- Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli:
Securing Telehealth Applications in a Web-Based e-Health Portal. 3-9
Electronic Edition (link) BibTeX - Andreas Janecek, Wilfried N. Gansterer, K. Ashwin Kumar:
Multi-Level Reputation-Based Greylisting. 10-17
Electronic Edition (link) BibTeX - Kim Wuyts, Riccardo Scandariato, Geert Claeys, Wouter Joosen:
Hardening XDS-Based Architectures. 18-25
Electronic Edition (link) BibTeX - Svein Yngvar Willassen:
Finding Evidence of Antedating in Digital Investigations. 26-32
Electronic Edition (link) BibTeX - Navid Farazmand, Mahdi Fazeli, Seyed Ghassem Miremadi:
FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program Interruption. 33-38
Electronic Edition (link) BibTeX - Bernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer:
Economic and Security Aspects of Applying a Threshold Scheme in e-Health. 39-46
Electronic Edition (link) BibTeX - Mehdi Kiani, Andrew Clark, George M. Mohay:
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. 47-55
Electronic Edition (link) BibTeX - Jehan-François Pâris, Thomas J. E. Schwarz:
On the Possibility of Small, Service-Free Disk Based Storage Systems. 56-63
Electronic Edition (link) BibTeX - Heine Kolltveit, Svein-Olaf Hvasshovd:
Efficient High Availability Commit Processing. 64-71
Electronic Edition (link) BibTeX - Alfredo Pironti, Riccardo Sisto:
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. 72-79
Electronic Edition (link) BibTeX - Antonio Maña, Gimena Pujol:
Towards Formal Specification of Abstract Security Properties. 80-87
Electronic Edition (link) BibTeX - Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani:
A Behavioral Model of Ideologically-motivated “Snowball” Attacks. 88-95
Electronic Edition (link) BibTeX - Igor Siveroni, Andrea Zisman, George Spanoudakis:
Property Specification and Static Verification of UML Models. 96-103
Electronic Edition (link) BibTeX - Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. 104-111
Electronic Edition (link) BibTeX - Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. 112-119
Electronic Edition (link) BibTeX - J. R. Juárez-Rodríguez, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil, Francesc D. Muñoz-Escoí:
A Database Replication Protocol Where Multicast Writesets Are Always Committed. 120-127
Electronic Edition (link) BibTeX - Nataliia Bielova, Marco Dalla Torre, Nicola Dragoni, Ida Siahaan:
Matching Policies with Security Claims of Mobile Applications. 128-135
Electronic Edition (link) BibTeX - David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. 136-143
Electronic Edition (link) BibTeX - Amir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi:
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. 144-152
Electronic Edition (link) BibTeX - Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. 153-160
Electronic Edition (link) BibTeX - Esma Aïmeur, Gilles Brassard, José Manuel Fernandez, Flavien Serge Mani Onana, Zbigniew Rakowski:
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. 161-170
Electronic Edition (link) BibTeX - Natsumi Kitajima, Yuichi Goto, Jingde Cheng:
Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems. 171-178
Electronic Edition (link) BibTeX - Simon Tjoa, Stefan Jakoubi, Gerald Quirchmayr:
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology. 179-186
Electronic Edition (link) BibTeX - Thomas Neubauer, Johannes Heurix:
Defining Secure Business Processes with Respect to Multiple Objectives. 187-194
Electronic Edition (link) BibTeX - Denis Hatebur, Maritta Heisel, Holger Schmidt:
Analysis and Component-based Realization of Security Requirements. 195-203
Electronic Edition (link) BibTeX - Yacine Bouzida, Christophe Mangin:
A Framework for Detecting Anomalies in VoIP Networks. 204-211
Electronic Edition (link) BibTeX - Kuan-Ta Chen, Jing-Kai Lou:
Rapid Detection of Constant-Packet-Rate Flows. 212-220
Electronic Edition (link) BibTeX - Andriy Panchenko, Lexi Pimenidis, Johannes Renner:
Performance Analysis of Anonymous Communication Channels Provided by Tor. 221-228
Electronic Edition (link) BibTeX - Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca:
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets. 229-236
Electronic Edition (link) BibTeX - William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham:
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. 237-244
Electronic Edition (link) BibTeX - Yonghua You, Mohammad Zulkernine, Anwar Haque:
A Distributed Defense Framework for Flooding-Based DDoS Attacks. 245-252
Electronic Edition (link) BibTeX - Liwen He, Paul Botham:
Pure MPLS Technology. 253-259
Electronic Edition (link) BibTeX - Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He:
Symmetric Active/Active Replication for Dependent Services. 260-267
Electronic Edition (link) BibTeX - Marcus Völp:
Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. 268-275
Electronic Edition (link) BibTeX - David Byers, Nahid Shahmehri:
A Cause-Based Approach to Preventing Software Vulnerabilities. 276-283
Electronic Edition (link) BibTeX - Shanai Ardi, Nahid Shahmehri:
Integrating a Security Plug-in with the OpenUP/Basic Development Process. 284-291
Electronic Edition (link) BibTeX - Jostein Jensen:
A Novel Testbed for Detection of Malicious Software Functionality. 292-301
Electronic Edition (link) BibTeX - Syrine Tlili, Mourad Debbabi:
Type and Effect Annotations for Safe Memory Access in C. 302-309
Electronic Edition (link) BibTeX - Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos Milios:
Adaptabilty of a GP Based IDS on Wireless Networks. 310-318
Electronic Edition (link) BibTeX - Liwei Kuang, Mohammad Zulkernine:
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. 319-326
Electronic Edition (link) BibTeX - Lukasz Chmielewski, Jaap-Henk Hoepman:
Fuzzy Private Matching (Extended Abstract). 327-334
Electronic Edition (link) BibTeX - Jens-Uwe Bußer, Steffen Fries, Martin Otto, Peter Hartmann:
Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge. 335-343
Electronic Edition (link) BibTeX - Christian Schläger, Günther Pernul:
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. 344-351
Electronic Edition (link) BibTeX - Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho:
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. 352-359
Electronic Edition (link) BibTeX - José María de Fuentes, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda:
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. 363-368
Electronic Edition (link) BibTeX - Josep M. Bernabé-Gisbert, Francesc D. Muñoz-Escoí:
Extending Mixed Serialisation Graphs to Replicated Environments. 369-375
Electronic Edition (link) BibTeX - Frederic Stumpf, Claudia Eckert, Shane Balfe:
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. 376-382
Electronic Edition (link) BibTeX - Alexandre Vorobiev, Rudolph E. Seviora:
Fuzzy Belief-Based Supervision. 383-389
Electronic Edition (link) BibTeX - Rubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí:
Ensuring Progress in Amnesiac Replicated Systems. 390-396
Electronic Edition (link) BibTeX - R. J. Hulsebosch, P. W. G. Ebben:
Enhancing Face Recognition with Location Information. 397-403
Electronic Edition (link) BibTeX - Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer:
A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors. 404-409
Electronic Edition (link) BibTeX - Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen:
Defending On-Line Web Application Security with User-Behavior Surveillance. 410-415
Electronic Edition (link) BibTeX - Nelly A. Delessy, Eduardo B. Fernández:
A Pattern-Driven Security Process for SOA Applications. 416-421
Electronic Edition (link) BibTeX - Pablo Neira Ayuso, Laurent Lefèvre, Denis Barbaron, Rafael M. Gasca:
Towards a Dependable Architecture for Highly Available Internet Services. 422-427
Electronic Edition (link) BibTeX - Alan Stewart, Maurice Clint, Terry Harmer, Peter Kilpatrick, Ronald H. Perrott, Joaquim Gabarró:
Assessing the Reliability and Cost of Web and Grid Orchestrations. 428-433
Electronic Edition (link) BibTeX - Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi:
Application-Oriented Trust in Distributed Computing. 434-439
Electronic Edition (link) BibTeX - Bradley Markides, Marijke Coetzee:
BlueTrust in a Real World. 440-445
Electronic Edition (link) BibTeX - Ananda Swarup Das, Jitu Kumar Keshri, Kannan Srinathan, Vaibhav Srivastava:
Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles. 446-451
Electronic Edition (link) BibTeX - Thomas H. Morris, V. S. S. Nair:
Privacy Protected ELF for Private Computing on Public Platforms. 452-457
Electronic Edition (link) BibTeX - Chih-Yin Lin:
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism. 458-460
Electronic Edition (link) BibTeX - Xiaolei Li, Jin Tian, Tingdi Zhao:
An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200. 461-466
Electronic Edition (link) BibTeX - Ryma Abbassi, Sihem Guemara El Fatmi:
A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case. 467-472
Electronic Edition (link) BibTeX - He Guang-Yu, Wen Ying-You, Zhao Hong:
SPIT Detection and Prevention Method in VoIP Environment. 473-478
Electronic Edition (link) BibTeX - Ezzat Kirmani, Cynthia S. Hood:
A New Approach to Analysis of Interval Availability. 479-483
Electronic Edition (link) BibTeX - Xiang-he Yang, Hua-ping Hu, Xin Chen:
SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol. 484-490
Electronic Edition (link) BibTeX - Mehdi Dehbashi, Vahid Lari, Seyed Ghassem Miremadi, Mohammad Shokrollah-Shirazi:
Fault Effects in FlexRay-Based Networks with Hybrid Topology. 491-496
Electronic Edition (link) BibTeX - Xun Yi, Mike Faulkner, Eiji Okamoto:
Secure Wireless Sensor Networks. 497-502
Electronic Edition (link) BibTeX - Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa:
SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. 503-508
Electronic Edition (link) BibTeX - Meiko Jensen, Nils Gruschka, Norbert Luttenberger:
The Impact of Flooding Attacks on Network-based Services. 509-513
Electronic Edition (link) BibTeX - Emili Miedes, Francesc D. Muñoz-Escoí:
Managing Priorities in Atomic Multicast Protocols. 514-519
Electronic Edition (link) BibTeX - Asier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez:
Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. 520-525
Electronic Edition (link) BibTeX - Stefan Lindskog, Anna Brunstrom:
An End-to-End Security Solution for SCTP. 526-531
Electronic Edition (link) BibTeX - Hongji Wang, Gang Yao, Qingshan Jiang:
An Identity-Based Group Key Agreement Protocol from Pairing. 532-537
Electronic Edition (link) BibTeX - Gang Yao, Hongji Wang, Qingshan Jiang:
An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. 538-543
Electronic Edition (link) BibTeX - Adel Almohammad, Robert M. Hierons, Gheorghita Ghinea:
High Capacity Steganographic Method Based Upon JPEG. 544-549
Electronic Edition (link) BibTeX - Elisavet Konstantinou:
Cluster-based Group Key Agreement for Wireless Ad hoc Networks. 550-557
Electronic Edition (link) BibTeX - Chen Zhi-li, Huang Liu-sheng, Yu Zhen-shan, Li Ling-jun, Yang Wei:
A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. 558-563
Electronic Edition (link) BibTeX - Bo Zhang, Kai Han, Binoy Ravindran, E. Douglas Jensen:
RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks. 564-571
Electronic Edition (link) BibTeX - Jan Willemson, Arne Ansper:
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. 572-577
Electronic Edition (link) BibTeX - Liang Xiao, Javier Vicente, Carlos Sáez, Andrew Peet, Alex Gibb, Paul H. Lewis, Srinandan Dasmahapatra, Madalina Croitoru, Horacio González-Vélez, Magí Lluch i Ariet, David Dupplaw:
A Security Model and its Application to a Distributed Decision Support System for Healthcare. 578-585
Electronic Edition (link) BibTeX - Salvador Cavadini, Diego Cheda:
Run-time Information Flow Monitoring based on Dynamic Dependence Graphs. 586-591
Electronic Edition (link) BibTeX - Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli:
Automated Process Classi?cation Framework using SELinux Security Context. 592-596
Electronic Edition (link) BibTeX - Judith E. Y. Rossebø, Rolv Bræk:
Using Composition Policies to Manage Authentication and Authorization Patterns and Services. 597-603
Electronic Edition (link) BibTeX - Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo, Pakorn Leesutthipornchai:
Providing Fault Tolerance in Wireless Backhaul Network Design with Path Restoration. 604-609
Electronic Edition (link) BibTeX - Adrian Frei, Marc Rennhard:
Histogram Matrix: Log File Visualization for Anomaly Detection. 610-617
Electronic Edition (link) BibTeX - Salem Benferhat, Karim Tabia:
Context-based Profiling for Anomaly Intrusion Detection with Diagnosis. 618-623
Electronic Edition (link) BibTeX - Ulf Larson, Erland Jonsson, Stefan Lindskog:
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection. 624-629
Electronic Edition (link) BibTeX - Youhui Zhang, Hongyi Wang, Yu Gu, Dongsheng Wang:
IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI. 630-635
Electronic Edition (link) BibTeX - Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani:
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. 636-641
Electronic Edition (link) BibTeX - Gerald Madlmayr, Josef Langer, Christian Kantner, Josef Scharinger:
NFC Devices: Security and Privacy. 642-647
Electronic Edition (link) BibTeX - Nima Mehdizadeh, Mohammad Shokrolah-Shirazi, Seyed Ghassem Miremadi:
Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessor. 648-652
Electronic Edition (link) BibTeX - Guna Santos, Angelo Duarte, Dolores Rexachs, Emilio Luque:
Increasing the Performability of Computer Clusters Using RADIC II. 653-658
Electronic Edition (link) BibTeX - Geoffroy Vallée, Kulathep Charoenpornwattana, Christian Engelmann, Anand Tikotekar, Chokchai Leangsuksun, Thomas Naughton, Stephen L. Scott:
A Framework for Proactive Fault Tolerance. 659-664
Electronic Edition (link) BibTeX - Sanjam Garg, Huzur Saran:
Anti-DDoS Virtualized Operating System. 667-674
Electronic Edition (link) BibTeX - Erin Farr, Richard Harper, Lisa Spainhower, Jimi Xenidis:
A Case for High Availability in a Virtualized Environment (HAVEN). 675-682
Electronic Edition (link) BibTeX - Stéphane Onno:
A Federated Physical and Logical Access Control Enforcement Model. 683-692
Electronic Edition (link) BibTeX - Octavian Catrina, Florian Kerschbaum:
Fostering the Uptake of Secure Multiparty Computation in E-Commerce. 693-700
Electronic Edition (link) BibTeX - Rafael Martínez-Peláez, Cristina Satizábal, Francisco Rico-Novella, Jordi Forné:
Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols. 701-708
Electronic Edition (link) BibTeX - Mathias Kohler, Andreas Schaad:
Avoiding Policy-based Deadlocks in Business Processes. 709-716
Electronic Edition (link) BibTeX - Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura:
A Secure High-Speed Identification Scheme for RFID Using Bloom Filters. 717-722
Electronic Edition (link) BibTeX - Youan Xiao:
New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. 723-726
Electronic Edition (link) BibTeX - Qi Wang, Yonglong Luo, Liusheng Huang:
Privacy-preserving Protocols for Finding the Convex Hulls. 727-732
Electronic Edition (link) BibTeX - Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi:
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. 733-740
Electronic Edition (link) BibTeX - Ascensión Hernández Encinas, Ángel Martín del Rey, J. L. Pérez Iglesias, Gerardo Rodríguez Sánchez, Araceli Queiruga Dios:
Cryptographic Properties of Second-Order Memory Elementary Cellular Automata. 741-745
Electronic Edition (link) BibTeX - Shengke Zeng, Mingxing He, Weidong Luo:
New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group. 746-751
Electronic Edition (link) BibTeX - Christian Schläger, Ludwig Fuchs, Günther Pernul:
Intensive Programme on Information and Communication Security. 752-757
Electronic Edition (link) BibTeX - Heinz Lothar Grob, Gereon Strauch, Christian Buddendick:
Applications for IT-Risk Management – Requirements and Practical Evaluation. 758-764
Electronic Edition (link) BibTeX - Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse:
Security Analysis of Role-based Separation of Duty with Workflows. 765-770
Electronic Edition (link) BibTeX - Stefan Böttcher, Rita Hartel, Matthias Kirschner:
Detecting Suspicious Relational Database Queries. 771-778
Electronic Edition (link) BibTeX - Denis Royer:
Assessing the Value of Enterprise Identity Management (EIdM) – Towards a Generic Evaluation Approach. 779-786
Electronic Edition (link) BibTeX - Mark E. Orwat, Timothy E. Levin, Cynthia E. Irvine:
An Ontological Approach to Secure MANET Management. 787-794
Electronic Edition (link) BibTeX - Roland Donat, Laurent Bouillaut, Patrice Aknin, Philippe Leray:
Reliability Analysis using Graphical Duration Models. 795-800
Electronic Edition (link) BibTeX - Mikel Larrea, Cristian Martín:
From Omega to ?P in the Crash-Recovery Failure Model with Unknown Membership. 801-806
Electronic Edition (link) BibTeX - Mario Anzures-García, Luz A. Sánchez-Gálvez:
Policy-based Group Organizational Structure Management using an Ontological Approach. 807-812
Electronic Edition (link) BibTeX - Carlos Blanco, Joaquín Lasheras, Rafael Valencia-García, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini:
A Systematic Review and Comparison of Security Ontologies. 813-820
Electronic Edition (link) BibTeX - Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Context Ontology for Secure Interoperability. 821-827
Electronic Edition (link) BibTeX - Kimmo Halunen, Pauli Rikula, Juha Röning:
On the Security of VSH in Password Schemes. 828-833
Electronic Edition (link) BibTeX - Zakaria Maamar, Quan Z. Sheng, Djamal Benslimane:
Sustaining Web Services High-Availability Using Communities. 834-841
Electronic Edition (link) BibTeX - Takeshi Tsuchiya, Marc Lihan, Hirokazu Yoshinaga, Kei'ichi Koyanagi:
Distributed Information Retrieval Service for Ubiquitous Services. 842-850
Electronic Edition (link) BibTeX - Davide Pozza, Riccardo Sisto:
A Lightweight Security Analyzer inside GCC. 851-858
Electronic Edition (link) BibTeX - Habib Seifzadeh, Mostafa Kermani, Mohsen Sadighi:
Dynamic Maintenance of Software Systems at Runtime. 859-865
Electronic Edition (link) BibTeX - Mohammad Ali Hadavi, Hossein Shirazi, Hasan Mokhtari Sangchi, Vahid Saber Hamishagi:
Software Security; A Vulnerability Activity Revisit. 866-872
Electronic Edition (link) BibTeX - Sini Ruohomaa, Lea Kutvonen:
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations. 873-880
Electronic Edition (link) BibTeX - Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani:
A Survey on Trust and Reputation Schemes in Ad Hoc Networks. 881-886
Electronic Edition (link) BibTeX - Stefan Katzenbeisser, Milan Petkovic:
Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. 889-895
Electronic Edition (link) BibTeX - Yousof Al-Hammadi, Uwe Aickelin:
Detecting Bots Based on Keylogging Activities. 896-902
Electronic Edition (link) BibTeX - Elke Franz, Christin Groba, Thomas Springer, Mike Bergmann:
A Comprehensive Approach for Context-dependent Privacy Management. 903-910
Electronic Edition (link) BibTeX - Steffen Weiss, Martin Wahl, Michael Tielemann, Klaus Meyer-Wegener:
Traceable Quantitative Risk Assessment Applied to Investment Decision for Local Backups. 911-920
Electronic Edition (link) BibTeX - Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Yautsiukhin:
Quantitative Assessment of Enterprise Security System. 921-928
Electronic Edition (link) BibTeX - Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis:
Clustering Oriented Architectures in Medical Sensor Environments. 929-934
Electronic Edition (link) BibTeX - Lillian Røstad:
An Initial Model and a Discussion of Access Control in Patient Controlled Health Records. 935-942
Electronic Edition (link) BibTeX - Sigurd Eskeland, Vladimir A. Oleshchuk:
Secure Team-Based EPR Access Acquisition in Wireless Networks. 943-949
Electronic Edition (link) BibTeX - Melanie Tupper, A. Nur Zincir-Heywood:
VEA-bility Security Metric: A Network Security Analysis Tool. 950-957
Electronic Edition (link) BibTeX - Stefan G. Weber, Andreas Heinemann, Max Mühlhäuser:
Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments. 958-964
Electronic Edition (link) BibTeX - Victor Korobitsin, Sergey Ilyin:
GOST-28147 Encryption Implementation on Graphics Processing Units. 967-974
Electronic Edition (link) BibTeX - Fanny Coudert, Jos Dumortier:
Intelligent Video Surveillance Networks: Data Protection Challenges. 975-981
Electronic Edition (link) BibTeX - Amin Hassanzadeh, Babak Sadeghian:
Intrusion Detection with Data Correlation Relation Graph. 982-989
Electronic Edition (link) BibTeX - Josep Domingo-Ferrer, Vicenç Torra:
A Critique of k-Anonymity and Some of Its Enhancements. 990-993
Electronic Edition (link) BibTeX - Vicenç Torra, Susana Ladra:
Cluster-Specific Information Loss Measures in Data Privacy: A Review. 994-999
Electronic Edition (link) BibTeX - Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella:
Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. 1000-1007
Electronic Edition (link) BibTeX - Boustia Narhimene, Mokhtari Aicha:
Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach. 1008-1012
Electronic Edition (link) BibTeX - Georgios Kalogridis, Chris J. Mitchell:
Using Non-adaptive Group Testing to Construct Spy Agent Routes. 1013-1019
Electronic Edition (link) BibTeX - Gerardo Canfora, Bice Cavallo:
A Bayesian Approach for on-Line Max Auditing. 1020-1027
Electronic Edition (link) BibTeX - Irfan Ahmed, Kyung-suk Lhee:
Detection of Malcodes by Packet Classification. 1028-1035
Electronic Edition (link) BibTeX - Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Klopotek:
Performance of a Strategy Based Packets Forwarding in Ad Hoc Networks. 1036-1043
Electronic Edition (link) BibTeX - Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair:
Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy. 1044-1051
Electronic Edition (link) BibTeX - Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit, Karim Tamine:
AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes. 1052-1059
Electronic Edition (link) BibTeX - Agusti Solanas, Gloria Pujol, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz:
A Post-processing Method to Lessen k-Anonymity Dissimilarities. 1060-1066
Electronic Edition (link) BibTeX - Zhiyao Liang, Rakesh M. Verma:
Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols. 1067-1074
Electronic Edition (link) BibTeX - Duffy Angevine, A. Nur Zincir-Heywood:
A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set. 1075-1079
Electronic Edition (link) BibTeX - Yasuhiro Ohtaki:
Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries. 1083-1090
Electronic Edition (link) BibTeX - Karel Wouters, Koen Simoens, Danny Lathouwers, Bart Preneel:
Secure and Privacy-Friendly Logging for eGovernment Services. 1091-1096
Electronic Edition (link) BibTeX - Flora Amato, Valentina Casola, Antonino Mazzeo, Valeria Vittorini:
The REM Framework for Security Evaluation. 1097-1103
Electronic Edition (link) BibTeX - René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst:
Static Validation of Licence Conformance Policies. 1104-1111
Electronic Edition (link) BibTeX - Fabio Massacci, Katsiaryna Naliuka:
Towards Practical Security Monitors of UML Policies for Mobile Applications. 1112-1119
Electronic Edition (link) BibTeX - Fabio Martinelli, Ilaria Matteucci:
Synthesis of Local Controller Programs for Enforcing Global Security Properties. 1120-1127
Electronic Edition (link) BibTeX - Stefano Bistarelli, Fabio Martinelli, Francesco Santini:
Weighted Datalog and Levels of Trust. 1128-1134
Electronic Edition (link) BibTeX - Alexander Pretschner, Thomas Walter:
Negotiation of Usage Control Policies - Simply the Best? 1135-1136
Electronic Edition (link) BibTeX - Albin Zuccato, Viktor Endersz, Nils Daniels:
Security Requirement Engineering at a Telecom Provider. 1139-1147
Electronic Edition (link) BibTeX - Takao Okubo, Hidehiko Tanaka:
Identifying Security Aspects in Early Development Stages. 1148-1155
Electronic Edition (link) BibTeX - Thomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen:
Using Security Patterns to Combine Security Metrics. 1156-1163
Electronic Edition (link) BibTeX - Per Håkon Meland, Jostein Jensen:
Secure Software Design in Practice. 1164-1171
Electronic Edition (link) BibTeX - Martin Gilje Jaatun, Inger Anne Tøndel:
Covering Your Assets in Software Engineering. 1172-1179
Electronic Edition (link) BibTeX - Shangping Ren, Kevin A. Kwiat:
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. 1180-1187
Electronic Edition (link) BibTeX - Sarah Whittaker, Mohammad Zulkernine, Karen Rudie:
Towards Incorporating Discrete-Event Systems in Secure Software Development. 1188-1195
Electronic Edition (link) BibTeX - James A. Kupsch, Barton P. Miller:
How to Open a File and Not Get Hacked. 1196-1203
Electronic Edition (link) BibTeX - Holger Peine:
Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of Rules. 1204-1209
Electronic Edition (link) BibTeX - Vincenzo De Florio, Chris Blondia:
Adaptive Data Integrity through Dynamically Redundant Data Structures. 1213-1218
Electronic Edition (link) BibTeX - Daisuke Horie, Shoichi Morimoto, Noor Azimah, Yuichi Goto, Jingde Cheng:
ISEDS: An Information Security Engineering Database System Based on ISO Standards. 1219-1225
Electronic Edition (link) BibTeX - Daniel Slamanig, Christian Stingl:
Privacy Aspects of eHealth. 1226-1233
Electronic Edition (link) BibTeX - Kaliappa Nadar Ravindran, Jiang Wu, Kevin A. Kwiat, Ali Sabbir:
Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks. 1234-1239
Electronic Edition (link) BibTeX - Yudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone:
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. 1240-1247
Electronic Edition (link) BibTeX - Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Implementing Multidimensional Security into OLAP Tools. 1248-1253
Electronic Edition (link) BibTeX - Nasrullah Memon, David L. Hicks:
Detecting Key Players in 11-M Terrorist Network: A Case Study. 1254-1259
Electronic Edition (link) BibTeX - Dong Seong Kim, Muhammad Anwarul Azim, Jong Sou Park:
Privacy Preserving Support Vector Machines in Wireless Sensor Networks. 1260-1265
Electronic Edition (link) BibTeX - Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri:
An Image Encryption System by Cellular Automata with Memory. 1266-1271
Electronic Edition (link) BibTeX - Chik How Tan:
Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. 1275-1281
Electronic Edition (link) BibTeX - Tomohiro Kobori, Hiroaki Kikuchi, Masato Terada:
Internet Observation with ISDAS: How Long Does a Worm Perform Scanning? 1282-1286
Electronic Edition (link) BibTeX - Tsukasa Endo, Isao Echizen, Hiroshi Yoshiura:
Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes. 1287-1293
Electronic Edition (link) BibTeX - Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko:
Enocoro-80: A Hardware Oriented Stream Cipher. 1294-1300
Electronic Edition (link) BibTeX - Marko Hölbl, Tatjana Welzer:
Cryptanalysis and Improvement of an ‘Improved Remote Authentication Scheme with Smart Card’. 1301-1305
Electronic Edition (link) BibTeX - Paul Rubel, Michael Atighetchi, Partha Pal, Martin Fong, Richard O'Brien:
Effective Monitoring of a Survivable Distributed Networked Information System. 1306-1312
Electronic Edition (link) BibTeX - Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi:
Design of an FDB based Intra-domain Packet Traceback System. 1313-1318
Electronic Edition (link) BibTeX - Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
An Independent Evaluation of Web Timing Attack and its Countermeasure. 1319-1324
Electronic Edition (link) BibTeX - Arjan Durresi, Mimoza Durresi, Leonard Barolli:
Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks. 1325-1331
Electronic Edition (link) BibTeX - Qingsong Ye, Huaxiong Wang, Christophe Tartary:
Privacy-Preserving Distributed Set Intersection. 1332-1339
Electronic Edition (link) BibTeX - Yo Mashimo, Shintaro Ueda, Yasutaka Shinzaki, Hiroshi Shigeno:
Examination of Forwarding Obstruction Attacks in Structured Overlay Networks. 1340-1345
Electronic Edition (link) BibTeX - Abdulah Abdulah Zadeh:
A Novel Approach for Multiplication over GF(2m) in Polynomial Basis Representation. 1346-1351
Electronic Edition (link) BibTeX - Benjamin Turnbull, Jill Slay:
Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. 1355-1360
Electronic Edition (link) BibTeX - Joshua Broadway, Benjamin Turnbull, Jill Slay:
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. 1361-1368
Electronic Edition (link) BibTeX - Christopher Hargreaves, Howard Chivers:
Recovery of Encryption Keys from Memory Using a Linear Scan. 1369-1376
Electronic Edition (link) BibTeX - Jooyoung Lee:
Proposal for Efficient Searching and Presentation in Digital Forensics. 1377-1381
Electronic Edition (link) BibTeX - Bin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun:
Secure Steganography in Compressed Video Bitstreams. 1382-1387
Electronic Edition (link) BibTeX - Kweku K. Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff:
Considerations Towards a Cyber Crime Profiling System. 1388-1393
Electronic Edition (link) BibTeX - Raimundas Matulevicius, Nicolas Mayer, Patrick Heymans:
Alignment of Misuse Cases with Security Risk Management. 1397-1404
Electronic Edition (link) BibTeX - Bernhard Thalheim, Sabah S. Al-Fedaghi, Khaled Al-Saqabi:
Information Stream Based Model for Organizing Security. 1405-1412
Electronic Edition (link) BibTeX - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Security Requirements Variability for Software Product Lines. 1413-1420
Electronic Edition (link) BibTeX - Koen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen:
Transforming Security Requirements into Architecture. 1421-1428
Electronic Edition (link) BibTeX - Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang:
Modelling Security Properties in a Grid-based Operating System with Anti-Goals. 1429-1436
Electronic Edition (link) BibTeX - Nicola Zeni, Nadzeya Kiyavitskaya, James R. Cordy, Luisa Mich, John Mylopoulos:
Annotating Regulations Using Cerno: An Application to Italian Documents - Extended Abstract. 1437-1442
Electronic Edition (link) BibTeX - Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, Mohamed Eltoweissy:
Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements. 1443-1450
Electronic Edition (link) BibTeX - Orhan Cetinkaya:
Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract). 1451-1456
Electronic Edition (link) BibTeX