ARES 2008:
Barcelona ,
Spaina
Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain.
IEEE Computer Society 2008 BibTeX
- Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli:
Securing Telehealth Applications in a Web-Based e-Health Portal.
3-9
Electronic Edition (link) BibTeX
- Andreas Janecek, Wilfried N. Gansterer, K. Ashwin Kumar:
Multi-Level Reputation-Based Greylisting.
10-17
Electronic Edition (link) BibTeX
- Kim Wuyts, Riccardo Scandariato, Geert Claeys, Wouter Joosen:
Hardening XDS-Based Architectures.
18-25
Electronic Edition (link) BibTeX
- Svein Yngvar Willassen:
Finding Evidence of Antedating in Digital Investigations.
26-32
Electronic Edition (link) BibTeX
- Navid Farazmand, Mahdi Fazeli, Seyed Ghassem Miremadi:
FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program Interruption.
33-38
Electronic Edition (link) BibTeX
- Bernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer:
Economic and Security Aspects of Applying a Threshold Scheme in e-Health.
39-46
Electronic Edition (link) BibTeX
- Mehdi Kiani, Andrew Clark, George M. Mohay:
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks.
47-55
Electronic Edition (link) BibTeX
- Jehan-François Pâris, Thomas J. E. Schwarz:
On the Possibility of Small, Service-Free Disk Based Storage Systems.
56-63
Electronic Edition (link) BibTeX
- Heine Kolltveit, Svein-Olaf Hvasshovd:
Efficient High Availability Commit Processing.
64-71
Electronic Edition (link) BibTeX
- Alfredo Pironti, Riccardo Sisto:
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models.
72-79
Electronic Edition (link) BibTeX
- Antonio Maña, Gimena Pujol:
Towards Formal Specification of Abstract Security Properties.
80-87
Electronic Edition (link) BibTeX
- Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani:
A Behavioral Model of Ideologically-motivated Snowball Attacks.
88-95
Electronic Edition (link) BibTeX
- Igor Siveroni, Andrea Zisman, George Spanoudakis:
Property Specification and Static Verification of UML Models.
96-103
Electronic Edition (link) BibTeX
- Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements.
104-111
Electronic Edition (link) BibTeX
- Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
112-119
Electronic Edition (link) BibTeX
- J. R. Juárez-Rodríguez, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil, Francesc D. Muñoz-Escoí:
A Database Replication Protocol Where Multicast Writesets Are Always Committed.
120-127
Electronic Edition (link) BibTeX
- Nataliia Bielova, Marco Dalla Torre, Nicola Dragoni, Ida Siahaan:
Matching Policies with Security Claims of Mobile Applications.
128-135
Electronic Edition (link) BibTeX
- David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices.
136-143
Electronic Edition (link) BibTeX
- Amir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi:
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks.
144-152
Electronic Edition (link) BibTeX
- Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems.
153-160
Electronic Edition (link) BibTeX
- Esma Aïmeur, Gilles Brassard, José Manuel Fernandez, Flavien Serge Mani Onana, Zbigniew Rakowski:
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System.
161-170
Electronic Edition (link) BibTeX
- Natsumi Kitajima, Yuichi Goto, Jingde Cheng:
Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems.
171-178
Electronic Edition (link) BibTeX
- Simon Tjoa, Stefan Jakoubi, Gerald Quirchmayr:
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology.
179-186
Electronic Edition (link) BibTeX
- Thomas Neubauer, Johannes Heurix:
Defining Secure Business Processes with Respect to Multiple Objectives.
187-194
Electronic Edition (link) BibTeX
- Denis Hatebur, Maritta Heisel, Holger Schmidt:
Analysis and Component-based Realization of Security Requirements.
195-203
Electronic Edition (link) BibTeX
- Yacine Bouzida, Christophe Mangin:
A Framework for Detecting Anomalies in VoIP Networks.
204-211
Electronic Edition (link) BibTeX
- Kuan-Ta Chen, Jing-Kai Lou:
Rapid Detection of Constant-Packet-Rate Flows.
212-220
Electronic Edition (link) BibTeX
- Andriy Panchenko, Lexi Pimenidis, Johannes Renner:
Performance Analysis of Anonymous Communication Channels Provided by Tor.
221-228
Electronic Edition (link) BibTeX
- Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca:
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets.
229-236
Electronic Edition (link) BibTeX
- William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham:
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case.
237-244
Electronic Edition (link) BibTeX
- Yonghua You, Mohammad Zulkernine, Anwar Haque:
A Distributed Defense Framework for Flooding-Based DDoS Attacks.
245-252
Electronic Edition (link) BibTeX
- Liwen He, Paul Botham:
Pure MPLS Technology.
253-259
Electronic Edition (link) BibTeX
- Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He:
Symmetric Active/Active Replication for Dependent Services.
260-267
Electronic Edition (link) BibTeX
- Marcus Völp:
Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels.
268-275
Electronic Edition (link) BibTeX
- David Byers, Nahid Shahmehri:
A Cause-Based Approach to Preventing Software Vulnerabilities.
276-283
Electronic Edition (link) BibTeX
- Shanai Ardi, Nahid Shahmehri:
Integrating a Security Plug-in with the OpenUP/Basic Development Process.
284-291
Electronic Edition (link) BibTeX
- Jostein Jensen:
A Novel Testbed for Detection of Malicious Software Functionality.
292-301
Electronic Edition (link) BibTeX
- Syrine Tlili, Mourad Debbabi:
Type and Effect Annotations for Safe Memory Access in C.
302-309
Electronic Edition (link) BibTeX
- Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios:
Adaptabilty of a GP Based IDS on Wireless Networks.
310-318
Electronic Edition (link) BibTeX
- Liwei Kuang, Mohammad Zulkernine:
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems.
319-326
Electronic Edition (link) BibTeX
- Lukasz Chmielewski, Jaap-Henk Hoepman:
Fuzzy Private Matching (Extended Abstract).
327-334
Electronic Edition (link) BibTeX
- Jens-Uwe Bußer, Steffen Fries, Martin Otto, Peter Hartmann:
Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge.
335-343
Electronic Edition (link) BibTeX
- Christian Schläger, Günther Pernul:
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps.
344-351
Electronic Edition (link) BibTeX
- Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho:
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender.
352-359
Electronic Edition (link) BibTeX
- José María de Fuentes, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda:
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies.
363-368
Electronic Edition (link) BibTeX
- Josep M. Bernabé-Gisbert, Francesc D. Muñoz-Escoí:
Extending Mixed Serialisation Graphs to Replicated Environments.
369-375
Electronic Edition (link) BibTeX
- Frederic Stumpf, Claudia Eckert, Shane Balfe:
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques.
376-382
Electronic Edition (link) BibTeX
- Alexandre Vorobiev, Rudolph E. Seviora:
Fuzzy Belief-Based Supervision.
383-389
Electronic Edition (link) BibTeX
- Rubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí:
Ensuring Progress in Amnesiac Replicated Systems.
390-396
Electronic Edition (link) BibTeX
- R. J. Hulsebosch, P. W. G. Ebben:
Enhancing Face Recognition with Location Information.
397-403
Electronic Edition (link) BibTeX
- Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer:
A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors.
404-409
Electronic Edition (link) BibTeX
- Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen:
Defending On-Line Web Application Security with User-Behavior Surveillance.
410-415
Electronic Edition (link) BibTeX
- Nelly A. Delessy, Eduardo B. Fernández:
A Pattern-Driven Security Process for SOA Applications.
416-421
Electronic Edition (link) BibTeX
- Pablo Neira Ayuso, Laurent Lefèvre, Denis Barbaron, Rafael M. Gasca:
Towards a Dependable Architecture for Highly Available Internet Services.
422-427
Electronic Edition (link) BibTeX
- Alan Stewart, Maurice Clint, Terry Harmer, Peter Kilpatrick, Ronald H. Perrott, Joaquim Gabarró:
Assessing the Reliability and Cost of Web and Grid Orchestrations.
428-433
Electronic Edition (link) BibTeX
- Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi:
Application-Oriented Trust in Distributed Computing.
434-439
Electronic Edition (link) BibTeX
- Bradley Markides, Marijke Coetzee:
BlueTrust in a Real World.
440-445
Electronic Edition (link) BibTeX
- Ananda Swarup Das, Jitu Kumar Keshri, Kannan Srinathan, Vaibhav Srivastava:
Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles.
446-451
Electronic Edition (link) BibTeX
- Thomas H. Morris, V. S. S. Nair:
Privacy Protected ELF for Private Computing on Public Platforms.
452-457
Electronic Edition (link) BibTeX
- Chih-Yin Lin:
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism.
458-460
Electronic Edition (link) BibTeX
- Xiaolei Li, Jin Tian, Tingdi Zhao:
An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200.
461-466
Electronic Edition (link) BibTeX
- Ryma Abbassi, Sihem Guemara El Fatmi:
A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case.
467-472
Electronic Edition (link) BibTeX
- He Guang-Yu, Wen Ying-You, Zhao Hong:
SPIT Detection and Prevention Method in VoIP Environment.
473-478
Electronic Edition (link) BibTeX
- Ezzat Kirmani, Cynthia S. Hood:
A New Approach to Analysis of Interval Availability.
479-483
Electronic Edition (link) BibTeX
- Xiang-he Yang, Huaping Hu, Xin Chen:
SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol.
484-490
Electronic Edition (link) BibTeX
- Mehdi Dehbashi, Vahid Lari, Seyed Ghassem Miremadi, Mohammad Shokrollah-Shirazi:
Fault Effects in FlexRay-Based Networks with Hybrid Topology.
491-496
Electronic Edition (link) BibTeX
- Xun Yi, Mike Faulkner, Eiji Okamoto:
Secure Wireless Sensor Networks.
497-502
Electronic Edition (link) BibTeX
- Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa:
SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks.
503-508
Electronic Edition (link) BibTeX
- Meiko Jensen, Nils Gruschka, Norbert Luttenberger:
The Impact of Flooding Attacks on Network-based Services.
509-513
Electronic Edition (link) BibTeX
- Emili Miedes, Francesc D. Muñoz-Escoí:
Managing Priorities in Atomic Multicast Protocols.
514-519
Electronic Edition (link) BibTeX
- Asier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez:
Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks.
520-525
Electronic Edition (link) BibTeX
- Stefan Lindskog, Anna Brunstrom:
An End-to-End Security Solution for SCTP.
526-531
Electronic Edition (link) BibTeX
- Hongji Wang, Gang Yao, Qingshan Jiang:
An Identity-Based Group Key Agreement Protocol from Pairing.
532-537
Electronic Edition (link) BibTeX
- Gang Yao, Hongji Wang, Qingshan Jiang:
An Authenticated 3-Round Identity-Based Group Key Agreement Protocol.
538-543
Electronic Edition (link) BibTeX
- Adel Almohammad, Robert M. Hierons, Gheorghita Ghinea:
High Capacity Steganographic Method Based Upon JPEG.
544-549
Electronic Edition (link) BibTeX
- Elisavet Konstantinou:
Cluster-based Group Key Agreement for Wireless Ad hoc Networks.
550-557
Electronic Edition (link) BibTeX
- Chen Zhi-li, Huang Liu-sheng, Yu Zhen-shan, Li Ling-jun, Yang Wei:
A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words.
558-563
Electronic Edition (link) BibTeX
- Bo Zhang, Kai Han, Binoy Ravindran, E. Douglas Jensen:
RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks.
564-571
Electronic Edition (link) BibTeX
- Jan Willemson, Arne Ansper:
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications.
572-577
Electronic Edition (link) BibTeX
- Liang Xiao, Javier Vicente, Carlos Sáez, Andrew Peet, Alex Gibb, Paul H. Lewis, Srinandan Dasmahapatra, Madalina Croitoru, Horacio González-Vélez, Magí Lluch i Ariet, David Dupplaw:
A Security Model and its Application to a Distributed Decision Support System for Healthcare.
578-585
Electronic Edition (link) BibTeX
- Salvador Cavadini, Diego Cheda:
Run-time Information Flow Monitoring based on Dynamic Dependence Graphs.
586-591
Electronic Edition (link) BibTeX
- Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli:
Automated Process Classi?cation Framework using SELinux Security Context.
592-596
Electronic Edition (link) BibTeX
- Judith E. Y. Rossebø, Rolv Bræk:
Using Composition Policies to Manage Authentication and Authorization Patterns and Services.
597-603
Electronic Edition (link) BibTeX
- Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo, Pakorn Leesutthipornchai:
Providing Fault Tolerance in Wireless Backhaul Network Design with Path Restoration.
604-609
Electronic Edition (link) BibTeX
- Adrian Frei, Marc Rennhard:
Histogram Matrix: Log File Visualization for Anomaly Detection.
610-617
Electronic Edition (link) BibTeX
- Salem Benferhat, Karim Tabia:
Context-based Profiling for Anomaly Intrusion Detection with Diagnosis.
618-623
Electronic Edition (link) BibTeX
- Ulf Larson, Erland Jonsson, Stefan Lindskog:
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection.
624-629
Electronic Edition (link) BibTeX
- Youhui Zhang, Hongyi Wang, Yu Gu, Dongsheng Wang:
IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI.
630-635
Electronic Edition (link) BibTeX
- Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani:
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme.
636-641
Electronic Edition (link) BibTeX
- Gerald Madlmayr, Josef Langer, Christian Kantner, Josef Scharinger:
NFC Devices: Security and Privacy.
642-647
Electronic Edition (link) BibTeX
- Nima Mehdizadeh, Mohammad Shokrolah-Shirazi, Seyed Ghassem Miremadi:
Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessor.
648-652
Electronic Edition (link) BibTeX
- Guna Santos, Angelo Duarte, Dolores Rexachs, Emilio Luque:
Increasing the Performability of Computer Clusters Using RADIC II.
653-658
Electronic Edition (link) BibTeX
- Geoffroy Vallée, Kulathep Charoenpornwattana, Christian Engelmann, Anand Tikotekar, Chokchai Leangsuksun, Thomas Naughton, Stephen L. Scott:
A Framework for Proactive Fault Tolerance.
659-664
Electronic Edition (link) BibTeX
- Sanjam Garg, Huzur Saran:
Anti-DDoS Virtualized Operating System.
667-674
Electronic Edition (link) BibTeX
- Erin Farr, Richard Harper, Lisa Spainhower, Jimi Xenidis:
A Case for High Availability in a Virtualized Environment (HAVEN).
675-682
Electronic Edition (link) BibTeX
- Stéphane Onno:
A Federated Physical and Logical Access Control Enforcement Model.
683-692
Electronic Edition (link) BibTeX
- Octavian Catrina, Florian Kerschbaum:
Fostering the Uptake of Secure Multiparty Computation in E-Commerce.
693-700
Electronic Edition (link) BibTeX
- Rafael Martínez-Peláez, Cristina Satizábal, Francisco Rico-Novella, Jordi Forné:
Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols.
701-708
Electronic Edition (link) BibTeX
- Mathias Kohler, Andreas Schaad:
Avoiding Policy-based Deadlocks in Business Processes.
709-716
Electronic Edition (link) BibTeX
- Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura:
A Secure High-Speed Identification Scheme for RFID Using Bloom Filters.
717-722
Electronic Edition (link) BibTeX
- Youan Xiao:
New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem.
723-726
Electronic Edition (link) BibTeX
- Qi Wang, Yonglong Luo, Liusheng Huang:
Privacy-preserving Protocols for Finding the Convex Hulls.
727-732
Electronic Edition (link) BibTeX
- Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi:
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy.
733-740
Electronic Edition (link) BibTeX
- Ascensión Hernández Encinas, Ángel Martín del Rey, J. L. Pérez Iglesias, Gerardo Rodríguez Sánchez, Araceli Queiruga Dios:
Cryptographic Properties of Second-Order Memory Elementary Cellular Automata.
741-745
Electronic Edition (link) BibTeX
- Shengke Zeng, Mingxing He, Weidong Luo:
New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group.
746-751
Electronic Edition (link) BibTeX
- Christian Schläger, Ludwig Fuchs, Günther Pernul:
Intensive Programme on Information and Communication Security.
752-757
Electronic Edition (link) BibTeX
- Heinz Lothar Grob, Gereon Strauch, Christian Buddendick:
Applications for IT-Risk Management Requirements and Practical Evaluation.
758-764
Electronic Edition (link) BibTeX
- Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse:
Security Analysis of Role-based Separation of Duty with Workflows.
765-770
Electronic Edition (link) BibTeX
- Stefan Böttcher, Rita Hartel, Matthias Kirschner:
Detecting Suspicious Relational Database Queries.
771-778
Electronic Edition (link) BibTeX
- Denis Royer:
Assessing the Value of Enterprise Identity Management (EIdM) Towards a Generic Evaluation Approach.
779-786
Electronic Edition (link) BibTeX
- Mark E. Orwat, Timothy E. Levin, Cynthia E. Irvine:
An Ontological Approach to Secure MANET Management.
787-794
Electronic Edition (link) BibTeX
- Roland Donat, Laurent Bouillaut, Patrice Aknin, Philippe Leray:
Reliability Analysis using Graphical Duration Models.
795-800
Electronic Edition (link) BibTeX
- Mikel Larrea, Cristian Martín:
From Omega to ?P in the Crash-Recovery Failure Model with Unknown Membership.
801-806
Electronic Edition (link) BibTeX
- Mario Anzures-García, Luz A. Sánchez-Gálvez:
Policy-based Group Organizational Structure Management using an Ontological Approach.
807-812
Electronic Edition (link) BibTeX
- Carlos Blanco, Joaquín Lasheras, Rafael Valencia-García, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini:
A Systematic Review and Comparison of Security Ontologies.
813-820
Electronic Edition (link) BibTeX
- Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Context Ontology for Secure Interoperability.
821-827
Electronic Edition (link) BibTeX
- Kimmo Halunen, Pauli Rikula, Juha Röning:
On the Security of VSH in Password Schemes.
828-833
Electronic Edition (link) BibTeX
- Zakaria Maamar, Quan Z. Sheng, Djamal Benslimane:
Sustaining Web Services High-Availability Using Communities.
834-841
Electronic Edition (link) BibTeX
- Takeshi Tsuchiya, Marc Lihan, Hirokazu Yoshinaga, Kei'ichi Koyanagi:
Distributed Information Retrieval Service for Ubiquitous Services.
842-850
Electronic Edition (link) BibTeX
- Davide Pozza, Riccardo Sisto:
A Lightweight Security Analyzer inside GCC.
851-858
Electronic Edition (link) BibTeX
- Habib Seifzadeh, Mostafa Kermani, Mohsen Sadighi:
Dynamic Maintenance of Software Systems at Runtime.
859-865
Electronic Edition (link) BibTeX
- Mohammad Ali Hadavi, Hossein Shirazi, Hasan Mokhtari Sangchi, Vahid Saber Hamishagi:
Software Security; A Vulnerability Activity Revisit.
866-872
Electronic Edition (link) BibTeX
- Sini Ruohomaa, Lea Kutvonen:
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations.
873-880
Electronic Edition (link) BibTeX
- Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani:
A Survey on Trust and Reputation Schemes in Ad Hoc Networks.
881-886
Electronic Edition (link) BibTeX
- Stefan Katzenbeisser, Milan Petkovic:
Privacy-Preserving Recommendation Systems for Consumer Healthcare Services.
889-895
Electronic Edition (link) BibTeX
- Yousof Al-Hammadi, Uwe Aickelin:
Detecting Bots Based on Keylogging Activities.
896-902
Electronic Edition (link) BibTeX
- Elke Franz, Christin Groba, Thomas Springer, Mike Bergmann:
A Comprehensive Approach for Context-dependent Privacy Management.
903-910
Electronic Edition (link) BibTeX
- Steffen Weiss, Martin Wahl, Michael Tielemann, Klaus Meyer-Wegener:
Traceable Quantitative Risk Assessment Applied to Investment Decision for Local Backups.
911-920
Electronic Edition (link) BibTeX
- Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Yautsiukhin:
Quantitative Assessment of Enterprise Security System.
921-928
Electronic Edition (link) BibTeX
- Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis:
Clustering Oriented Architectures in Medical Sensor Environments.
929-934
Electronic Edition (link) BibTeX
- Lillian Røstad:
An Initial Model and a Discussion of Access Control in Patient Controlled Health Records.
935-942
Electronic Edition (link) BibTeX
- Sigurd Eskeland, Vladimir A. Oleshchuk:
Secure Team-Based EPR Access Acquisition in Wireless Networks.
943-949
Electronic Edition (link) BibTeX
- Melanie Tupper, A. Nur Zincir-Heywood:
VEA-bility Security Metric: A Network Security Analysis Tool.
950-957
Electronic Edition (link) BibTeX
- Stefan G. Weber, Andreas Heinemann, Max Mühlhäuser:
Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments.
958-964
Electronic Edition (link) BibTeX
- Victor Korobitsin, Sergey Ilyin:
GOST-28147 Encryption Implementation on Graphics Processing Units.
967-974
Electronic Edition (link) BibTeX
- Fanny Coudert, Jos Dumortier:
Intelligent Video Surveillance Networks: Data Protection Challenges.
975-981
Electronic Edition (link) BibTeX
- Amin Hassanzadeh, Babak Sadeghian:
Intrusion Detection with Data Correlation Relation Graph.
982-989
Electronic Edition (link) BibTeX
- Josep Domingo-Ferrer, Vicenç Torra:
A Critique of k-Anonymity and Some of Its Enhancements.
990-993
Electronic Edition (link) BibTeX
- Vicenç Torra, Susana Ladra:
Cluster-Specific Information Loss Measures in Data Privacy: A Review.
994-999
Electronic Edition (link) BibTeX
- Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella:
Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms.
1000-1007
Electronic Edition (link) BibTeX
- Boustia Narhimene, Mokhtari Aicha:
Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach.
1008-1012
Electronic Edition (link) BibTeX
- Georgios Kalogridis, Chris J. Mitchell:
Using Non-adaptive Group Testing to Construct Spy Agent Routes.
1013-1019
Electronic Edition (link) BibTeX
- Gerardo Canfora, Bice Cavallo:
A Bayesian Approach for on-Line Max Auditing.
1020-1027
Electronic Edition (link) BibTeX
- Irfan Ahmed, Kyung-suk Lhee:
Detection of Malcodes by Packet Classification.
1028-1035
Electronic Edition (link) BibTeX
- Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Klopotek:
Performance of a Strategy Based Packets Forwarding in Ad Hoc Networks.
1036-1043
Electronic Edition (link) BibTeX
- Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair:
Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy.
1044-1051
Electronic Edition (link) BibTeX
- Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit, Karim Tamine:
AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes.
1052-1059
Electronic Edition (link) BibTeX
- Agusti Solanas, Gloria Pujol, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz:
A Post-processing Method to Lessen k-Anonymity Dissimilarities.
1060-1066
Electronic Edition (link) BibTeX
- Zhiyao Liang, Rakesh M. Verma:
Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols.
1067-1074
Electronic Edition (link) BibTeX
- Duffy Angevine, A. Nur Zincir-Heywood:
A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set.
1075-1079
Electronic Edition (link) BibTeX
- Yasuhiro Ohtaki:
Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries.
1083-1090
Electronic Edition (link) BibTeX
- Karel Wouters, Koen Simoens, Danny Lathouwers, Bart Preneel:
Secure and Privacy-Friendly Logging for eGovernment Services.
1091-1096
Electronic Edition (link) BibTeX
- Flora Amato, Valentina Casola, Antonino Mazzeo, Valeria Vittorini:
The REM Framework for Security Evaluation.
1097-1103
Electronic Edition (link) BibTeX
- René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst:
Static Validation of Licence Conformance Policies.
1104-1111
Electronic Edition (link) BibTeX
- Fabio Massacci, Katsiaryna Naliuka:
Towards Practical Security Monitors of UML Policies for Mobile Applications.
1112-1119
Electronic Edition (link) BibTeX
- Fabio Martinelli, Ilaria Matteucci:
Synthesis of Local Controller Programs for Enforcing Global Security Properties.
1120-1127
Electronic Edition (link) BibTeX
- Stefano Bistarelli, Fabio Martinelli, Francesco Santini:
Weighted Datalog and Levels of Trust.
1128-1134
Electronic Edition (link) BibTeX
- Alexander Pretschner, Thomas Walter:
Negotiation of Usage Control Policies - Simply the Best?
1135-1136
Electronic Edition (link) BibTeX
- Albin Zuccato, Viktor Endersz, Nils Daniels:
Security Requirement Engineering at a Telecom Provider.
1139-1147
Electronic Edition (link) BibTeX
- Takao Okubo, Hidehiko Tanaka:
Identifying Security Aspects in Early Development Stages.
1148-1155
Electronic Edition (link) BibTeX
- Thomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen:
Using Security Patterns to Combine Security Metrics.
1156-1163
Electronic Edition (link) BibTeX
- Per Håkon Meland, Jostein Jensen:
Secure Software Design in Practice.
1164-1171
Electronic Edition (link) BibTeX
- Martin Gilje Jaatun, Inger Anne Tøndel:
Covering Your Assets in Software Engineering.
1172-1179
Electronic Edition (link) BibTeX
- Shangping Ren, Kevin A. Kwiat:
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features.
1180-1187
Electronic Edition (link) BibTeX
- Sarah-Jane Whittaker, Mohammad Zulkernine, Karen Rudie:
Towards Incorporating Discrete-Event Systems in Secure Software Development.
1188-1195
Electronic Edition (link) BibTeX
- James A. Kupsch, Barton P. Miller:
How to Open a File and Not Get Hacked.
1196-1203
Electronic Edition (link) BibTeX
- Holger Peine:
Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of Rules.
1204-1209
Electronic Edition (link) BibTeX
- Vincenzo De Florio, Chris Blondia:
Adaptive Data Integrity through Dynamically Redundant Data Structures.
1213-1218
Electronic Edition (link) BibTeX
- Daisuke Horie, Shoichi Morimoto, Noor Azimah, Yuichi Goto, Jingde Cheng:
ISEDS: An Information Security Engineering Database System Based on ISO Standards.
1219-1225
Electronic Edition (link) BibTeX
- Daniel Slamanig, Christian Stingl:
Privacy Aspects of eHealth.
1226-1233
Electronic Edition (link) BibTeX
- Kaliappa Nadar Ravindran, Jiang Wu, Kevin A. Kwiat, Ali Sabbir:
Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks.
1234-1239
Electronic Edition (link) BibTeX
- Yudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone:
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach.
1240-1247
Electronic Edition (link) BibTeX
- Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Implementing Multidimensional Security into OLAP Tools.
1248-1253
Electronic Edition (link) BibTeX
- Nasrullah Memon, David L. Hicks:
Detecting Key Players in 11-M Terrorist Network: A Case Study.
1254-1259
Electronic Edition (link) BibTeX
- Dong Seong Kim, Muhammad Anwarul Azim, Jong Sou Park:
Privacy Preserving Support Vector Machines in Wireless Sensor Networks.
1260-1265
Electronic Edition (link) BibTeX
- Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri:
An Image Encryption System by Cellular Automata with Memory.
1266-1271
Electronic Edition (link) BibTeX
- Chik How Tan:
Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles.
1275-1281
Electronic Edition (link) BibTeX
- Tomohiro Kobori, Hiroaki Kikuchi, Masato Terada:
Internet Observation with ISDAS: How Long Does a Worm Perform Scanning?
1282-1286
Electronic Edition (link) BibTeX
- Tsukasa Endo, Isao Echizen, Hiroshi Yoshiura:
Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes.
1287-1293
Electronic Edition (link) BibTeX
- Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko:
Enocoro-80: A Hardware Oriented Stream Cipher.
1294-1300
Electronic Edition (link) BibTeX
- Marko Hölbl, Tatjana Welzer:
Cryptanalysis and Improvement of an Improved Remote Authentication Scheme with Smart Card.
1301-1305
Electronic Edition (link) BibTeX
- Paul Rubel, Michael Atighetchi, Partha Pratim Pal, Martin W. Fong, Richard O'Brien:
Effective Monitoring of a Survivable Distributed Networked Information System.
1306-1312
Electronic Edition (link) BibTeX
- Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi:
Design of an FDB based Intra-domain Packet Traceback System.
1313-1318
Electronic Edition (link) BibTeX
- Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
An Independent Evaluation of Web Timing Attack and its Countermeasure.
1319-1324
Electronic Edition (link) BibTeX
- Arjan Durresi, Mimoza Durresi, Leonard Barolli:
Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks.
1325-1331
Electronic Edition (link) BibTeX
- Qingsong Ye, Huaxiong Wang, Christophe Tartary:
Privacy-Preserving Distributed Set Intersection.
1332-1339
Electronic Edition (link) BibTeX
- Yo Mashimo, Shintaro Ueda, Yasutaka Shinzaki, Hiroshi Shigeno:
Examination of Forwarding Obstruction Attacks in Structured Overlay Networks.
1340-1345
Electronic Edition (link) BibTeX
- Abdulah Abdulah Zadeh:
A Novel Approach for Multiplication over GF(2m) in Polynomial Basis Representation.
1346-1351
Electronic Edition (link) BibTeX
- Benjamin Turnbull, Jill Slay:
Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics.
1355-1360
Electronic Edition (link) BibTeX
- Joshua Broadway, Benjamin Turnbull, Jill Slay:
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis.
1361-1368
Electronic Edition (link) BibTeX
- Christopher Hargreaves, Howard Chivers:
Recovery of Encryption Keys from Memory Using a Linear Scan.
1369-1376
Electronic Edition (link) BibTeX
- Jooyoung Lee:
Proposal for Efficient Searching and Presentation in Digital Forensics.
1377-1381
Electronic Edition (link) BibTeX
- Bin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun:
Secure Steganography in Compressed Video Bitstreams.
1382-1387
Electronic Edition (link) BibTeX
- Kweku K. Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff:
Considerations Towards a Cyber Crime Profiling System.
1388-1393
Electronic Edition (link) BibTeX
- Raimundas Matulevicius, Nicolas Mayer, Patrick Heymans:
Alignment of Misuse Cases with Security Risk Management.
1397-1404
Electronic Edition (link) BibTeX
- Bernhard Thalheim, Sabah S. Al-Fedaghi, Khaled Al-Saqabi:
Information Stream Based Model for Organizing Security.
1405-1412
Electronic Edition (link) BibTeX
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Security Requirements Variability for Software Product Lines.
1413-1420
Electronic Edition (link) BibTeX
- Koen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen:
Transforming Security Requirements into Architecture.
1421-1428
Electronic Edition (link) BibTeX
- Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang:
Modelling Security Properties in a Grid-based Operating System with Anti-Goals.
1429-1436
Electronic Edition (link) BibTeX
- Nicola Zeni, Nadzeya Kiyavitskaya, James R. Cordy, Luisa Mich, John Mylopoulos:
Annotating Regulations Using Cerno: An Application to Italian Documents - Extended Abstract.
1437-1442
Electronic Edition (link) BibTeX
- Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, Mohamed Eltoweissy:
Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements.
1443-1450
Electronic Edition (link) BibTeX
- Orhan Cetinkaya:
Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract).
1451-1456
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:22:20 2009
by Michael Ley (ley@uni-trier.de)