ARES 2007: Vienna, Austria

Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria. IEEE Computer Society 2007 BibTeX

Session 1: Trust Model & Trust Management

  • Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell:
    Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. 3-10
    Electronic Edition (link) BibTeX
  • Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone:
    From Trust to Dependability through Risk Analysis. 19-26
    Electronic Edition (link) BibTeX
  • Jatinder Singh, Jean Bacon, Ken Moody:
    Dynamic trust domains for secure, private, technology-assisted living. 27-34
    Electronic Edition (link) BibTeX
  • Ching Lin, Vijay Varadharajan:
    A Hybrid Trust Model for Enhancing Security in Distributed Systems. 35-42
    Electronic Edition (link) BibTeX
  • Wilfried N. Gansterer, Andreas Janecek, Peter Lechner:
    A Reliable Component-Based Architecture for E-Mail Filtering. 43-52
    Electronic Edition (link) BibTeX

Session 2: Availability, Fault-Tolerant & Recovery

  • Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Goeschka:
    Availability and Performance of the Adaptive Voting Replication. 53-60
    Electronic Edition (link) BibTeX
  • Marcin Gorawski, Pawel Marks:
    Distributed Stream Processing Analysis in High Availability Context. 61-68
    Electronic Edition (link) BibTeX
  • Stefan Beyer, Francesc D. Muñoz-Escoí, Pablo Galdámez:
    Implementing Network Partition-Aware Fault-Tolerant CORBA Systems. 69-76
    Electronic Edition (link) BibTeX
  • Bin Rong, Fred Douglis, Cathy H. Xia, Zhen Liu:
    Failure Recovery in Cooperative Data Stream Analysis. 77-84
    Electronic Edition (link) BibTeX
  • José Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Bettina Kemme:
    A Recovery Protocol for Middleware Replicated Databases Providing GSI. 85-92
    Electronic Edition (link) BibTeX
  • Rubén de Juan-Marín, Hendrik Decker, Francesc D. Muñoz-Escoí:
    Revisiting Hot Passive Replication. 93-102
    Electronic Edition (link) BibTeX

Session 3: Reputation Management & Trust

  • Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli:
    Reputation Management Survey. 103-111
    Electronic Edition (link) BibTeX
  • Audun Jøsang, Jochen Haller:
    Dirichlet Reputation Systems. 112-119
    Electronic Edition (link) BibTeX
  • Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
    Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. 120-127
    Electronic Edition (link) BibTeX
  • Stefan Böttcher, Sebastian Obermeier:
    Secure Anonymous Union Computation Among Malicious Partners. 128-138
    Electronic Edition (link) BibTeX

Session 4: Privacy & Access Control

  • Oliver Jorns, Oliver Jung, Gerald Quirchmayr:
    A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications. 139-146
    Electronic Edition (link) BibTeX
  • Pankaj Bhaskar, Sheikh Iqbal Ahamed:
    Privacy in Pervasive Computing and Open Issues. 147-154
    Electronic Edition (link) BibTeX
  • Christin Groba, Stephan Grob, Thomas Springer:
    Context-Dependent Access Control for Contextual Information. 155-161
    Electronic Edition (link) BibTeX
  • Dongxi Liu:
    Bytecode Verification for Enhanced JVM Access Control. 162-172
    Electronic Edition (link) BibTeX

Session 5: Failure Detection & Attack Prevention

  • P. Hazy, Rudolph E. Seviora:
    Automatic Failure Detection with Separation of Concerns. 173-181
    Electronic Edition (link) BibTeX
  • Mourad Elhadef, Azzedine Boukerche:
    A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor Networks. 182-189
    Electronic Edition (link) BibTeX
  • Yanlan Ding, Guiping Su:
    Intrusion detection system for signal based SIP attacks through timed HCPN. 190-197
    Electronic Edition (link) BibTeX
  • Muhammad Sher, Thomas Magedanz:
    3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. 198-205
    Electronic Edition (link) BibTeX
  • Meriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri:
    Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. 206-212
    Electronic Edition (link) BibTeX
  • Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin:
    Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network. 213-222
    Electronic Edition (link) BibTeX

Session 6: Authentication & Authorisation

  • Anders Moen Hagalisletto:
    Errors in Attacks on Authentication Protocols. 223-229
    Electronic Edition (link) BibTeX
  • Christian Schläger, Monika Ganslmayer:
    Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. 230-237
    Electronic Edition (link) BibTeX
  • Tieyan Li, Robert Deng:
    Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. 238-245
    Electronic Edition (link) BibTeX
  • Leila Ismail:
    Authentication Mechanisms for Mobile Agents. 246-253
    Electronic Edition (link) BibTeX
  • Yuri Demchenko, Leon Gommans, Cees de Laat:
    Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning. 254-262
    Electronic Edition (link) BibTeX
  • Georg Treu, Florian Fuchs, Christiane Dargatz:
    Implicit Authorization for Accessing Location Data in a Social Context. 263-272
    Electronic Edition (link) BibTeX

Session 7: Security Algorithm & Framework

  • Abinandhan Chandrasekaran, Bhavani M. Thuraisingham:
    Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances. 273-280
    Electronic Edition (link) BibTeX
  • M. Zeghid, Belgacem Bouallegue, Adel Baganne, M. Machhout, Rached Tourki:
    A Reconfigurable Implementation of the New Secure Hash Algorithm. 281-285
    Electronic Edition (link) BibTeX
  • J. Todd McDonald, Alec Yasinsac:
    Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. 286-293
    Electronic Edition (link) BibTeX
  • Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
    A Framework for the Development of Secure Data Warehouses based on MDA and QVT. 294-300
    Electronic Edition (link) BibTeX

Session 8: Software Security

  • David Byers, Nahid Shahmehri:
    Design of a Process for Software Security. 301-309
    Electronic Edition (link) BibTeX
  • Christoph Krauß, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert:
    STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. 310-317
    Electronic Edition (link) BibTeX
  • Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck:
    A secure architecture for the pseudonymization of medical data. 318-324
    Electronic Edition (link) BibTeX
  • Thomas Nowey, Hannes Federrath:
    Collection of Quantitative Data on Security Incidents. 325-334
    Electronic Edition (link) BibTeX

Session 9: Security Models

  • Suranjith Ariyapperuma, Chris J. Mitchell:
    Security vulnerabilities in DNS and DNSSEC. 335-342
    Electronic Edition (link) BibTeX
  • David Arsenault, Arun Sood, Yih Huang:
    Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). 343-350
    Electronic Edition (link) BibTeX
  • Raihan Al-Ekram, Richard C. Holt, Chris Hobbs:
    Applying a Tradeoff Model (TOM) to TACT. 351-355
    Electronic Edition (link) BibTeX
  • Denis Hatebur, Maritta Heisel, Holger Schmidt:
    A Pattern System for Security Requirements Engineering. 356-365
    Electronic Edition (link) BibTeX
  • Stefan Durbeck, Rolf Schillinger, Jan Kolter:
    Security Requirements for a Semantic Service-oriented Architecture. 366-373
    Electronic Edition (link) BibTeX
  • Ludwig Fuchs, Günther Pernul:
    Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. 374-384
    Electronic Edition (link) BibTeX

Session 10: Miscellaneous Security Techniques

  • Vidar Evenrud Seeberg, Slobodan Petrovic:
    A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. 385-390
    Electronic Edition (link) BibTeX
  • Valentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina:
    Static evaluation of Certificate Policies for GRID PKIs interoperability. 391-399
    Electronic Edition (link) BibTeX
  • Mansoor Ahmed, Amin Andjomshoaa, Tho Manh Nguyen, A. Min Tjoa:
    Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE. 400-407
    Electronic Edition (link) BibTeX
  • TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang:
    Universally Composable Three-Party Key Distribution. 408-416
    Electronic Edition (link) BibTeX

Session 11: eAuction & eVoting Protocol

  • Brian Curtis, Josef Pieprzyk, Jan Seruga:
    An Efficient eAuction Protocol. 417-421
    Electronic Edition (link) BibTeX
  • Benedikt Ostermaier, Florian Dotzer, Markus Strassberger:
    Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes. 422-431
    Electronic Edition (link) BibTeX
  • Orhan Cetinkaya, Ali Doganaksoy:
    A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network. 432-442
    Electronic Edition (link) BibTeX

Session 12: Dependability in Distributed & Ubiquitous Computing

  • Lorenz Froihofer, Johannes Osrael, Karl M. Goeschka:
    Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems. 443-450
    Electronic Edition (link) BibTeX
  • Lu Yan, Kaisa Sere:
    Dependability Aspects of Ubiquitous Computing. 451-453
    Electronic Edition (link) BibTeX
  • Tomoya Enokido, Makoto Takizawa:
    Concurrency Control using Subject- and Purpose-Oriented (SPO) View. 454-464
    Electronic Edition (link) BibTeX

Session 13: Anomaly & Intrusion Detection

  • Oleksiy Mazhelis, Seppo Puuronen:
    Comparing Classifier Combining Techniques for Mobile-Masquerader Detection. 465-472
    Electronic Edition (link) BibTeX
  • Surekha Mariam Varghese, K. Poulose Jacob:
    Process Profiling Using Frequencies of System Calls. 473-479
    Electronic Edition (link) BibTeX
  • D. M. Akbar Hussain:
    Terrorist Networks Analysis through Argument Driven Hypotheses Model. 480-492
    Electronic Edition (link) BibTeX

International Symposium on Frontiers in Availability, Reliability and Security (FARES)

Session 1: Fault-Tolerant & Availability

  • S. Prabhu, R. Venkat:
    High Availability for Network Management Applications. 493-498
    Electronic Edition (link) BibTeX
  • Yanlong Wang, Zhanhuai Li, Wei Lin:
    RWAR: A Resilient Window-consistent Asynchronous Replication Protocol. 499-505
    Electronic Edition (link) BibTeX
  • Keiji Ozaki, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa:
    Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model. 506-516
    Electronic Edition (link) BibTeX

Session 2: Access Control

  • Franz Kollmann:
    Realizing fine-granular Read andWrite Rights on Tree Structured Documents. 517-523
    Electronic Edition (link) BibTeX
  • Vipin Singh Mewar, Subhendu Aich, Shamik Sural:
    Access Control Model for Web Services with Attribute Disclosure Restriction. 524-531
    Electronic Edition (link) BibTeX
  • Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
    Aggregating and Deploying Network Access Control Policies. 532-542
    Electronic Edition (link) BibTeX

Session 3: Authentication

  • Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli:
    Secure Spatial Authentication using Cell Phones. 543-549
    Electronic Edition (link) BibTeX
  • Bogdan Groza:
    Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain. 550-557
    Electronic Edition (link) BibTeX
  • Yijun He, Nan Xu, Jie Li:
    A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications. 558-563
    Electronic Edition (link) BibTeX
  • Yao Gang, Feng Dengguo, Han Xiaoxi:
    Improved Client-to-Client Password-Authenticated Key Exchange Protocol. 564-574
    Electronic Edition (link) BibTeX

Session 4: Real-Time System & Sensor Network

  • Dong Seong Kim, Chung Su Yang, Jong Sou Park:
    Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack. 575-579
    Electronic Edition (link) BibTeX
  • Christian Buckl, Matthias Regensburger, Alois Knoll, Gerhard Schrott:
    Models for automatic generation of safety-critical real-time systems. 580-587
    Electronic Edition (link) BibTeX
  • Bastian Preindl, Alexander Schatten:
    A Near-Real-Time Behaviour Control Framework. 588-598
    Electronic Edition (link) BibTeX

Session 5: RFID Techniques & Applications

  • Qinghan Xiao, Cam Boulet, Thomas Gibbons:
    RFID Security Issues in Military Supply Chains. 599-605
    Electronic Edition (link) BibTeX
  • Jens Mache, Chris Allick:
    The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols. 606-609
    Electronic Edition (link) BibTeX
  • Geethapriya Venkataramani, Srividya Gopalan:
    Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards. 610-620
    Electronic Edition (link) BibTeX

Session 6: Secure Solution & Applications

  • C. M. Jayalath, R. U. Fernando:
    A Modular Architecture for Secure and Reliable Distributed Communication. 621-628
    Electronic Edition (link) BibTeX
  • Anthony Stell, Richard O. Sinnott, Oluwafemi Ajayi, Jipu Jiang:
    Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials. 629-636
    Electronic Edition (link) BibTeX
  • Georgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis:
    Securing Medical Sensor Environments: The CodeBlue Framework Case. 637-643
    Electronic Edition (link) BibTeX
  • Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
    A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses. 644-654
    Electronic Edition (link) BibTeX

Session 7: Security Issue in Business Management

  • Regine Endsuleit, Christoph Amma:
    Agent Alliances: A Means for Practical Threshold Signature. 655-662
    Electronic Edition (link) BibTeX
  • Martin Boesgaard, Erik Zenner:
    Protecting Online Transactions with Unique Embedded Key Generators. 663-669
    Electronic Edition (link) BibTeX
  • Thomas Neubauer, Gernot Goluch, Bernhard Riedl:
    A research agenda for Autonomous Business Process Management. 670-680
    Electronic Edition (link) BibTeX

Session 8: Web, XML, Content Management

  • William Bradley Glisson, L. Milton Glisson, Ray Welland:
    Secure Web Application Development and Global Regulation. 681-688
    Electronic Edition (link) BibTeX
  • Viet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng:
    Query Assurance Verification for Dynamic Outsourced XML Databases. 689-696
    Electronic Edition (link) BibTeX
  • Lars-Helge Netland, Yngve Espelid, Khalid A. Mughal:
    A Reflection-Based Framework for Content Validation. 697-706
    Electronic Edition (link) BibTeX

Session 9: Security Policies & Techniques

  • William Bradley Glisson, Ray Welland:
    Web Engineering Security: Essential Elements. 707-714
    Electronic Edition (link) BibTeX
  • Januszkiewicz Paulina, Pyka Marek:
    Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology. 715-722
    Electronic Edition (link) BibTeX
  • Sergio Pozo, Rafael Ceballos, Rafael M. Gasca:
    CSP-Based Firewall Rule Set Diagnosis using Security Policies. 723-729
    Electronic Edition (link) BibTeX
  • Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa:
    CASSIS - Computer-based Academy for Security and Safety in Information Systems. 730-740
    Electronic Edition (link) BibTeX

Session 10: Trust Management & Trust Model

  • Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
    Trust in global computing systems as a limit property emerging from short range random interactions. 741-748
    Electronic Edition (link) BibTeX
  • Jimmy McGibney, Dmitri Botvich:
    A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam. 749-756
    Electronic Edition (link) BibTeX
  • Simon Samwel Msanjila, Hamideh Afsarmanesh:
    HICI: An Approach for Identifying Trust Elements The case of technological trust perspective in VBEs. 757-764
    Electronic Edition (link) BibTeX
  • Zhang Lin, Xu Feng, Wang Yuan, Lv Jian:
    A Semantic and Time Related Recommendation-Feedback Trust Model. 765-774
    Electronic Edition (link) BibTeX

Session 11: Miscellaneous Applications

  • Mohammad Feroz Raihan, Mohammad Zulkernine:
    AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. 775-782
    Electronic Edition (link) BibTeX
  • Niraj Swami, Sheikh Iqbal Ahamed:
    Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments. 783-790
    Electronic Edition (link) BibTeX
  • Rafael Páez, Cristina Satizábal, Jordi Forné:
    A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. 791-798
    Electronic Edition (link) BibTeX
  • C. Mauri, Toni Granollers, A. Solanas:
    On the Assessment of the Interaction Quality of Users with Cerebral Palsy. 799-805
    Electronic Edition (link) BibTeX
  • Chaobo Yang, Ming Qi:
    Research and Design of Mobile Impeachment System with Semi-cryptonym. 806-811
    Electronic Edition (link) BibTeX
  • Shu-Ching Wang, Shyi-Ching Liang, Kuo-Qin Yan, Guang-Yan Zheng:
    Efficient Malicious Agreement in a Virtual Subnet Network. 812-820
    Electronic Edition (link) BibTeX

Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)

  • Bhavani M. Thuraisingham, Srinivasan Iyer:
    Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. 821-828
    Electronic Edition (link) BibTeX
  • Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
    Application of QVT for the Development of Secure Data Warehouses: A case study. 829-836
    Electronic Edition (link) BibTeX
  • Marcin Gorawski, Jakub Bularz:
    Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. 837-844
    Electronic Edition (link) BibTeX
  • Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Giuliano Bellone de Grecis, Flaviano Fiorino:
    Applying a Flexible Mining Architecture to Intrusion Detection. 845-852
    Electronic Edition (link) BibTeX
  • Veselina G. Jecheva, Evgeniya P. Nikolova:
    An Application of Learning Problem in Anomaly-based Intrusion Detection Systems. 853-860
    Electronic Edition (link) BibTeX
  • Nasrullah Memon, Kim C. Kristoffersen, David L. Hicks, Henrik Legind Larsen:
    Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. 861-870
    Electronic Edition (link) BibTeX
  • Lillian Røstad, Øystein Nytrø:
    Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges. 871-878
    Electronic Edition (link) BibTeX
  • Dalia El-Mansy, Ahmed Sameh:
    A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace. 878-885
    Electronic Edition (link) BibTeX
  • Calin Ciufudean, Bianca Satco, Constantin Filote:
    Reliability Markov Chains for Security Data Transmitter Analysis. 886-894
    Electronic Edition (link) BibTeX

2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)

  • Melanie Volkamer, Margaret McGaley:
    Requirements and Evaluation Procedures for eVoting. 895-902
    Electronic Edition (link) BibTeX
  • Orhan Cetinkaya, Deniz Cetinkaya:
    Towards Secure E-Elections in Turkey: Requirements and Principles. 903-907
    Electronic Edition (link) BibTeX
  • Stefan G. Weber, Roberto Araujo, Johannes Buchmann:
    On Coercion-Resistant Electronic Elections with Linear Work. 908-916
    Electronic Edition (link) BibTeX
  • Mariagrazia Fugini:
    A Security Model and Architecture for Multichannel E-Government Systems. 917-924
    Electronic Edition (link) BibTeX
  • Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben:
    eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. 925-933
    Electronic Edition (link) BibTeX
  • Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair:
    Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies. 934-940
    Electronic Edition (link) BibTeX
  • Martijn Warnier, Frances M. T. Brazier, Martin Apistola, Anja Oskamp:
    Secure Distributed Dossier Management in the Legal Domain. 941-947
    Electronic Edition (link) BibTeX
  • Elsa Estevez, Tomasz Janowski:
    Building a Dependable Messaging Infrastructure for Electronic Government. 948-958
    Electronic Edition (link) BibTeX

Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)

  • Rachid Guerraoui, Michel Raynal:
    A Universal Construction for Concurrent Objects. 959-966
    Electronic Edition (link) BibTeX
  • Bastian Braun:
    FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance. 967-974
    Electronic Edition (link) BibTeX
  • Cristian Martín, Mikel Larrea, Ernesto Jiménez:
    On the implementation of the Omega failure detector in the crash-recovery failure model. 975-982
    Electronic Edition (link) BibTeX
  • Mourad Elhadef, Azzedine Boukerche, Hisham Elkadiki:
    Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach. 983-990
    Electronic Edition (link) BibTeX
  • Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuven Yagel:
    Self-Stabilization as a Foundation for Autonomic Computing. 991-998
    Electronic Edition (link) BibTeX
  • Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He:
    On Programming Models for Service-Level High Availability. 999-1008
    Electronic Edition (link) BibTeX

First International Workshop on Secure Software Engineering (SecSE 2007)

  • Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
    Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. 1009-1017
    Electronic Edition (link) BibTeX
  • Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri:
    How can the developer benefit from security modeling? 1017-1025
    Electronic Edition (link) BibTeX
  • Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien:
    AProSec: an Aspect for Programming Secure Web Applications. 1026-1033
    Electronic Edition (link) BibTeX
  • Koen Buyens, Bart De Win, Wouter Joosen:
    Empirical and statistical analysis of risk analysis-driven techniques for threat management. 1034-1041
    Electronic Edition (link) BibTeX
  • Takao Okubo, Hidehiko Tanaka:
    Secure Software Development through Coding Conventions and Frameworks. 1042-1051
    Electronic Edition (link) BibTeX
  • Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean Smith:
    Pastures: Towards Usable Security Policy Engineering. 1052-1059
    Electronic Edition (link) BibTeX
  • Kaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala:
    Security Objectives within a Security Testing Case Study. 1060-1065
    Electronic Edition (link) BibTeX
  • Chengying Mao, Yansheng Lu:
    CppTest: A Prototype Tool for Testing C/C++ Programs. 1066-1073
    Electronic Edition (link) BibTeX
  • Dragan Vidakovic, Dejan Simic:
    A Novel Approach to Building Secure Systems. 1074-1084
    Electronic Edition (link) BibTeX

Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)

  • Jan Ploski, Wilhelm Hasselbring:
    Exception Handling in an Event-Driven System. 1085-1092
    Electronic Edition (link) BibTeX
  • Armin Beer, Matthias Heindl:
    Issues in Testing Dependable Event-Based Systems at a Systems Integration Company. 1093-1100
    Electronic Edition (link) BibTeX
  • Jirí Kubalík, Richard Mordinyi:
    Optimizing Events Traffic in Event-based Systems by means of Evolutionary Algorithms. 1101-1107
    Electronic Edition (link) BibTeX
  • Dindin Wahyudin, A. Min Tjoa:
    Event-Based Monitoring of Open Source Software Projects. 1108-1115
    Electronic Edition (link) BibTeX
  • Marcus Mor, Richard Mordinyi, Johannes Riemer:
    Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management System. 1116-1123
    Electronic Edition (link) BibTeX
  • Roland Vecera, Szabolcs Rozsnyai, Heinz Roth:
    Indexing and Search of Correlated Business Events. 1124-1134
    Electronic Edition (link) BibTeX

First International Workshop on Advances in Information Security (WAIS 2007)

  • Alexander Krizhanovsky, Alexander Marasanov:
    An Approach for Adaptive Intrusion Prevention Based on The Danger. 1135-1142
    Electronic Edition (link) BibTeX
  • Rene Mayrhofer, Martyn Welch:
    A Human-Verifiable Authentication Protocol Using Visible Laser Light. 1143-1148
    Electronic Edition (link) BibTeX
  • Chik How Tan:
    Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. 1148-1154
    Electronic Edition (link) BibTeX
  • Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki:
    ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. 1155-1159
    Electronic Edition (link) BibTeX
  • Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai:
    A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. 1160-1166
    Electronic Edition (link) BibTeX
  • Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama:
    Analysis on Bleichenbacher's Forgery Attack. 1167-1174
    Electronic Edition (link) BibTeX
  • Yoshio Kakizaki, Hidekazu Tsuji:
    A New Method for Reducing the Revocation Delay in the Attribute Authentication. 1175-1182
    Electronic Edition (link) BibTeX
  • Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota:
    Efficient Multiparty Computation for Comparator Networks. 1183-1189
    Electronic Edition (link) BibTeX
  • Orhan Cetinkaya, Ali Doganaksoy:
    Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. 1190-1196
    Electronic Edition (link) BibTeX
  • Anders Moen Hagalisletto:
    Attacks are Protocols Too. 1197-1206
    Electronic Edition (link) BibTeX
  • Luis Zarza, Josep Pegueroles, Miguel Soriano:
    Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. 1207-1213
    Electronic Edition (link) BibTeX
  • Bogdan Groza, Toma-Leonida Dragomir:
    On the use of one-way chain based authentication protocols in secure control systems. 1214-1221
    Electronic Edition (link) BibTeX
  • Nenad Stojanovski, Marjan Gusev, Danilo Gligoroski, Svein J. Knapskog:
    Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. 1222-1226
    Electronic Edition (link) BibTeX
  • Dong Seong Kim, Taek-Hyun Shin, Jong Sou Park:
    A Security Framework in RFID Multi-domain System. 1227-1234
    Electronic Edition (link) BibTeX

Workshop on "Security in E-Learning" (SEL)

  • Martin Ebner:
    E-Learning 2.0 = e-Learning 1.0 + Web 2.0? 1235-1239
    Electronic Edition (link) BibTeX
  • Gerald Quirchmayr:
    Blended Learning Technology in Information Security Management Courses. 1240-1244
    Electronic Edition (link) BibTeX
  • Emmanuel A. Adigun, Jan H. P. Eloff:
    Defining a Trusted Service-Oriented Network Environment. 1245-1250
    Electronic Edition (link) BibTeX
  • Alan Ward, Jordi Castella Roca, Aleix Dorca-Josa:
    Designing a Cryptographic Scheme for e-Surveys in Higher-Education Institutions. 1251-1255
    Electronic Edition (link) BibTeX

转载于:https://www.cnblogs.com/Aioria0622/archive/2008/07/17/1245344.html

你可能感兴趣的:(ARES 2007: Vienna, Austria)