Dependable Computing Systems Laboratory
Home Projects Publications Presentations People News Activities About DCSL Internal
 
Reading Group
Socials
 
 

Reading Group on Reliable & Secure System Design
2007 - Fall

 
We will be meeting in MSEE 239 on Wednesdays 5:30 - 7:00 PM.
 
Dates Topic Papers Presenter(s)

Presentation

Aug 22
Goal setting
None Saurabh
See internal page

Aug 29
Sep 05
Sep 12

Relation between availability and consistency

  1. Harvest, Yield, and Scalable Tolerant Systems, HotOS 99 (Fox and Brewer)
  2. The Cost and Limits of Availability for Replicated Services, SOSP 01 (Yu and Vahdat)
Ignacio
Fahad
Presentation 1
Presentation 2

Sep 19
Sep 26
Oct 03
Oct 17
Oct 24

Secure location determination and verification in wireless
networks

  1. SeRLoc: secure range-independent localization for wireless sensor networks, WiSe 04 (Lazos and Poovendran)
  2. Robust location detection in emergency sensor networks, InfoComm 03 (Ray, Ungrangsi, and Pellegrini)
  3. Attack-resistant location estimation in sensor networks, IPSN 05 (Liu, Ning, and Du)
  4. A probabilistic approach to location verification in wireless sensor networks, ICC 06 (Ekici, Mcnair, and Al-Abri)
DongHoon
Matt

Presentation 1
Presentation 2
Presentation 3
Presentation 4

Oct 31
Nov 07

Dependable web services

  1. NIST "Guide to Secure Web Services" (Singhal, Winograd, and Scarfone)
  2. Constructing dependable Web services, IEEE Internet Computing, Jan-Feb 00 (Ingham, Shrivastava, and Panzieri)
Gaspar
Ratsameetip

Presentation 1
Presentation 2

   
 

Reading Group on Reliable & Secure System Design
2007 - Spring

 
We will be meeting in MSEE 239 on Wednesdays 5:30 - 7:00 PM.
 
Dates Topic Papers Presenter(s)

Presentation

Jan 17 Goal setting None Saurabh
See internal page
Jan 24
Jan 31

System Management for Server Farms

  1. Extending a J2EE™ server with dynamic and flexible resource management, Middleware 04 (Jordan, Czajkowski, Kouklinski, and Skinner)
  2. Scaling J2EE Application Servers with the Multi-Tasking Virtual Machine, Software Feb 06 (Jordan, Daynes, Jarzab, Bryce, and Czajkowski)
Gunjan
Ignacio
Presentation
Feb 7
Feb 21
Feb 28

Provably correct reconfiguration of systems

  1. Assured Reconfiguration of Embedded Real-Time Software, DSN 04 (Strunk and Knight)
  2. Using Simplicity to Control Complexity, IEEE Software Jul/Aug 01 (Sha)
Bingrui
Presentation 1
Presentation 2
Feb 28
Mar 7
Mar 20

Intrusion tolerance in asynchronous systems

  1. CODEX: A Robust and Secure Secret Distribution System , TDSC Jan 04 (Marsh and Schneider)
  2. How Resilient are Distributed f Fault/Intrusion Tolerant Systems?, DSN 05 (Sousa, Ferreira Neves, and Verissimo)
Gaspar
Presentation 1
Presentation 2

Mar 27
Apr 3

Information theory applied to network security

  1. Information-Theoretic Measures for Anomaly Detection, Security & Privacy 01 (Lee and Xiang)
  2. Determining the Operational Limits of an Anomaly-Based Intrusion Detector (Tan and Maxion)

Dong-Hoon
Srikanth

Presentation 1
Presentation 2
 
 
Here is the reading group information from other years:
2011

2010

2009

2008

2006

2005
2004
2003
2002
 
 
465 Northwestern Avenue, West Lafayette, IN 47907   |  dcsl@ecn.purdue.edu   |  +1 765 494 3510
Home |  Projects  |  Publications  |  Presentations  |  People
News  |  Activities |  About DCSL  |  Internal


Last Update: August 4, 2011 10:35 by GMHoward