Session 1: Trust Model & Trust Management
- Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell:
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. 3-10
Electronic Edition (link) BibTeX - Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone:
From Trust to Dependability through Risk Analysis. 19-26
Electronic Edition (link) BibTeX - Jatinder Singh, Jean Bacon, Ken Moody:
Dynamic trust domains for secure, private, technology-assisted living. 27-34
Electronic Edition (link) BibTeX - Ching Lin, Vijay Varadharajan:
A Hybrid Trust Model for Enhancing Security in Distributed Systems. 35-42
Electronic Edition (link) BibTeX - Wilfried N. Gansterer, Andreas Janecek, Peter Lechner:
A Reliable Component-Based Architecture for E-Mail Filtering. 43-52
Electronic Edition (link) BibTeX
Session 2: Availability, Fault-Tolerant & Recovery
- Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Goeschka:
Availability and Performance of the Adaptive Voting Replication. 53-60
Electronic Edition (link) BibTeX - Marcin Gorawski, Pawel Marks:
Distributed Stream Processing Analysis in High Availability Context. 61-68
Electronic Edition (link) BibTeX - Stefan Beyer, Francesc D. Muñoz-Escoí, Pablo Galdámez:
Implementing Network Partition-Aware Fault-Tolerant CORBA Systems. 69-76
Electronic Edition (link) BibTeX - Bin Rong, Fred Douglis, Cathy H. Xia, Zhen Liu:
Failure Recovery in Cooperative Data Stream Analysis. 77-84
Electronic Edition (link) BibTeX - José Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Bettina Kemme:
A Recovery Protocol for Middleware Replicated Databases Providing GSI. 85-92
Electronic Edition (link) BibTeX - Rubén de Juan-Marín, Hendrik Decker, Francesc D. Muñoz-Escoí:
Revisiting Hot Passive Replication. 93-102
Electronic Edition (link) BibTeX
Session 3: Reputation Management & Trust
- Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli:
Reputation Management Survey. 103-111
Electronic Edition (link) BibTeX - Audun Jøsang, Jochen Haller:
Dirichlet Reputation Systems. 112-119
Electronic Edition (link) BibTeX - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. 120-127
Electronic Edition (link) BibTeX - Stefan Böttcher, Sebastian Obermeier:
Secure Anonymous Union Computation Among Malicious Partners. 128-138
Electronic Edition (link) BibTeX
Session 4: Privacy & Access Control
- Oliver Jorns, Oliver Jung, Gerald Quirchmayr:
A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications. 139-146
Electronic Edition (link) BibTeX - Pankaj Bhaskar, Sheikh Iqbal Ahamed:
Privacy in Pervasive Computing and Open Issues. 147-154
Electronic Edition (link) BibTeX - Christin Groba, Stephan Grob, Thomas Springer:
Context-Dependent Access Control for Contextual Information. 155-161
Electronic Edition (link) BibTeX - Dongxi Liu:
Bytecode Verification for Enhanced JVM Access Control. 162-172
Electronic Edition (link) BibTeX
Session 5: Failure Detection & Attack Prevention
- P. Hazy, Rudolph E. Seviora:
Automatic Failure Detection with Separation of Concerns. 173-181
Electronic Edition (link) BibTeX - Mourad Elhadef, Azzedine Boukerche:
A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor Networks. 182-189
Electronic Edition (link) BibTeX - Yanlan Ding, Guiping Su:
Intrusion detection system for signal based SIP attacks through timed HCPN. 190-197
Electronic Edition (link) BibTeX - Muhammad Sher, Thomas Magedanz:
3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. 198-205
Electronic Edition (link) BibTeX - Meriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri:
Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. 206-212
Electronic Edition (link) BibTeX - Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin:
Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network. 213-222
Electronic Edition (link) BibTeX
Session 6: Authentication & Authorisation
- Anders Moen Hagalisletto:
Errors in Attacks on Authentication Protocols. 223-229
Electronic Edition (link) BibTeX - Christian Schläger, Monika Ganslmayer:
Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. 230-237
Electronic Edition (link) BibTeX - Tieyan Li, Robert Deng:
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. 238-245
Electronic Edition (link) BibTeX - Leila Ismail:
Authentication Mechanisms for Mobile Agents. 246-253
Electronic Edition (link) BibTeX - Yuri Demchenko, Leon Gommans, Cees de Laat:
Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning. 254-262
Electronic Edition (link) BibTeX - Georg Treu, Florian Fuchs, Christiane Dargatz:
Implicit Authorization for Accessing Location Data in a Social Context. 263-272
Electronic Edition (link) BibTeX
Session 7: Security Algorithm & Framework
- Abinandhan Chandrasekaran, Bhavani M. Thuraisingham:
Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances. 273-280
Electronic Edition (link) BibTeX - M. Zeghid, Belgacem Bouallegue, Adel Baganne, M. Machhout, Rached Tourki:
A Reconfigurable Implementation of the New Secure Hash Algorithm. 281-285
Electronic Edition (link) BibTeX - J. Todd McDonald, Alec Yasinsac:
Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. 286-293
Electronic Edition (link) BibTeX - Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
A Framework for the Development of Secure Data Warehouses based on MDA and QVT. 294-300
Electronic Edition (link) BibTeX
Session 8: Software Security
- David Byers, Nahid Shahmehri:
Design of a Process for Software Security. 301-309
Electronic Edition (link) BibTeX - Christoph Krauß, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert:
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. 310-317
Electronic Edition (link) BibTeX - Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck:
A secure architecture for the pseudonymization of medical data. 318-324
Electronic Edition (link) BibTeX - Thomas Nowey, Hannes Federrath:
Collection of Quantitative Data on Security Incidents. 325-334
Electronic Edition (link) BibTeX
Session 9: Security Models
- Suranjith Ariyapperuma, Chris J. Mitchell:
Security vulnerabilities in DNS and DNSSEC. 335-342
Electronic Edition (link) BibTeX - David Arsenault, Arun Sood, Yih Huang:
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). 343-350
Electronic Edition (link) BibTeX - Raihan Al-Ekram, Richard C. Holt, Chris Hobbs:
Applying a Tradeoff Model (TOM) to TACT. 351-355
Electronic Edition (link) BibTeX - Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Pattern System for Security Requirements Engineering. 356-365
Electronic Edition (link) BibTeX - Stefan Durbeck, Rolf Schillinger, Jan Kolter:
Security Requirements for a Semantic Service-oriented Architecture. 366-373
Electronic Edition (link) BibTeX - Ludwig Fuchs, Günther Pernul:
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. 374-384
Electronic Edition (link) BibTeX
Session 10: Miscellaneous Security Techniques
- Vidar Evenrud Seeberg, Slobodan Petrovic:
A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. 385-390
Electronic Edition (link) BibTeX - Valentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina:
Static evaluation of Certificate Policies for GRID PKIs interoperability. 391-399
Electronic Edition (link) BibTeX - Mansoor Ahmed, Amin Andjomshoaa, Tho Manh Nguyen, A. Min Tjoa:
Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE. 400-407
Electronic Edition (link) BibTeX - TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang:
Universally Composable Three-Party Key Distribution. 408-416
Electronic Edition (link) BibTeX
Session 11: eAuction & eVoting Protocol
- Brian Curtis, Josef Pieprzyk, Jan Seruga:
An Efficient eAuction Protocol. 417-421
Electronic Edition (link) BibTeX - Benedikt Ostermaier, Florian Dotzer, Markus Strassberger:
Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes. 422-431
Electronic Edition (link) BibTeX - Orhan Cetinkaya, Ali Doganaksoy:
A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network. 432-442
Electronic Edition (link) BibTeX
Session 12: Dependability in Distributed & Ubiquitous Computing
- Lorenz Froihofer, Johannes Osrael, Karl M. Goeschka:
Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems. 443-450
Electronic Edition (link) BibTeX - Lu Yan, Kaisa Sere:
Dependability Aspects of Ubiquitous Computing. 451-453
Electronic Edition (link) BibTeX - Tomoya Enokido, Makoto Takizawa:
Concurrency Control using Subject- and Purpose-Oriented (SPO) View. 454-464
Electronic Edition (link) BibTeX
Session 13: Anomaly & Intrusion Detection
- Oleksiy Mazhelis, Seppo Puuronen:
Comparing Classifier Combining Techniques for Mobile-Masquerader Detection. 465-472
Electronic Edition (link) BibTeX - Surekha Mariam Varghese, K. Poulose Jacob:
Process Profiling Using Frequencies of System Calls. 473-479
Electronic Edition (link) BibTeX - D. M. Akbar Hussain:
Terrorist Networks Analysis through Argument Driven Hypotheses Model. 480-492
Electronic Edition (link) BibTeX
International Symposium on Frontiers in Availability, Reliability and Security (FARES)
Session 1: Fault-Tolerant & Availability
- S. Prabhu, R. Venkat:
High Availability for Network Management Applications. 493-498
Electronic Edition (link) BibTeX - Yanlong Wang, Zhanhuai Li, Wei Lin:
RWAR: A Resilient Window-consistent Asynchronous Replication Protocol. 499-505
Electronic Edition (link) BibTeX - Keiji Ozaki, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa:
Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model. 506-516
Electronic Edition (link) BibTeX
Session 2: Access Control
- Franz Kollmann:
Realizing fine-granular Read andWrite Rights on Tree Structured Documents. 517-523
Electronic Edition (link) BibTeX - Vipin Singh Mewar, Subhendu Aich, Shamik Sural:
Access Control Model for Web Services with Attribute Disclosure Restriction. 524-531
Electronic Edition (link) BibTeX - Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Aggregating and Deploying Network Access Control Policies. 532-542
Electronic Edition (link) BibTeX
Session 3: Authentication
- Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli:
Secure Spatial Authentication using Cell Phones. 543-549
Electronic Edition (link) BibTeX - Bogdan Groza:
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain. 550-557
Electronic Edition (link) BibTeX - Yijun He, Nan Xu, Jie Li:
A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications. 558-563
Electronic Edition (link) BibTeX - Yao Gang, Feng Dengguo, Han Xiaoxi:
Improved Client-to-Client Password-Authenticated Key Exchange Protocol. 564-574
Electronic Edition (link) BibTeX
Session 4: Real-Time System & Sensor Network
- Dong Seong Kim, Chung Su Yang, Jong Sou Park:
Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack. 575-579
Electronic Edition (link) BibTeX - Christian Buckl, Matthias Regensburger, Alois Knoll, Gerhard Schrott:
Models for automatic generation of safety-critical real-time systems. 580-587
Electronic Edition (link) BibTeX - Bastian Preindl, Alexander Schatten:
A Near-Real-Time Behaviour Control Framework. 588-598
Electronic Edition (link) BibTeX
Session 5: RFID Techniques & Applications
- Qinghan Xiao, Cam Boulet, Thomas Gibbons:
RFID Security Issues in Military Supply Chains. 599-605
Electronic Edition (link) BibTeX - Jens Mache, Chris Allick:
The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols. 606-609
Electronic Edition (link) BibTeX - Geethapriya Venkataramani, Srividya Gopalan:
Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards. 610-620
Electronic Edition (link) BibTeX
Session 6: Secure Solution & Applications
- C. M. Jayalath, R. U. Fernando:
A Modular Architecture for Secure and Reliable Distributed Communication. 621-628
Electronic Edition (link) BibTeX - Anthony Stell, Richard O. Sinnott, Oluwafemi Ajayi, Jipu Jiang:
Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials. 629-636
Electronic Edition (link) BibTeX - Georgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis:
Securing Medical Sensor Environments: The CodeBlue Framework Case. 637-643
Electronic Edition (link) BibTeX - Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses. 644-654
Electronic Edition (link) BibTeX
Session 7: Security Issue in Business Management
- Regine Endsuleit, Christoph Amma:
Agent Alliances: A Means for Practical Threshold Signature. 655-662
Electronic Edition (link) BibTeX - Martin Boesgaard, Erik Zenner:
Protecting Online Transactions with Unique Embedded Key Generators. 663-669
Electronic Edition (link) BibTeX - Thomas Neubauer, Gernot Goluch, Bernhard Riedl:
A research agenda for Autonomous Business Process Management. 670-680
Electronic Edition (link) BibTeX
Session 8: Web, XML, Content Management
- William Bradley Glisson, L. Milton Glisson, Ray Welland:
Secure Web Application Development and Global Regulation. 681-688
Electronic Edition (link) BibTeX - Viet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng:
Query Assurance Verification for Dynamic Outsourced XML Databases. 689-696
Electronic Edition (link) BibTeX - Lars-Helge Netland, Yngve Espelid, Khalid A. Mughal:
A Reflection-Based Framework for Content Validation. 697-706
Electronic Edition (link) BibTeX
Session 9: Security Policies & Techniques
- William Bradley Glisson, Ray Welland:
Web Engineering Security: Essential Elements. 707-714
Electronic Edition (link) BibTeX - Januszkiewicz Paulina, Pyka Marek:
Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology. 715-722
Electronic Edition (link) BibTeX - Sergio Pozo, Rafael Ceballos, Rafael M. Gasca:
CSP-Based Firewall Rule Set Diagnosis using Security Policies. 723-729
Electronic Edition (link) BibTeX - Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa:
CASSIS - Computer-based Academy for Security and Safety in Information Systems. 730-740
Electronic Edition (link) BibTeX
Session 10: Trust Management & Trust Model
- Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
Trust in global computing systems as a limit property emerging from short range random interactions. 741-748
Electronic Edition (link) BibTeX - Jimmy McGibney, Dmitri Botvich:
A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam. 749-756
Electronic Edition (link) BibTeX - Simon Samwel Msanjila, Hamideh Afsarmanesh:
HICI: An Approach for Identifying Trust Elements The case of technological trust perspective in VBEs. 757-764
Electronic Edition (link) BibTeX - Zhang Lin, Xu Feng, Wang Yuan, Lv Jian:
A Semantic and Time Related Recommendation-Feedback Trust Model. 765-774
Electronic Edition (link) BibTeX
Session 11: Miscellaneous Applications
- Mohammad Feroz Raihan, Mohammad Zulkernine:
AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. 775-782
Electronic Edition (link) BibTeX - Niraj Swami, Sheikh Iqbal Ahamed:
Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments. 783-790
Electronic Edition (link) BibTeX - Rafael Páez, Cristina Satizábal, Jordi Forné:
A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. 791-798
Electronic Edition (link) BibTeX - C. Mauri, Toni Granollers, A. Solanas:
On the Assessment of the Interaction Quality of Users with Cerebral Palsy. 799-805
Electronic Edition (link) BibTeX - Chaobo Yang, Ming Qi:
Research and Design of Mobile Impeachment System with Semi-cryptonym. 806-811
Electronic Edition (link) BibTeX - Shu-Ching Wang, Shyi-Ching Liang, Kuo-Qin Yan, Guang-Yan Zheng:
Efficient Malicious Agreement in a Virtual Subnet Network. 812-820
Electronic Edition (link) BibTeX
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)
- Bhavani M. Thuraisingham, Srinivasan Iyer:
Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. 821-828
Electronic Edition (link) BibTeX - Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Application of QVT for the Development of Secure Data Warehouses: A case study. 829-836
Electronic Edition (link) BibTeX - Marcin Gorawski, Jakub Bularz:
Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. 837-844
Electronic Edition (link) BibTeX - Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Giuliano Bellone de Grecis, Flaviano Fiorino:
Applying a Flexible Mining Architecture to Intrusion Detection. 845-852
Electronic Edition (link) BibTeX - Veselina G. Jecheva, Evgeniya P. Nikolova:
An Application of Learning Problem in Anomaly-based Intrusion Detection Systems. 853-860
Electronic Edition (link) BibTeX - Nasrullah Memon, Kim C. Kristoffersen, David L. Hicks, Henrik Legind Larsen:
Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. 861-870
Electronic Edition (link) BibTeX - Lillian Røstad, Øystein Nytrø:
Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges. 871-878
Electronic Edition (link) BibTeX - Dalia El-Mansy, Ahmed Sameh:
A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace. 878-885
Electronic Edition (link) BibTeX - Calin Ciufudean, Bianca Satco, Constantin Filote:
Reliability Markov Chains for Security Data Transmitter Analysis. 886-894
Electronic Edition (link) BibTeX
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)
- Melanie Volkamer, Margaret McGaley:
Requirements and Evaluation Procedures for eVoting. 895-902
Electronic Edition (link) BibTeX - Orhan Cetinkaya, Deniz Cetinkaya:
Towards Secure E-Elections in Turkey: Requirements and Principles. 903-907
Electronic Edition (link) BibTeX - Stefan G. Weber, Roberto Araujo, Johannes Buchmann:
On Coercion-Resistant Electronic Elections with Linear Work. 908-916
Electronic Edition (link) BibTeX - Mariagrazia Fugini:
A Security Model and Architecture for Multichannel E-Government Systems. 917-924
Electronic Edition (link) BibTeX - Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben:
eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. 925-933
Electronic Edition (link) BibTeX - Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair:
Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies. 934-940
Electronic Edition (link) BibTeX - Martijn Warnier, Frances M. T. Brazier, Martin Apistola, Anja Oskamp:
Secure Distributed Dossier Management in the Legal Domain. 941-947
Electronic Edition (link) BibTeX - Elsa Estevez, Tomasz Janowski:
Building a Dependable Messaging Infrastructure for Electronic Government. 948-958
Electronic Edition (link) BibTeX
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)
- Rachid Guerraoui, Michel Raynal:
A Universal Construction for Concurrent Objects. 959-966
Electronic Edition (link) BibTeX - Bastian Braun:
FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance. 967-974
Electronic Edition (link) BibTeX - Cristian Martín, Mikel Larrea, Ernesto Jiménez:
On the implementation of the Omega failure detector in the crash-recovery failure model. 975-982
Electronic Edition (link) BibTeX - Mourad Elhadef, Azzedine Boukerche, Hisham Elkadiki:
Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach. 983-990
Electronic Edition (link) BibTeX - Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuven Yagel:
Self-Stabilization as a Foundation for Autonomic Computing. 991-998
Electronic Edition (link) BibTeX - Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He:
On Programming Models for Service-Level High Availability. 999-1008
Electronic Edition (link) BibTeX
First International Workshop on Secure Software Engineering (SecSE 2007)
- Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. 1009-1017
Electronic Edition (link) BibTeX - Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri:
How can the developer benefit from security modeling? 1017-1025
Electronic Edition (link) BibTeX - Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien:
AProSec: an Aspect for Programming Secure Web Applications. 1026-1033
Electronic Edition (link) BibTeX - Koen Buyens, Bart De Win, Wouter Joosen:
Empirical and statistical analysis of risk analysis-driven techniques for threat management. 1034-1041
Electronic Edition (link) BibTeX - Takao Okubo, Hidehiko Tanaka:
Secure Software Development through Coding Conventions and Frameworks. 1042-1051
Electronic Edition (link) BibTeX - Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean Smith:
Pastures: Towards Usable Security Policy Engineering. 1052-1059
Electronic Edition (link) BibTeX - Kaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala:
Security Objectives within a Security Testing Case Study. 1060-1065
Electronic Edition (link) BibTeX - Chengying Mao, Yansheng Lu:
CppTest: A Prototype Tool for Testing C/C++ Programs. 1066-1073
Electronic Edition (link) BibTeX - Dragan Vidakovic, Dejan Simic:
A Novel Approach to Building Secure Systems. 1074-1084
Electronic Edition (link) BibTeX
Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)
- Jan Ploski, Wilhelm Hasselbring:
Exception Handling in an Event-Driven System. 1085-1092
Electronic Edition (link) BibTeX - Armin Beer, Matthias Heindl:
Issues in Testing Dependable Event-Based Systems at a Systems Integration Company. 1093-1100
Electronic Edition (link) BibTeX - Jirí Kubalík, Richard Mordinyi:
Optimizing Events Traffic in Event-based Systems by means of Evolutionary Algorithms. 1101-1107
Electronic Edition (link) BibTeX - Dindin Wahyudin, A. Min Tjoa:
Event-Based Monitoring of Open Source Software Projects. 1108-1115
Electronic Edition (link) BibTeX - Marcus Mor, Richard Mordinyi, Johannes Riemer:
Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management System. 1116-1123
Electronic Edition (link) BibTeX - Roland Vecera, Szabolcs Rozsnyai, Heinz Roth:
Indexing and Search of Correlated Business Events. 1124-1134
Electronic Edition (link) BibTeX
First International Workshop on Advances in Information Security (WAIS 2007)
- Alexander Krizhanovsky, Alexander Marasanov:
An Approach for Adaptive Intrusion Prevention Based on The Danger. 1135-1142
Electronic Edition (link) BibTeX - Rene Mayrhofer, Martyn Welch:
A Human-Verifiable Authentication Protocol Using Visible Laser Light. 1143-1148
Electronic Edition (link) BibTeX - Chik How Tan:
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. 1148-1154
Electronic Edition (link) BibTeX - Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki:
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. 1155-1159
Electronic Edition (link) BibTeX - Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai:
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. 1160-1166
Electronic Edition (link) BibTeX - Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama:
Analysis on Bleichenbacher's Forgery Attack. 1167-1174
Electronic Edition (link) BibTeX - Yoshio Kakizaki, Hidekazu Tsuji:
A New Method for Reducing the Revocation Delay in the Attribute Authentication. 1175-1182
Electronic Edition (link) BibTeX - Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota:
Efficient Multiparty Computation for Comparator Networks. 1183-1189
Electronic Edition (link) BibTeX - Orhan Cetinkaya, Ali Doganaksoy:
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. 1190-1196
Electronic Edition (link) BibTeX - Anders Moen Hagalisletto:
Attacks are Protocols Too. 1197-1206
Electronic Edition (link) BibTeX - Luis Zarza, Josep Pegueroles, Miguel Soriano:
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. 1207-1213
Electronic Edition (link) BibTeX - Bogdan Groza, Toma-Leonida Dragomir:
On the use of one-way chain based authentication protocols in secure control systems. 1214-1221
Electronic Edition (link) BibTeX - Nenad Stojanovski, Marjan Gusev, Danilo Gligoroski, Svein J. Knapskog:
Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. 1222-1226
Electronic Edition (link) BibTeX - Dong Seong Kim, Taek-Hyun Shin, Jong Sou Park:
A Security Framework in RFID Multi-domain System. 1227-1234
Electronic Edition (link) BibTeX
Workshop on "Security in E-Learning" (SEL)
- Martin Ebner:
E-Learning 2.0 = e-Learning 1.0 + Web 2.0? 1235-1239
Electronic Edition (link) BibTeX - Gerald Quirchmayr:
Blended Learning Technology in Information Security Management Courses. 1240-1244
Electronic Edition (link) BibTeX - Emmanuel A. Adigun, Jan H. P. Eloff:
Defining a Trusted Service-Oriented Network Environment. 1245-1250
Electronic Edition (link) BibTeX - Alan Ward, Jordi Castella Roca, Aleix Dorca-Josa:
Designing a Cryptographic Scheme for e-Surveys in Higher-Education Institutions. 1251-1255
Electronic Edition (link) BibTeX