliency: A Pragmatic but Not Perfect
Approach |
|
|
09:30 John Rushby
(SRI International, USA): Trustworthy Self-Assembling Systems (trustworthy
architectures) |
|
11:15
Paulo Esteves-Veríssimo (University of Luxembourg, Luxembourg):
Computing and Communications Resilience: the keystone of modern global
applications |
|
|
11:30 Algirdas Avizienis (University Vytautas Magnus, Lithuania): A Resilience Infrastructure
for Cyber-Physical Systems |
|
Session 1 Report/Summary |
|
|
Session 2 Report/Summary |
|
|
Session 3
Report/Summary |
|
|
Session 4
Report/Summary |
|
Algirdas Avizienis (University Vytautas
Magnus, Lithuania): What is an Ontological Fault and why does it exist? |
|
|
Dongseon
Kim (University of Canterburry, NZ): Graphical
Security Models and Their Applications: Research Activities
at UC |
|
|
Gernot Heiser (University of New South
Wales); Security vs
Manufacturers A Losing Battle |
|
|
Yennun
Huang (Research Center for Information Technology Innovation, Academia Sinica, Taiwan): Data Security and Privacy |
|
|
Luigi Romano (University of Naples, Italy):
Competitive Methods to protect local Public Administration from Cyber
security Threats (COMPACT) |
|
|
Rui Oliveira (University of Minho & INESC TEC, Portugal): Safe Cloud,
Project Overview) |
|
|
John Rushby (SRI International, USA): The Indefeasibility
Criterion for Assurance |
|
|
Kishor Trivedi (Duke University, Durham, NC): Research Report |
|
IFIP
Working Group 10.4 business meeting |
|
Names and Contact Information |