Availability, Reliability and Security in Ad Hoc, 2008

Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain. IEEE Computer Society 2008 BibTeX
  • Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli:
    Securing Telehealth Applications in a Web-Based e-Health Portal. 3-9
    Electronic Edition (link) BibTeX
  • Andreas Janecek, Wilfried N. Gansterer, K. Ashwin Kumar:
    Multi-Level Reputation-Based Greylisting. 10-17
    Electronic Edition (link) BibTeX
  • Kim Wuyts, Riccardo Scandariato, Geert Claeys, Wouter Joosen:
    Hardening XDS-Based Architectures. 18-25
    Electronic Edition (link) BibTeX
  • Svein Yngvar Willassen:
    Finding Evidence of Antedating in Digital Investigations. 26-32
    Electronic Edition (link) BibTeX
  • Navid Farazmand, Mahdi Fazeli, Seyed Ghassem Miremadi:
    FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program Interruption. 33-38
    Electronic Edition (link) BibTeX
  • Bernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer:
    Economic and Security Aspects of Applying a Threshold Scheme in e-Health. 39-46
    Electronic Edition (link) BibTeX
  • Mehdi Kiani, Andrew Clark, George M. Mohay:
    Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. 47-55
    Electronic Edition (link) BibTeX
  • Jehan-François Pâris, Thomas J. E. Schwarz:
    On the Possibility of Small, Service-Free Disk Based Storage Systems. 56-63
    Electronic Edition (link) BibTeX
  • Heine Kolltveit, Svein-Olaf Hvasshovd:
    Efficient High Availability Commit Processing. 64-71
    Electronic Edition (link) BibTeX
  • Alfredo Pironti, Riccardo Sisto:
    Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. 72-79
    Electronic Edition (link) BibTeX
  • Antonio Maña, Gimena Pujol:
    Towards Formal Specification of Abstract Security Properties. 80-87
    Electronic Edition (link) BibTeX
  • Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani:
    A Behavioral Model of Ideologically-motivated “Snowball” Attacks. 88-95
    Electronic Edition (link) BibTeX
  • Igor Siveroni, Andrea Zisman, George Spanoudakis:
    Property Specification and Static Verification of UML Models. 96-103
    Electronic Edition (link) BibTeX
  • Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
    Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. 104-111
    Electronic Edition (link) BibTeX
  • Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
    A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. 112-119
    Electronic Edition (link) BibTeX
  • J. R. Juárez-Rodríguez, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil, Francesc D. Muñoz-Escoí:
    A Database Replication Protocol Where Multicast Writesets Are Always Committed. 120-127
    Electronic Edition (link) BibTeX
  • Nataliia Bielova, Marco Dalla Torre, Nicola Dragoni, Ida Siahaan:
    Matching Policies with Security Claims of Mobile Applications. 128-135
    Electronic Edition (link) BibTeX
  • David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
    PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. 136-143
    Electronic Edition (link) BibTeX
  • Amir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi:
    WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. 144-152
    Electronic Edition (link) BibTeX
  • Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
    Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. 153-160
    Electronic Edition (link) BibTeX
  • Esma Aïmeur, Gilles Brassard, José Manuel Fernandez, Flavien Serge Mani Onana, Zbigniew Rakowski:
    Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. 161-170
    Electronic Edition (link) BibTeX
  • Natsumi Kitajima, Yuichi Goto, Jingde Cheng:
    Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems. 171-178
    Electronic Edition (link) BibTeX
  • Simon Tjoa, Stefan Jakoubi, Gerald Quirchmayr:
    Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology. 179-186
    Electronic Edition (link) BibTeX
  • Thomas Neubauer, Johannes Heurix:
    Defining Secure Business Processes with Respect to Multiple Objectives. 187-194
    Electronic Edition (link) BibTeX
  • Denis Hatebur, Maritta Heisel, Holger Schmidt:
    Analysis and Component-based Realization of Security Requirements. 195-203
    Electronic Edition (link) BibTeX
  • Yacine Bouzida, Christophe Mangin:
    A Framework for Detecting Anomalies in VoIP Networks. 204-211
    Electronic Edition (link) BibTeX
  • Kuan-Ta Chen, Jing-Kai Lou:
    Rapid Detection of Constant-Packet-Rate Flows. 212-220
    Electronic Edition (link) BibTeX
  • Andriy Panchenko, Lexi Pimenidis, Johannes Renner:
    Performance Analysis of Anonymous Communication Channels Provided by Tor. 221-228
    Electronic Edition (link) BibTeX
  • Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca:
    Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets. 229-236
    Electronic Edition (link) BibTeX
  • William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham:
    Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. 237-244
    Electronic Edition (link) BibTeX
  • Yonghua You, Mohammad Zulkernine, Anwar Haque:
    A Distributed Defense Framework for Flooding-Based DDoS Attacks. 245-252
    Electronic Edition (link) BibTeX
  • Liwen He, Paul Botham:
    Pure MPLS Technology. 253-259
    Electronic Edition (link) BibTeX
  • Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He:
    Symmetric Active/Active Replication for Dependent Services. 260-267
    Electronic Edition (link) BibTeX
  • Marcus Völp:
    Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. 268-275
    Electronic Edition (link) BibTeX
  • David Byers, Nahid Shahmehri:
    A Cause-Based Approach to Preventing Software Vulnerabilities. 276-283
    Electronic Edition (link) BibTeX
  • Shanai Ardi, Nahid Shahmehri:
    Integrating a Security Plug-in with the OpenUP/Basic Development Process. 284-291
    Electronic Edition (link) BibTeX
  • Jostein Jensen:
    A Novel Testbed for Detection of Malicious Software Functionality. 292-301
    Electronic Edition (link) BibTeX
  • Syrine Tlili, Mourad Debbabi:
    Type and Effect Annotations for Safe Memory Access in C. 302-309
    Electronic Edition (link) BibTeX
  • Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos Milios:
    Adaptabilty of a GP Based IDS on Wireless Networks. 310-318
    Electronic Edition (link) BibTeX
  • Liwei Kuang, Mohammad Zulkernine:
    An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. 319-326
    Electronic Edition (link) BibTeX
  • Lukasz Chmielewski, Jaap-Henk Hoepman:
    Fuzzy Private Matching (Extended Abstract). 327-334
    Electronic Edition (link) BibTeX
  • Jens-Uwe Bußer, Steffen Fries, Martin Otto, Peter Hartmann:
    Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge. 335-343
    Electronic Edition (link) BibTeX
  • Christian Schläger, Günther Pernul:
    Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. 344-351
    Electronic Edition (link) BibTeX
  • Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho:
    Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. 352-359
    Electronic Edition (link) BibTeX
  • José María de Fuentes, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda:
    CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. 363-368
    Electronic Edition (link) BibTeX
  • Josep M. Bernabé-Gisbert, Francesc D. Muñoz-Escoí:
    Extending Mixed Serialisation Graphs to Replicated Environments. 369-375
    Electronic Edition (link) BibTeX
  • Frederic Stumpf, Claudia Eckert, Shane Balfe:
    Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. 376-382
    Electronic Edition (link) BibTeX
  • Alexandre Vorobiev, Rudolph E. Seviora:
    Fuzzy Belief-Based Supervision. 383-389
    Electronic Edition (link) BibTeX
  • Rubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí:
    Ensuring Progress in Amnesiac Replicated Systems. 390-396
    Electronic Edition (link) BibTeX
  • R. J. Hulsebosch, P. W. G. Ebben:
    Enhancing Face Recognition with Location Information. 397-403
    Electronic Edition (link) BibTeX
  • Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer:
    A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors. 404-409
    Electronic Edition (link) BibTeX
  • Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen:
    Defending On-Line Web Application Security with User-Behavior Surveillance. 410-415
    Electronic Edition (link) BibTeX
  • Nelly A. Delessy, Eduardo B. Fernández:
    A Pattern-Driven Security Process for SOA Applications. 416-421
    Electronic Edition (link) BibTeX
  • Pablo Neira Ayuso, Laurent Lefèvre, Denis Barbaron, Rafael M. Gasca:
    Towards a Dependable Architecture for Highly Available Internet Services. 422-427
    Electronic Edition (link) BibTeX
  • Alan Stewart, Maurice Clint, Terry Harmer, Peter Kilpatrick, Ronald H. Perrott, Joaquim Gabarró:
    Assessing the Reliability and Cost of Web and Grid Orchestrations. 428-433
    Electronic Edition (link) BibTeX
  • Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi:
    Application-Oriented Trust in Distributed Computing. 434-439
    Electronic Edition (link) BibTeX
  • Bradley Markides, Marijke Coetzee:
    BlueTrust in a Real World. 440-445
    Electronic Edition (link) BibTeX
  • Ananda Swarup Das, Jitu Kumar Keshri, Kannan Srinathan, Vaibhav Srivastava:
    Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles. 446-451
    Electronic Edition (link) BibTeX
  • Thomas H. Morris, V. S. S. Nair:
    Privacy Protected ELF for Private Computing on Public Platforms. 452-457
    Electronic Edition (link) BibTeX
  • Chih-Yin Lin:
    haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism. 458-460
    Electronic Edition (link) BibTeX
  • Xiaolei Li, Jin Tian, Tingdi Zhao:
    An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200. 461-466
    Electronic Edition (link) BibTeX
  • Ryma Abbassi, Sihem Guemara El Fatmi:
    A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case. 467-472
    Electronic Edition (link) BibTeX
  • He Guang-Yu, Wen Ying-You, Zhao Hong:
    SPIT Detection and Prevention Method in VoIP Environment. 473-478
    Electronic Edition (link) BibTeX
  • Ezzat Kirmani, Cynthia S. Hood:
    A New Approach to Analysis of Interval Availability. 479-483
    Electronic Edition (link) BibTeX
  • Xiang-he Yang, Hua-ping Hu, Xin Chen:
    SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol. 484-490
    Electronic Edition (link) BibTeX
  • Mehdi Dehbashi, Vahid Lari, Seyed Ghassem Miremadi, Mohammad Shokrollah-Shirazi:
    Fault Effects in FlexRay-Based Networks with Hybrid Topology. 491-496
    Electronic Edition (link) BibTeX
  • Xun Yi, Mike Faulkner, Eiji Okamoto:
    Secure Wireless Sensor Networks. 497-502
    Electronic Edition (link) BibTeX
  • Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa:
    SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. 503-508
    Electronic Edition (link) BibTeX
  • Meiko Jensen, Nils Gruschka, Norbert Luttenberger:
    The Impact of Flooding Attacks on Network-based Services. 509-513
    Electronic Edition (link) BibTeX
  • Emili Miedes, Francesc D. Muñoz-Escoí:
    Managing Priorities in Atomic Multicast Protocols. 514-519
    Electronic Edition (link) BibTeX
  • Asier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez:
    Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. 520-525
    Electronic Edition (link) BibTeX
  • Stefan Lindskog, Anna Brunstrom:
    An End-to-End Security Solution for SCTP. 526-531
    Electronic Edition (link) BibTeX
  • Hongji Wang, Gang Yao, Qingshan Jiang:
    An Identity-Based Group Key Agreement Protocol from Pairing. 532-537
    Electronic Edition (link) BibTeX
  • Gang Yao, Hongji Wang, Qingshan Jiang:
    An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. 538-543
    Electronic Edition (link) BibTeX
  • Adel Almohammad, Robert M. Hierons, Gheorghita Ghinea:
    High Capacity Steganographic Method Based Upon JPEG. 544-549
    Electronic Edition (link) BibTeX
  • Elisavet Konstantinou:
    Cluster-based Group Key Agreement for Wireless Ad hoc Networks. 550-557
    Electronic Edition (link) BibTeX
  • Chen Zhi-li, Huang Liu-sheng, Yu Zhen-shan, Li Ling-jun, Yang Wei:
    A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. 558-563
    Electronic Edition (link) BibTeX
  • Bo Zhang, Kai Han, Binoy Ravindran, E. Douglas Jensen:
    RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks. 564-571
    Electronic Edition (link) BibTeX
  • Jan Willemson, Arne Ansper:
    A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. 572-577
    Electronic Edition (link) BibTeX
  • Liang Xiao, Javier Vicente, Carlos Sáez, Andrew Peet, Alex Gibb, Paul H. Lewis, Srinandan Dasmahapatra, Madalina Croitoru, Horacio González-Vélez, Magí Lluch i Ariet, David Dupplaw:
    A Security Model and its Application to a Distributed Decision Support System for Healthcare. 578-585
    Electronic Edition (link) BibTeX
  • Salvador Cavadini, Diego Cheda:
    Run-time Information Flow Monitoring based on Dynamic Dependence Graphs. 586-591
    Electronic Edition (link) BibTeX
  • Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli:
    Automated Process Classi?cation Framework using SELinux Security Context. 592-596
    Electronic Edition (link) BibTeX
  • Judith E. Y. Rossebø, Rolv Bræk:
    Using Composition Policies to Manage Authentication and Authorization Patterns and Services. 597-603
    Electronic Edition (link) BibTeX
  • Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo, Pakorn Leesutthipornchai:
    Providing Fault Tolerance in Wireless Backhaul Network Design with Path Restoration. 604-609
    Electronic Edition (link) BibTeX
  • Adrian Frei, Marc Rennhard:
    Histogram Matrix: Log File Visualization for Anomaly Detection. 610-617
    Electronic Edition (link) BibTeX
  • Salem Benferhat, Karim Tabia:
    Context-based Profiling for Anomaly Intrusion Detection with Diagnosis. 618-623
    Electronic Edition (link) BibTeX
  • Ulf Larson, Erland Jonsson, Stefan Lindskog:
    A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection. 624-629
    Electronic Edition (link) BibTeX
  • Youhui Zhang, Hongyi Wang, Yu Gu, Dongsheng Wang:
    IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI. 630-635
    Electronic Edition (link) BibTeX
  • Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani:
    Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. 636-641
    Electronic Edition (link) BibTeX
  • Gerald Madlmayr, Josef Langer, Christian Kantner, Josef Scharinger:
    NFC Devices: Security and Privacy. 642-647
    Electronic Edition (link) BibTeX
  • Nima Mehdizadeh, Mohammad Shokrolah-Shirazi, Seyed Ghassem Miremadi:
    Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessor. 648-652
    Electronic Edition (link) BibTeX
  • Guna Santos, Angelo Duarte, Dolores Rexachs, Emilio Luque:
    Increasing the Performability of Computer Clusters Using RADIC II. 653-658
    Electronic Edition (link) BibTeX
  • Geoffroy Vallée, Kulathep Charoenpornwattana, Christian Engelmann, Anand Tikotekar, Chokchai Leangsuksun, Thomas Naughton, Stephen L. Scott:
    A Framework for Proactive Fault Tolerance. 659-664
    Electronic Edition (link) BibTeX
  • Sanjam Garg, Huzur Saran:
    Anti-DDoS Virtualized Operating System. 667-674
    Electronic Edition (link) BibTeX
  • Erin Farr, Richard Harper, Lisa Spainhower, Jimi Xenidis:
    A Case for High Availability in a Virtualized Environment (HAVEN). 675-682
    Electronic Edition (link) BibTeX
  • Stéphane Onno:
    A Federated Physical and Logical Access Control Enforcement Model. 683-692
    Electronic Edition (link) BibTeX
  • Octavian Catrina, Florian Kerschbaum:
    Fostering the Uptake of Secure Multiparty Computation in E-Commerce. 693-700
    Electronic Edition (link) BibTeX
  • Rafael Martínez-Peláez, Cristina Satizábal, Francisco Rico-Novella, Jordi Forné:
    Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols. 701-708
    Electronic Edition (link) BibTeX
  • Mathias Kohler, Andreas Schaad:
    Avoiding Policy-based Deadlocks in Business Processes. 709-716
    Electronic Edition (link) BibTeX
  • Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura:
    A Secure High-Speed Identification Scheme for RFID Using Bloom Filters. 717-722
    Electronic Edition (link) BibTeX
  • Youan Xiao:
    New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. 723-726
    Electronic Edition (link) BibTeX
  • Qi Wang, Yonglong Luo, Liusheng Huang:
    Privacy-preserving Protocols for Finding the Convex Hulls. 727-732
    Electronic Edition (link) BibTeX
  • Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi:
    A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. 733-740
    Electronic Edition (link) BibTeX
  • Ascensión Hernández Encinas, Ángel Martín del Rey, J. L. Pérez Iglesias, Gerardo Rodríguez Sánchez, Araceli Queiruga Dios:
    Cryptographic Properties of Second-Order Memory Elementary Cellular Automata. 741-745
    Electronic Edition (link) BibTeX
  • Shengke Zeng, Mingxing He, Weidong Luo:
    New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group. 746-751
    Electronic Edition (link) BibTeX
  • Christian Schläger, Ludwig Fuchs, Günther Pernul:
    Intensive Programme on Information and Communication Security. 752-757
    Electronic Edition (link) BibTeX
  • Heinz Lothar Grob, Gereon Strauch, Christian Buddendick:
    Applications for IT-Risk Management – Requirements and Practical Evaluation. 758-764
    Electronic Edition (link) BibTeX
  • Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse:
    Security Analysis of Role-based Separation of Duty with Workflows. 765-770
    Electronic Edition (link) BibTeX
  • Stefan Böttcher, Rita Hartel, Matthias Kirschner:
    Detecting Suspicious Relational Database Queries. 771-778
    Electronic Edition (link) BibTeX
  • Denis Royer:
    Assessing the Value of Enterprise Identity Management (EIdM) – Towards a Generic Evaluation Approach. 779-786
    Electronic Edition (link) BibTeX
  • Mark E. Orwat, Timothy E. Levin, Cynthia E. Irvine:
    An Ontological Approach to Secure MANET Management. 787-794
    Electronic Edition (link) BibTeX
  • Roland Donat, Laurent Bouillaut, Patrice Aknin, Philippe Leray:
    Reliability Analysis using Graphical Duration Models. 795-800
    Electronic Edition (link) BibTeX
  • Mikel Larrea, Cristian Martín:
    From Omega to ?P in the Crash-Recovery Failure Model with Unknown Membership. 801-806
    Electronic Edition (link) BibTeX
  • Mario Anzures-García, Luz A. Sánchez-Gálvez:
    Policy-based Group Organizational Structure Management using an Ontological Approach. 807-812
    Electronic Edition (link) BibTeX
  • Carlos Blanco, Joaquín Lasheras, Rafael Valencia-García, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini:
    A Systematic Review and Comparison of Security Ontologies. 813-820
    Electronic Edition (link) BibTeX
  • Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
    Context Ontology for Secure Interoperability. 821-827
    Electronic Edition (link) BibTeX
  • Kimmo Halunen, Pauli Rikula, Juha Röning:
    On the Security of VSH in Password Schemes. 828-833
    Electronic Edition (link) BibTeX
  • Zakaria Maamar, Quan Z. Sheng, Djamal Benslimane:
    Sustaining Web Services High-Availability Using Communities. 834-841
    Electronic Edition (link) BibTeX
  • Takeshi Tsuchiya, Marc Lihan, Hirokazu Yoshinaga, Kei'ichi Koyanagi:
    Distributed Information Retrieval Service for Ubiquitous Services. 842-850
    Electronic Edition (link) BibTeX
  • Davide Pozza, Riccardo Sisto:
    A Lightweight Security Analyzer inside GCC. 851-858
    Electronic Edition (link) BibTeX
  • Habib Seifzadeh, Mostafa Kermani, Mohsen Sadighi:
    Dynamic Maintenance of Software Systems at Runtime. 859-865
    Electronic Edition (link) BibTeX
  • Mohammad Ali Hadavi, Hossein Shirazi, Hasan Mokhtari Sangchi, Vahid Saber Hamishagi:
    Software Security; A Vulnerability Activity Revisit. 866-872
    Electronic Edition (link) BibTeX
  • Sini Ruohomaa, Lea Kutvonen:
    Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations. 873-880
    Electronic Edition (link) BibTeX
  • Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani:
    A Survey on Trust and Reputation Schemes in Ad Hoc Networks. 881-886
    Electronic Edition (link) BibTeX
  • Stefan Katzenbeisser, Milan Petkovic:
    Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. 889-895
    Electronic Edition (link) BibTeX
  • Yousof Al-Hammadi, Uwe Aickelin:
    Detecting Bots Based on Keylogging Activities. 896-902
    Electronic Edition (link) BibTeX
  • Elke Franz, Christin Groba, Thomas Springer, Mike Bergmann:
    A Comprehensive Approach for Context-dependent Privacy Management. 903-910
    Electronic Edition (link) BibTeX
  • Steffen Weiss, Martin Wahl, Michael Tielemann, Klaus Meyer-Wegener:
    Traceable Quantitative Risk Assessment Applied to Investment Decision for Local Backups. 911-920
    Electronic Edition (link) BibTeX
  • Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Yautsiukhin:
    Quantitative Assessment of Enterprise Security System. 921-928
    Electronic Edition (link) BibTeX
  • Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis:
    Clustering Oriented Architectures in Medical Sensor Environments. 929-934
    Electronic Edition (link) BibTeX
  • Lillian Røstad:
    An Initial Model and a Discussion of Access Control in Patient Controlled Health Records. 935-942
    Electronic Edition (link) BibTeX
  • Sigurd Eskeland, Vladimir A. Oleshchuk:
    Secure Team-Based EPR Access Acquisition in Wireless Networks. 943-949
    Electronic Edition (link) BibTeX
  • Melanie Tupper, A. Nur Zincir-Heywood:
    VEA-bility Security Metric: A Network Security Analysis Tool. 950-957
    Electronic Edition (link) BibTeX
  • Stefan G. Weber, Andreas Heinemann, Max Mühlhäuser:
    Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments. 958-964
    Electronic Edition (link) BibTeX
  • Victor Korobitsin, Sergey Ilyin:
    GOST-28147 Encryption Implementation on Graphics Processing Units. 967-974
    Electronic Edition (link) BibTeX
  • Fanny Coudert, Jos Dumortier:
    Intelligent Video Surveillance Networks: Data Protection Challenges. 975-981
    Electronic Edition (link) BibTeX
  • Amin Hassanzadeh, Babak Sadeghian:
    Intrusion Detection with Data Correlation Relation Graph. 982-989
    Electronic Edition (link) BibTeX
  • Josep Domingo-Ferrer, Vicenç Torra:
    A Critique of k-Anonymity and Some of Its Enhancements. 990-993
    Electronic Edition (link) BibTeX
  • Vicenç Torra, Susana Ladra:
    Cluster-Specific Information Loss Measures in Data Privacy: A Review. 994-999
    Electronic Edition (link) BibTeX
  • Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella:
    Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. 1000-1007
    Electronic Edition (link) BibTeX
  • Boustia Narhimene, Mokhtari Aicha:
    Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach. 1008-1012
    Electronic Edition (link) BibTeX
  • Georgios Kalogridis, Chris J. Mitchell:
    Using Non-adaptive Group Testing to Construct Spy Agent Routes. 1013-1019
    Electronic Edition (link) BibTeX
  • Gerardo Canfora, Bice Cavallo:
    A Bayesian Approach for on-Line Max Auditing. 1020-1027
    Electronic Edition (link) BibTeX
  • Irfan Ahmed, Kyung-suk Lhee:
    Detection of Malcodes by Packet Classification. 1028-1035
    Electronic Edition (link) BibTeX
  • Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Klopotek:
    Performance of a Strategy Based Packets Forwarding in Ad Hoc Networks. 1036-1043
    Electronic Edition (link) BibTeX
  • Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair:
    Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy. 1044-1051
    Electronic Edition (link) BibTeX
  • Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit, Karim Tamine:
    AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes. 1052-1059
    Electronic Edition (link) BibTeX
  • Agusti Solanas, Gloria Pujol, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz:
    A Post-processing Method to Lessen k-Anonymity Dissimilarities. 1060-1066
    Electronic Edition (link) BibTeX
  • Zhiyao Liang, Rakesh M. Verma:
    Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols. 1067-1074
    Electronic Edition (link) BibTeX
  • Duffy Angevine, A. Nur Zincir-Heywood:
    A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set. 1075-1079
    Electronic Edition (link) BibTeX
  • Yasuhiro Ohtaki:
    Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries. 1083-1090
    Electronic Edition (link) BibTeX
  • Karel Wouters, Koen Simoens, Danny Lathouwers, Bart Preneel:
    Secure and Privacy-Friendly Logging for eGovernment Services. 1091-1096
    Electronic Edition (link) BibTeX
  • Flora Amato, Valentina Casola, Antonino Mazzeo, Valeria Vittorini:
    The REM Framework for Security Evaluation. 1097-1103
    Electronic Edition (link) BibTeX
  • René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst:
    Static Validation of Licence Conformance Policies. 1104-1111
    Electronic Edition (link) BibTeX
  • Fabio Massacci, Katsiaryna Naliuka:
    Towards Practical Security Monitors of UML Policies for Mobile Applications. 1112-1119
    Electronic Edition (link) BibTeX
  • Fabio Martinelli, Ilaria Matteucci:
    Synthesis of Local Controller Programs for Enforcing Global Security Properties. 1120-1127
    Electronic Edition (link) BibTeX
  • Stefano Bistarelli, Fabio Martinelli, Francesco Santini:
    Weighted Datalog and Levels of Trust. 1128-1134
    Electronic Edition (link) BibTeX
  • Alexander Pretschner, Thomas Walter:
    Negotiation of Usage Control Policies - Simply the Best? 1135-1136
    Electronic Edition (link) BibTeX
  • Albin Zuccato, Viktor Endersz, Nils Daniels:
    Security Requirement Engineering at a Telecom Provider. 1139-1147
    Electronic Edition (link) BibTeX
  • Takao Okubo, Hidehiko Tanaka:
    Identifying Security Aspects in Early Development Stages. 1148-1155
    Electronic Edition (link) BibTeX
  • Thomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen:
    Using Security Patterns to Combine Security Metrics. 1156-1163
    Electronic Edition (link) BibTeX
  • Per Håkon Meland, Jostein Jensen:
    Secure Software Design in Practice. 1164-1171
    Electronic Edition (link) BibTeX
  • Martin Gilje Jaatun, Inger Anne Tøndel:
    Covering Your Assets in Software Engineering. 1172-1179
    Electronic Edition (link) BibTeX
  • Shangping Ren, Kevin A. Kwiat:
    A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. 1180-1187
    Electronic Edition (link) BibTeX
  • Sarah Whittaker, Mohammad Zulkernine, Karen Rudie:
    Towards Incorporating Discrete-Event Systems in Secure Software Development. 1188-1195
    Electronic Edition (link) BibTeX
  • James A. Kupsch, Barton P. Miller:
    How to Open a File and Not Get Hacked. 1196-1203
    Electronic Edition (link) BibTeX
  • Holger Peine:
    Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of Rules. 1204-1209
    Electronic Edition (link) BibTeX
  • Vincenzo De Florio, Chris Blondia:
    Adaptive Data Integrity through Dynamically Redundant Data Structures. 1213-1218
    Electronic Edition (link) BibTeX
  • Daisuke Horie, Shoichi Morimoto, Noor Azimah, Yuichi Goto, Jingde Cheng:
    ISEDS: An Information Security Engineering Database System Based on ISO Standards. 1219-1225
    Electronic Edition (link) BibTeX
  • Daniel Slamanig, Christian Stingl:
    Privacy Aspects of eHealth. 1226-1233
    Electronic Edition (link) BibTeX
  • Kaliappa Nadar Ravindran, Jiang Wu, Kevin A. Kwiat, Ali Sabbir:
    Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks. 1234-1239
    Electronic Edition (link) BibTeX
  • Yudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone:
    Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. 1240-1247
    Electronic Edition (link) BibTeX
  • Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
    Implementing Multidimensional Security into OLAP Tools. 1248-1253
    Electronic Edition (link) BibTeX
  • Nasrullah Memon, David L. Hicks:
    Detecting Key Players in 11-M Terrorist Network: A Case Study. 1254-1259
    Electronic Edition (link) BibTeX
  • Dong Seong Kim, Muhammad Anwarul Azim, Jong Sou Park:
    Privacy Preserving Support Vector Machines in Wireless Sensor Networks. 1260-1265
    Electronic Edition (link) BibTeX
  • Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri:
    An Image Encryption System by Cellular Automata with Memory. 1266-1271
    Electronic Edition (link) BibTeX
  • Chik How Tan:
    Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. 1275-1281
    Electronic Edition (link) BibTeX
  • Tomohiro Kobori, Hiroaki Kikuchi, Masato Terada:
    Internet Observation with ISDAS: How Long Does a Worm Perform Scanning? 1282-1286
    Electronic Edition (link) BibTeX
  • Tsukasa Endo, Isao Echizen, Hiroshi Yoshiura:
    Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes. 1287-1293
    Electronic Edition (link) BibTeX
  • Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko:
    Enocoro-80: A Hardware Oriented Stream Cipher. 1294-1300
    Electronic Edition (link) BibTeX
  • Marko Hölbl, Tatjana Welzer:
    Cryptanalysis and Improvement of an ‘Improved Remote Authentication Scheme with Smart Card’. 1301-1305
    Electronic Edition (link) BibTeX
  • Paul Rubel, Michael Atighetchi, Partha Pal, Martin Fong, Richard O'Brien:
    Effective Monitoring of a Survivable Distributed Networked Information System. 1306-1312
    Electronic Edition (link) BibTeX
  • Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi:
    Design of an FDB based Intra-domain Packet Traceback System. 1313-1318
    Electronic Edition (link) BibTeX
  • Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
    An Independent Evaluation of Web Timing Attack and its Countermeasure. 1319-1324
    Electronic Edition (link) BibTeX
  • Arjan Durresi, Mimoza Durresi, Leonard Barolli:
    Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks. 1325-1331
    Electronic Edition (link) BibTeX
  • Qingsong Ye, Huaxiong Wang, Christophe Tartary:
    Privacy-Preserving Distributed Set Intersection. 1332-1339
    Electronic Edition (link) BibTeX
  • Yo Mashimo, Shintaro Ueda, Yasutaka Shinzaki, Hiroshi Shigeno:
    Examination of Forwarding Obstruction Attacks in Structured Overlay Networks. 1340-1345
    Electronic Edition (link) BibTeX
  • Abdulah Abdulah Zadeh:
    A Novel Approach for Multiplication over GF(2m) in Polynomial Basis Representation. 1346-1351
    Electronic Edition (link) BibTeX
  • Benjamin Turnbull, Jill Slay:
    Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. 1355-1360
    Electronic Edition (link) BibTeX
  • Joshua Broadway, Benjamin Turnbull, Jill Slay:
    Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. 1361-1368
    Electronic Edition (link) BibTeX
  • Christopher Hargreaves, Howard Chivers:
    Recovery of Encryption Keys from Memory Using a Linear Scan. 1369-1376
    Electronic Edition (link) BibTeX
  • Jooyoung Lee:
    Proposal for Efficient Searching and Presentation in Digital Forensics. 1377-1381
    Electronic Edition (link) BibTeX
  • Bin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun:
    Secure Steganography in Compressed Video Bitstreams. 1382-1387
    Electronic Edition (link) BibTeX
  • Kweku K. Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff:
    Considerations Towards a Cyber Crime Profiling System. 1388-1393
    Electronic Edition (link) BibTeX
  • Raimundas Matulevicius, Nicolas Mayer, Patrick Heymans:
    Alignment of Misuse Cases with Security Risk Management. 1397-1404
    Electronic Edition (link) BibTeX
  • Bernhard Thalheim, Sabah S. Al-Fedaghi, Khaled Al-Saqabi:
    Information Stream Based Model for Organizing Security. 1405-1412
    Electronic Edition (link) BibTeX
  • Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
    Security Requirements Variability for Software Product Lines. 1413-1420
    Electronic Edition (link) BibTeX
  • Koen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen:
    Transforming Security Requirements into Architecture. 1421-1428
    Electronic Edition (link) BibTeX
  • Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang:
    Modelling Security Properties in a Grid-based Operating System with Anti-Goals. 1429-1436
    Electronic Edition (link) BibTeX
  • Nicola Zeni, Nadzeya Kiyavitskaya, James R. Cordy, Luisa Mich, John Mylopoulos:
    Annotating Regulations Using Cerno: An Application to Italian Documents - Extended Abstract. 1437-1442
    Electronic Edition (link) BibTeX
  • Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, Mohamed Eltoweissy:
    Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements. 1443-1450
    Electronic Edition (link) BibTeX
  • Orhan Cetinkaya:
    Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract). 1451-1456
    Electronic Edition (link) BibTeX

转载于:https://www.cnblogs.com/Aioria0622/archive/2008/06/27/1231080.html

你可能感兴趣的:(Availability, Reliability and Security in Ad Hoc, 2008)