ARES 2007:
Vienna,
Austria
 Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria.
 IEEE Computer Society 2007 BibTeX
 
Session 1:
Trust Model & Trust Management
 
- Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell:
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems.
3-10
Electronic Edition (link) BibTeX
 - Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone:
From Trust to Dependability through Risk Analysis.
19-26
Electronic Edition (link) BibTeX
 - Jatinder Singh, Jean Bacon, Ken Moody:
Dynamic trust domains for secure, private, technology-assisted living.
27-34
Electronic Edition (link) BibTeX
 - Ching Lin, Vijay Varadharajan:
A Hybrid Trust Model for Enhancing Security in Distributed Systems.
35-42
Electronic Edition (link) BibTeX
 - Wilfried N. Gansterer, Andreas Janecek, Peter Lechner:
A Reliable Component-Based Architecture for E-Mail Filtering.
43-52
Electronic Edition (link) BibTeX
 
Session 2:
Availability,
Fault-Tolerant & Recovery
 
- Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Goeschka:
Availability and Performance of the Adaptive Voting Replication.
53-60
Electronic Edition (link) BibTeX
 - Marcin Gorawski, Pawel Marks:
Distributed Stream Processing Analysis in High Availability Context.
61-68
Electronic Edition (link) BibTeX
 - Stefan Beyer, Francesc D. Muñoz-Escoí, Pablo Galdámez:
Implementing Network Partition-Aware Fault-Tolerant CORBA Systems.
69-76
Electronic Edition (link) BibTeX
 - Bin Rong, Fred Douglis, Cathy H. Xia, Zhen Liu:
Failure Recovery in Cooperative Data Stream Analysis.
77-84
Electronic Edition (link) BibTeX
 - José Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Bettina Kemme:
A Recovery Protocol for Middleware Replicated Databases Providing GSI.
85-92
Electronic Edition (link) BibTeX
 - Rubén de Juan-Marín, Hendrik Decker, Francesc D. Muñoz-Escoí:
Revisiting Hot Passive Replication.
93-102
Electronic Edition (link) BibTeX
 
Session 3:
Reputation Management & Trust
 
Session 4:
Privacy & Access Control
 
Session 5:
Failure Detection & Attack Prevention
 
Session 6:
Authentication & Authorisation
 
Session 7:
Security Algorithm & Framework
 
Session 8:
Software Security
 
- David Byers, Nahid Shahmehri:
Design of a Process for Software Security.
301-309
Electronic Edition (link) BibTeX
 - Christoph Krauß, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert:
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks.
310-317
Electronic Edition (link) BibTeX
 - Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck:
A secure architecture for the pseudonymization of medical data.
318-324
Electronic Edition (link) BibTeX
 - Thomas Nowey, Hannes Federrath:
Collection of Quantitative Data on Security Incidents.
325-334
Electronic Edition (link) BibTeX
 
Session 9:
Security Models
 
- Suranjith Ariyapperuma, Chris J. Mitchell:
Security vulnerabilities in DNS and DNSSEC.
335-342
Electronic Edition (link) BibTeX
 - David Arsenault, Arun Sood, Yih Huang:
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES).
343-350
Electronic Edition (link) BibTeX
 - Raihan Al-Ekram, Richard C. Holt, Chris Hobbs:
Applying a Tradeoff Model (TOM) to TACT.
351-355
Electronic Edition (link) BibTeX
 - Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Pattern System for Security Requirements Engineering.
356-365
Electronic Edition (link) BibTeX
 - Stefan Durbeck, Rolf Schillinger, Jan Kolter:
Security Requirements for a Semantic Service-oriented Architecture.
366-373
Electronic Edition (link) BibTeX
 - Ludwig Fuchs, Günther Pernul:
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management.
374-384
Electronic Edition (link) BibTeX
 
Session 10:
Miscellaneous Security Techniques
 
- Vidar Evenrud Seeberg, Slobodan Petrovic:
A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking.
385-390
Electronic Edition (link) BibTeX
 - Valentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina:
Static evaluation of Certificate Policies for GRID PKIs interoperability.
391-399
Electronic Edition (link) BibTeX
 - Mansoor Ahmed, Amin Andjomshoaa, Tho Manh Nguyen, A. Min Tjoa:
Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE.
400-407
Electronic Edition (link) BibTeX
 - TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang:
Universally Composable Three-Party Key Distribution.
408-416
Electronic Edition (link) BibTeX
 
Session 11:
eAuction & eVoting Protocol
 
Session 12:
Dependability in Distributed & Ubiquitous Computing
 
Session 13:
Anomaly & Intrusion Detection
 
International Symposium on Frontiers in Availability,
Reliability and Security (FARES)
 
Session 1:
Fault-Tolerant & Availability
 
Session 2:
Access Control
 
Session 3:
Authentication
 
Session 4:
Real-Time System & Sensor Network
 
Session 5:
RFID Techniques & Applications
 
Session 6:
Secure Solution & Applications
 
Session 7:
Security Issue in Business Management
 
Session 8:
Web,
XML,
Content Management
 
Session 9:
Security Policies & Techniques
 
Session 10:
Trust Management & Trust Model
 
Session 11:
Miscellaneous Applications
 
- Mohammad Feroz Raihan, Mohammad Zulkernine:
AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification.
775-782
Electronic Edition (link) BibTeX
 - Niraj Swami, Sheikh Iqbal Ahamed:
Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments.
783-790
Electronic Edition (link) BibTeX
 - Rafael Páez, Cristina Satizábal, Jordi Forné:
A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS.
791-798
Electronic Edition (link) BibTeX
 - C. Mauri, Toni Granollers, A. Solanas:
On the Assessment of the Interaction Quality of Users with Cerebral Palsy.
799-805
Electronic Edition (link) BibTeX
 - Chaobo Yang, Ming Qi:
Research and Design of Mobile Impeachment System with Semi-cryptonym.
806-811
Electronic Edition (link) BibTeX
 - Shu-Ching Wang, Shyi-Ching Liang, Kuo-Qin Yan, Guang-Yan Zheng:
Efficient Malicious Agreement in a Virtual Subnet Network.
812-820
Electronic Edition (link) BibTeX
 
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)
 
- Bhavani M. Thuraisingham, Srinivasan Iyer:
Extended RBAC - Based Design and Implementation for a Secure Data Warehouse.
821-828
Electronic Edition (link) BibTeX
 - Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Application of QVT for the Development of Secure Data Warehouses: A case study.
829-836
Electronic Edition (link) BibTeX
 - Marcin Gorawski, Jakub Bularz:
Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse.
837-844
Electronic Edition (link) BibTeX
 - Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Giuliano Bellone de Grecis, Flaviano Fiorino:
Applying a Flexible Mining Architecture to Intrusion Detection.
845-852
Electronic Edition (link) BibTeX
 - Veselina G. Jecheva, Evgeniya P. Nikolova:
An Application of Learning Problem in Anomaly-based Intrusion Detection Systems.
853-860
Electronic Edition (link) BibTeX
 - Nasrullah Memon, Kim C. Kristoffersen, David L. Hicks, Henrik Legind Larsen:
Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network.
861-870
Electronic Edition (link) BibTeX
 - Lillian Røstad, Øystein Nytrø:
Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges.
871-878
Electronic Edition (link) BibTeX
 - Dalia El-Mansy, Ahmed Sameh:
A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace.
878-885
Electronic Edition (link) BibTeX
 - Calin Ciufudean, Bianca Satco, Constantin Filote:
Reliability Markov Chains for Security Data Transmitter Analysis.
886-894
Electronic Edition (link) BibTeX
 
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)
 
- Melanie Volkamer, Margaret McGaley:
Requirements and Evaluation Procedures for eVoting.
895-902
Electronic Edition (link) BibTeX
 - Orhan Cetinkaya, Deniz Cetinkaya:
Towards Secure E-Elections in Turkey: Requirements and Principles.
903-907
Electronic Edition (link) BibTeX
 - Stefan G. Weber, Roberto Araujo, Johannes Buchmann:
On Coercion-Resistant Electronic Elections with Linear Work.
908-916
Electronic Edition (link) BibTeX
 - Mariagrazia Fugini:
A Security Model and Architecture for Multichannel E-Government Systems.
917-924
Electronic Edition (link) BibTeX
 - Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben:
eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope.
925-933
Electronic Edition (link) BibTeX
 - Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair:
Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies.
934-940
Electronic Edition (link) BibTeX
 - Martijn Warnier, Frances M. T. Brazier, Martin Apistola, Anja Oskamp:
Secure Distributed Dossier Management in the Legal Domain.
941-947
Electronic Edition (link) BibTeX
 - Elsa Estevez, Tomasz Janowski:
Building a Dependable Messaging Infrastructure for Electronic Government.
948-958
Electronic Edition (link) BibTeX
 
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)
 
- Rachid Guerraoui, Michel Raynal:
A Universal Construction for Concurrent Objects.
959-966
Electronic Edition (link) BibTeX
 - Bastian Braun:
FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance.
967-974
Electronic Edition (link) BibTeX
 - Cristian Martín, Mikel Larrea, Ernesto Jiménez:
On the implementation of the Omega failure detector in the crash-recovery failure model.
975-982
Electronic Edition (link) BibTeX
 - Mourad Elhadef, Azzedine Boukerche, Hisham Elkadiki:
Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach.
983-990
Electronic Edition (link) BibTeX
 - Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuven Yagel:
Self-Stabilization as a Foundation for Autonomic Computing.
991-998
Electronic Edition (link) BibTeX
 - Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He:
On Programming Models for Service-Level High Availability.
999-1008
Electronic Edition (link) BibTeX
 
First International Workshop on Secure Software Engineering (SecSE 2007)
 
- Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process.
1009-1017
Electronic Edition (link) BibTeX
 - Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri:
How can the developer benefit from security modeling?
1017-1025
Electronic Edition (link) BibTeX
 - Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien:
AProSec: an Aspect for Programming Secure Web Applications.
1026-1033
Electronic Edition (link) BibTeX
 - Koen Buyens, Bart De Win, Wouter Joosen:
Empirical and statistical analysis of risk analysis-driven techniques for threat management.
1034-1041
Electronic Edition (link) BibTeX
 - Takao Okubo, Hidehiko Tanaka:
Secure Software Development through Coding Conventions and Frameworks.
1042-1051
Electronic Edition (link) BibTeX
 - Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean Smith:
Pastures: Towards Usable Security Policy Engineering.
1052-1059
Electronic Edition (link) BibTeX
 - Kaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala:
Security Objectives within a Security Testing Case Study.
1060-1065
Electronic Edition (link) BibTeX
 - Chengying Mao, Yansheng Lu:
CppTest: A Prototype Tool for Testing C/C++ Programs.
1066-1073
Electronic Edition (link) BibTeX
 - Dragan Vidakovic, Dejan Simic:
A Novel Approach to Building Secure Systems.
1074-1084
Electronic Edition (link) BibTeX
 
Workshop on "Modeling,
Designing,
and Testing Correct,
Secure,
and Dependable Event-Based System" (EBITS 2007)
 
First International Workshop on Advances in Information Security (WAIS 2007)
 
- Alexander Krizhanovsky, Alexander Marasanov:
An Approach for Adaptive Intrusion Prevention Based on The Danger.
1135-1142
Electronic Edition (link) BibTeX
 - Rene Mayrhofer, Martyn Welch:
A Human-Verifiable Authentication Protocol Using Visible Laser Light.
1143-1148
Electronic Edition (link) BibTeX
 - Chik How Tan:
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles.
1148-1154
Electronic Edition (link) BibTeX
 - Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki:
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol.
1155-1159
Electronic Edition (link) BibTeX
 - Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai:
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems.
1160-1166
Electronic Edition (link) BibTeX
 - Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama:
Analysis on Bleichenbacher's Forgery Attack.
1167-1174
Electronic Edition (link) BibTeX
 - Yoshio Kakizaki, Hidekazu Tsuji:
A New Method for Reducing the Revocation Delay in the Attribute Authentication.
1175-1182
Electronic Edition (link) BibTeX
 - Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota:
Efficient Multiparty Computation for Comparator Networks.
1183-1189
Electronic Edition (link) BibTeX
 - Orhan Cetinkaya, Ali Doganaksoy:
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols.
1190-1196
Electronic Edition (link) BibTeX
 - Anders Moen Hagalisletto:
Attacks are Protocols Too.
1197-1206
Electronic Edition (link) BibTeX
 - Luis Zarza, Josep Pegueroles, Miguel Soriano:
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms.
1207-1213
Electronic Edition (link) BibTeX
 - Bogdan Groza, Toma-Leonida Dragomir:
On the use of one-way chain based authentication protocols in secure control systems.
1214-1221
Electronic Edition (link) BibTeX
 - Nenad Stojanovski, Marjan Gusev, Danilo Gligoroski, Svein J. Knapskog:
Bypassing Data Execution Prevention on MicrosoftWindows XP SP2.
1222-1226
Electronic Edition (link) BibTeX
 - Dong Seong Kim, Taek-Hyun Shin, Jong Sou Park:
A Security Framework in RFID Multi-domain System.
1227-1234
Electronic Edition (link) BibTeX
 
Workshop on "Security in E-Learning" (SEL)
 
Copyright © Sat May 16 23:22:20 2009
 by Michael Ley (ley@uni-trier.de)