• 博客园logo
  • 会员
  • 众包
  • 新闻
  • 博问
  • 闪存
  • 赞助商
  • HarmonyOS
  • Chat2DB
    • 搜索
      所有博客
    • 搜索
      当前博客
  • 写随笔 我的博客 短消息 简洁模式
    用户头像
    我的博客 我的园子 账号设置 会员中心 简洁模式 ... 退出登录
    注册 登录
我就是停不下来
业精于勤荒于嬉,行成于思毁于随
博客园    首页    新随笔    联系   管理    订阅  订阅

Availability, Reliability and Security in Ad Hoc, 2008

Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain. IEEE Computer Society 2008 BibTeX
  • Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli:
    Securing Telehealth Applications in a Web-Based e-Health Portal. 3-9
    Electronic Edition (link) BibTeX
  • Andreas Janecek, Wilfried N. Gansterer, K. Ashwin Kumar:
    Multi-Level Reputation-Based Greylisting. 10-17
    Electronic Edition (link) BibTeX
  • Kim Wuyts, Riccardo Scandariato, Geert Claeys, Wouter Joosen:
    Hardening XDS-Based Architectures. 18-25
    Electronic Edition (link) BibTeX
  • Svein Yngvar Willassen:
    Finding Evidence of Antedating in Digital Investigations. 26-32
    Electronic Edition (link) BibTeX
  • Navid Farazmand, Mahdi Fazeli, Seyed Ghassem Miremadi:
    FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program Interruption. 33-38
    Electronic Edition (link) BibTeX
  • Bernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer:
    Economic and Security Aspects of Applying a Threshold Scheme in e-Health. 39-46
    Electronic Edition (link) BibTeX
  • Mehdi Kiani, Andrew Clark, George M. Mohay:
    Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. 47-55
    Electronic Edition (link) BibTeX
  • Jehan-François Pâris, Thomas J. E. Schwarz:
    On the Possibility of Small, Service-Free Disk Based Storage Systems. 56-63
    Electronic Edition (link) BibTeX
  • Heine Kolltveit, Svein-Olaf Hvasshovd:
    Efficient High Availability Commit Processing. 64-71
    Electronic Edition (link) BibTeX
  • Alfredo Pironti, Riccardo Sisto:
    Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. 72-79
    Electronic Edition (link) BibTeX
  • Antonio Maña, Gimena Pujol:
    Towards Formal Specification of Abstract Security Properties. 80-87
    Electronic Edition (link) BibTeX
  • Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani:
    A Behavioral Model of Ideologically-motivated “Snowball” Attacks. 88-95
    Electronic Edition (link) BibTeX
  • Igor Siveroni, Andrea Zisman, George Spanoudakis:
    Property Specification and Static Verification of UML Models. 96-103
    Electronic Edition (link) BibTeX
  • Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
    Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. 104-111
    Electronic Edition (link) BibTeX
  • Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
    A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. 112-119
    Electronic Edition (link) BibTeX
  • J. R. Juárez-Rodríguez, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil, Francesc D. Muñoz-Escoí:
    A Database Replication Protocol Where Multicast Writesets Are Always Committed. 120-127
    Electronic Edition (link) BibTeX
  • Nataliia Bielova, Marco Dalla Torre, Nicola Dragoni, Ida Siahaan:
    Matching Policies with Security Claims of Mobile Applications. 128-135
    Electronic Edition (link) BibTeX
  • David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
    PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. 136-143
    Electronic Edition (link) BibTeX
  • Amir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi:
    WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. 144-152
    Electronic Edition (link) BibTeX
  • Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
    Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. 153-160
    Electronic Edition (link) BibTeX
  • Esma Aïmeur, Gilles Brassard, José Manuel Fernandez, Flavien Serge Mani Onana, Zbigniew Rakowski:
    Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. 161-170
    Electronic Edition (link) BibTeX
  • Natsumi Kitajima, Yuichi Goto, Jingde Cheng:
    Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems. 171-178
    Electronic Edition (link) BibTeX
  • Simon Tjoa, Stefan Jakoubi, Gerald Quirchmayr:
    Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology. 179-186
    Electronic Edition (link) BibTeX
  • Thomas Neubauer, Johannes Heurix:
    Defining Secure Business Processes with Respect to Multiple Objectives. 187-194
    Electronic Edition (link) BibTeX
  • Denis Hatebur, Maritta Heisel, Holger Schmidt:
    Analysis and Component-based Realization of Security Requirements. 195-203
    Electronic Edition (link) BibTeX
  • Yacine Bouzida, Christophe Mangin:
    A Framework for Detecting Anomalies in VoIP Networks. 204-211
    Electronic Edition (link) BibTeX
  • Kuan-Ta Chen, Jing-Kai Lou:
    Rapid Detection of Constant-Packet-Rate Flows. 212-220
    Electronic Edition (link) BibTeX
  • Andriy Panchenko, Lexi Pimenidis, Johannes Renner:
    Performance Analysis of Anonymous Communication Channels Provided by Tor. 221-228
    Electronic Edition (link) BibTeX
  • Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca:
    Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets. 229-236
    Electronic Edition (link) BibTeX
  • William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham:
    Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. 237-244
    Electronic Edition (link) BibTeX
  • Yonghua You, Mohammad Zulkernine, Anwar Haque:
    A Distributed Defense Framework for Flooding-Based DDoS Attacks. 245-252
    Electronic Edition (link) BibTeX
  • Liwen He, Paul Botham:
    Pure MPLS Technology. 253-259
    Electronic Edition (link) BibTeX
  • Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He:
    Symmetric Active/Active Replication for Dependent Services. 260-267
    Electronic Edition (link) BibTeX
  • Marcus Völp:
    Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. 268-275
    Electronic Edition (link) BibTeX
  • David Byers, Nahid Shahmehri:
    A Cause-Based Approach to Preventing Software Vulnerabilities. 276-283
    Electronic Edition (link) BibTeX
  • Shanai Ardi, Nahid Shahmehri:
    Integrating a Security Plug-in with the OpenUP/Basic Development Process. 284-291
    Electronic Edition (link) BibTeX
  • Jostein Jensen:
    A Novel Testbed for Detection of Malicious Software Functionality. 292-301
    Electronic Edition (link) BibTeX
  • Syrine Tlili, Mourad Debbabi:
    Type and Effect Annotations for Safe Memory Access in C. 302-309
    Electronic Edition (link) BibTeX
  • Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos Milios:
    Adaptabilty of a GP Based IDS on Wireless Networks. 310-318
    Electronic Edition (link) BibTeX
  • Liwei Kuang, Mohammad Zulkernine:
    An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. 319-326
    Electronic Edition (link) BibTeX
  • Lukasz Chmielewski, Jaap-Henk Hoepman:
    Fuzzy Private Matching (Extended Abstract). 327-334
    Electronic Edition (link) BibTeX
  • Jens-Uwe Bußer, Steffen Fries, Martin Otto, Peter Hartmann:
    Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge. 335-343
    Electronic Edition (link) BibTeX
  • Christian Schläger, Günther Pernul:
    Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. 344-351
    Electronic Edition (link) BibTeX
  • Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho:
    Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. 352-359
    Electronic Edition (link) BibTeX
  • José María de Fuentes, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda:
    CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. 363-368
    Electronic Edition (link) BibTeX
  • Josep M. Bernabé-Gisbert, Francesc D. Muñoz-Escoí:
    Extending Mixed Serialisation Graphs to Replicated Environments. 369-375
    Electronic Edition (link) BibTeX
  • Frederic Stumpf, Claudia Eckert, Shane Balfe:
    Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. 376-382
    Electronic Edition (link) BibTeX
  • Alexandre Vorobiev, Rudolph E. Seviora:
    Fuzzy Belief-Based Supervision. 383-389
    Electronic Edition (link) BibTeX
  • Rubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí:
    Ensuring Progress in Amnesiac Replicated Systems. 390-396
    Electronic Edition (link) BibTeX
  • R. J. Hulsebosch, P. W. G. Ebben:
    Enhancing Face Recognition with Location Information. 397-403
    Electronic Edition (link) BibTeX
  • Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer:
    A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors. 404-409
    Electronic Edition (link) BibTeX
  • Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen:
    Defending On-Line Web Application Security with User-Behavior Surveillance. 410-415
    Electronic Edition (link) BibTeX
  • Nelly A. Delessy, Eduardo B. Fernández:
    A Pattern-Driven Security Process for SOA Applications. 416-421
    Electronic Edition (link) BibTeX
  • Pablo Neira Ayuso, Laurent Lefèvre, Denis Barbaron, Rafael M. Gasca:
    Towards a Dependable Architecture for Highly Available Internet Services. 422-427
    Electronic Edition (link) BibTeX
  • Alan Stewart, Maurice Clint, Terry Harmer, Peter Kilpatrick, Ronald H. Perrott, Joaquim Gabarró:
    Assessing the Reliability and Cost of Web and Grid Orchestrations. 428-433
    Electronic Edition (link) BibTeX
  • Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi:
    Application-Oriented Trust in Distributed Computing. 434-439
    Electronic Edition (link) BibTeX
  • Bradley Markides, Marijke Coetzee:
    BlueTrust in a Real World. 440-445
    Electronic Edition (link) BibTeX
  • Ananda Swarup Das, Jitu Kumar Keshri, Kannan Srinathan, Vaibhav Srivastava:
    Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles. 446-451
    Electronic Edition (link) BibTeX
  • Thomas H. Morris, V. S. S. Nair:
    Privacy Protected ELF for Private Computing on Public Platforms. 452-457
    Electronic Edition (link) BibTeX
  • Chih-Yin Lin:
    haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism. 458-460
    Electronic Edition (link) BibTeX
  • Xiaolei Li, Jin Tian, Tingdi Zhao:
    An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200. 461-466
    Electronic Edition (link) BibTeX
  • Ryma Abbassi, Sihem Guemara El Fatmi:
    A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case. 467-472
    Electronic Edition (link) BibTeX
  • He Guang-Yu, Wen Ying-You, Zhao Hong:
    SPIT Detection and Prevention Method in VoIP Environment. 473-478
    Electronic Edition (link) BibTeX
  • Ezzat Kirmani, Cynthia S. Hood:
    A New Approach to Analysis of Interval Availability. 479-483
    Electronic Edition (link) BibTeX
  • Xiang-he Yang, Hua-ping Hu, Xin Chen:
    SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol. 484-490
    Electronic Edition (link) BibTeX
  • Mehdi Dehbashi, Vahid Lari, Seyed Ghassem Miremadi, Mohammad Shokrollah-Shirazi:
    Fault Effects in FlexRay-Based Networks with Hybrid Topology. 491-496
    Electronic Edition (link) BibTeX
  • Xun Yi, Mike Faulkner, Eiji Okamoto:
    Secure Wireless Sensor Networks. 497-502
    Electronic Edition (link) BibTeX
  • Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa:
    SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. 503-508
    Electronic Edition (link) BibTeX
  • Meiko Jensen, Nils Gruschka, Norbert Luttenberger:
    The Impact of Flooding Attacks on Network-based Services. 509-513
    Electronic Edition (link) BibTeX
  • Emili Miedes, Francesc D. Muñoz-Escoí:
    Managing Priorities in Atomic Multicast Protocols. 514-519
    Electronic Edition (link) BibTeX
  • Asier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez:
    Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. 520-525
    Electronic Edition (link) BibTeX
  • Stefan Lindskog, Anna Brunstrom:
    An End-to-End Security Solution for SCTP. 526-531
    Electronic Edition (link) BibTeX
  • Hongji Wang, Gang Yao, Qingshan Jiang:
    An Identity-Based Group Key Agreement Protocol from Pairing. 532-537
    Electronic Edition (link) BibTeX
  • Gang Yao, Hongji Wang, Qingshan Jiang:
    An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. 538-543
    Electronic Edition (link) BibTeX
  • Adel Almohammad, Robert M. Hierons, Gheorghita Ghinea:
    High Capacity Steganographic Method Based Upon JPEG. 544-549
    Electronic Edition (link) BibTeX
  • Elisavet Konstantinou:
    Cluster-based Group Key Agreement for Wireless Ad hoc Networks. 550-557
    Electronic Edition (link) BibTeX
  • Chen Zhi-li, Huang Liu-sheng, Yu Zhen-shan, Li Ling-jun, Yang Wei:
    A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. 558-563
    Electronic Edition (link) BibTeX
  • Bo Zhang, Kai Han, Binoy Ravindran, E. Douglas Jensen:
    RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks. 564-571
    Electronic Edition (link) BibTeX
  • Jan Willemson, Arne Ansper:
    A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. 572-577
    Electronic Edition (link) BibTeX
  • Liang Xiao, Javier Vicente, Carlos Sáez, Andrew Peet, Alex Gibb, Paul H. Lewis, Srinandan Dasmahapatra, Madalina Croitoru, Horacio González-Vélez, Magí Lluch i Ariet, David Dupplaw:
    A Security Model and its Application to a Distributed Decision Support System for Healthcare. 578-585
    Electronic Edition (link) BibTeX
  • Salvador Cavadini, Diego Cheda:
    Run-time Information Flow Monitoring based on Dynamic Dependence Graphs. 586-591
    Electronic Edition (link) BibTeX
  • Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli:
    Automated Process Classi?cation Framework using SELinux Security Context. 592-596
    Electronic Edition (link) BibTeX
  • Judith E. Y. Rossebø, Rolv Bræk:
    Using Composition Policies to Manage Authentication and Authorization Patterns and Services. 597-603
    Electronic Edition (link) BibTeX
  • Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo, Pakorn Leesutthipornchai:
    Providing Fault Tolerance in Wireless Backhaul Network Design with Path Restoration. 604-609
    Electronic Edition (link) BibTeX
  • Adrian Frei, Marc Rennhard:
    Histogram Matrix: Log File Visualization for Anomaly Detection. 610-617
    Electronic Edition (link) BibTeX
  • Salem Benferhat, Karim Tabia:
    Context-based Profiling for Anomaly Intrusion Detection with Diagnosis. 618-623
    Electronic Edition (link) BibTeX
  • Ulf Larson, Erland Jonsson, Stefan Lindskog:
    A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection. 624-629
    Electronic Edition (link) BibTeX
  • Youhui Zhang, Hongyi Wang, Yu Gu, Dongsheng Wang:
    IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI. 630-635
    Electronic Edition (link) BibTeX
  • Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani:
    Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. 636-641
    Electronic Edition (link) BibTeX
  • Gerald Madlmayr, Josef Langer, Christian Kantner, Josef Scharinger:
    NFC Devices: Security and Privacy. 642-647
    Electronic Edition (link) BibTeX
  • Nima Mehdizadeh, Mohammad Shokrolah-Shirazi, Seyed Ghassem Miremadi:
    Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessor. 648-652
    Electronic Edition (link) BibTeX
  • Guna Santos, Angelo Duarte, Dolores Rexachs, Emilio Luque:
    Increasing the Performability of Computer Clusters Using RADIC II. 653-658
    Electronic Edition (link) BibTeX
  • Geoffroy Vallée, Kulathep Charoenpornwattana, Christian Engelmann, Anand Tikotekar, Chokchai Leangsuksun, Thomas Naughton, Stephen L. Scott:
    A Framework for Proactive Fault Tolerance. 659-664
    Electronic Edition (link) BibTeX
  • Sanjam Garg, Huzur Saran:
    Anti-DDoS Virtualized Operating System. 667-674
    Electronic Edition (link) BibTeX
  • Erin Farr, Richard Harper, Lisa Spainhower, Jimi Xenidis:
    A Case for High Availability in a Virtualized Environment (HAVEN). 675-682
    Electronic Edition (link) BibTeX
  • Stéphane Onno:
    A Federated Physical and Logical Access Control Enforcement Model. 683-692
    Electronic Edition (link) BibTeX
  • Octavian Catrina, Florian Kerschbaum:
    Fostering the Uptake of Secure Multiparty Computation in E-Commerce. 693-700
    Electronic Edition (link) BibTeX
  • Rafael Martínez-Peláez, Cristina Satizábal, Francisco Rico-Novella, Jordi Forné:
    Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols. 701-708
    Electronic Edition (link) BibTeX
  • Mathias Kohler, Andreas Schaad:
    Avoiding Policy-based Deadlocks in Business Processes. 709-716
    Electronic Edition (link) BibTeX
  • Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura:
    A Secure High-Speed Identification Scheme for RFID Using Bloom Filters. 717-722
    Electronic Edition (link) BibTeX
  • Youan Xiao:
    New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. 723-726
    Electronic Edition (link) BibTeX
  • Qi Wang, Yonglong Luo, Liusheng Huang:
    Privacy-preserving Protocols for Finding the Convex Hulls. 727-732
    Electronic Edition (link) BibTeX
  • Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi:
    A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. 733-740
    Electronic Edition (link) BibTeX
  • Ascensión Hernández Encinas, Ángel Martín del Rey, J. L. Pérez Iglesias, Gerardo Rodríguez Sánchez, Araceli Queiruga Dios:
    Cryptographic Properties of Second-Order Memory Elementary Cellular Automata. 741-745
    Electronic Edition (link) BibTeX
  • Shengke Zeng, Mingxing He, Weidong Luo:
    New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group. 746-751
    Electronic Edition (link) BibTeX
  • Christian Schläger, Ludwig Fuchs, Günther Pernul:
    Intensive Programme on Information and Communication Security. 752-757
    Electronic Edition (link) BibTeX
  • Heinz Lothar Grob, Gereon Strauch, Christian Buddendick:
    Applications for IT-Risk Management – Requirements and Practical Evaluation. 758-764
    Electronic Edition (link) BibTeX
  • Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse:
    Security Analysis of Role-based Separation of Duty with Workflows. 765-770
    Electronic Edition (link) BibTeX
  • Stefan Böttcher, Rita Hartel, Matthias Kirschner:
    Detecting Suspicious Relational Database Queries. 771-778
    Electronic Edition (link) BibTeX
  • Denis Royer:
    Assessing the Value of Enterprise Identity Management (EIdM) – Towards a Generic Evaluation Approach. 779-786
    Electronic Edition (link) BibTeX
  • Mark E. Orwat, Timothy E. Levin, Cynthia E. Irvine:
    An Ontological Approach to Secure MANET Management. 787-794
    Electronic Edition (link) BibTeX
  • Roland Donat, Laurent Bouillaut, Patrice Aknin, Philippe Leray:
    Reliability Analysis using Graphical Duration Models. 795-800
    Electronic Edition (link) BibTeX
  • Mikel Larrea, Cristian Martín:
    From Omega to ?P in the Crash-Recovery Failure Model with Unknown Membership. 801-806
    Electronic Edition (link) BibTeX
  • Mario Anzures-García, Luz A. Sánchez-Gálvez:
    Policy-based Group Organizational Structure Management using an Ontological Approach. 807-812
    Electronic Edition (link) BibTeX
  • Carlos Blanco, Joaquín Lasheras, Rafael Valencia-García, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini:
    A Systematic Review and Comparison of Security Ontologies. 813-820
    Electronic Edition (link) BibTeX
  • Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
    Context Ontology for Secure Interoperability. 821-827
    Electronic Edition (link) BibTeX
  • Kimmo Halunen, Pauli Rikula, Juha Röning:
    On the Security of VSH in Password Schemes. 828-833
    Electronic Edition (link) BibTeX
  • Zakaria Maamar, Quan Z. Sheng, Djamal Benslimane:
    Sustaining Web Services High-Availability Using Communities. 834-841
    Electronic Edition (link) BibTeX
  • Takeshi Tsuchiya, Marc Lihan, Hirokazu Yoshinaga, Kei'ichi Koyanagi:
    Distributed Information Retrieval Service for Ubiquitous Services. 842-850
    Electronic Edition (link) BibTeX
  • Davide Pozza, Riccardo Sisto:
    A Lightweight Security Analyzer inside GCC. 851-858
    Electronic Edition (link) BibTeX
  • Habib Seifzadeh, Mostafa Kermani, Mohsen Sadighi:
    Dynamic Maintenance of Software Systems at Runtime. 859-865
    Electronic Edition (link) BibTeX
  • Mohammad Ali Hadavi, Hossein Shirazi, Hasan Mokhtari Sangchi, Vahid Saber Hamishagi:
    Software Security; A Vulnerability Activity Revisit. 866-872
    Electronic Edition (link) BibTeX
  • Sini Ruohomaa, Lea Kutvonen:
    Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations. 873-880
    Electronic Edition (link) BibTeX
  • Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani:
    A Survey on Trust and Reputation Schemes in Ad Hoc Networks. 881-886
    Electronic Edition (link) BibTeX
  • Stefan Katzenbeisser, Milan Petkovic:
    Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. 889-895
    Electronic Edition (link) BibTeX
  • Yousof Al-Hammadi, Uwe Aickelin:
    Detecting Bots Based on Keylogging Activities. 896-902
    Electronic Edition (link) BibTeX
  • Elke Franz, Christin Groba, Thomas Springer, Mike Bergmann:
    A Comprehensive Approach for Context-dependent Privacy Management. 903-910
    Electronic Edition (link) BibTeX
  • Steffen Weiss, Martin Wahl, Michael Tielemann, Klaus Meyer-Wegener:
    Traceable Quantitative Risk Assessment Applied to Investment Decision for Local Backups. 911-920
    Electronic Edition (link) BibTeX
  • Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Yautsiukhin:
    Quantitative Assessment of Enterprise Security System. 921-928
    Electronic Edition (link) BibTeX
  • Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis:
    Clustering Oriented Architectures in Medical Sensor Environments. 929-934
    Electronic Edition (link) BibTeX
  • Lillian Røstad:
    An Initial Model and a Discussion of Access Control in Patient Controlled Health Records. 935-942
    Electronic Edition (link) BibTeX
  • Sigurd Eskeland, Vladimir A. Oleshchuk:
    Secure Team-Based EPR Access Acquisition in Wireless Networks. 943-949
    Electronic Edition (link) BibTeX
  • Melanie Tupper, A. Nur Zincir-Heywood:
    VEA-bility Security Metric: A Network Security Analysis Tool. 950-957
    Electronic Edition (link) BibTeX
  • Stefan G. Weber, Andreas Heinemann, Max Mühlhäuser:
    Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments. 958-964
    Electronic Edition (link) BibTeX
  • Victor Korobitsin, Sergey Ilyin:
    GOST-28147 Encryption Implementation on Graphics Processing Units. 967-974
    Electronic Edition (link) BibTeX
  • Fanny Coudert, Jos Dumortier:
    Intelligent Video Surveillance Networks: Data Protection Challenges. 975-981
    Electronic Edition (link) BibTeX
  • Amin Hassanzadeh, Babak Sadeghian:
    Intrusion Detection with Data Correlation Relation Graph. 982-989
    Electronic Edition (link) BibTeX
  • Josep Domingo-Ferrer, Vicenç Torra:
    A Critique of k-Anonymity and Some of Its Enhancements. 990-993
    Electronic Edition (link) BibTeX
  • Vicenç Torra, Susana Ladra:
    Cluster-Specific Information Loss Measures in Data Privacy: A Review. 994-999
    Electronic Edition (link) BibTeX
  • Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella:
    Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. 1000-1007
    Electronic Edition (link) BibTeX
  • Boustia Narhimene, Mokhtari Aicha:
    Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach. 1008-1012
    Electronic Edition (link) BibTeX
  • Georgios Kalogridis, Chris J. Mitchell:
    Using Non-adaptive Group Testing to Construct Spy Agent Routes. 1013-1019
    Electronic Edition (link) BibTeX
  • Gerardo Canfora, Bice Cavallo:
    A Bayesian Approach for on-Line Max Auditing. 1020-1027
    Electronic Edition (link) BibTeX
  • Irfan Ahmed, Kyung-suk Lhee:
    Detection of Malcodes by Packet Classification. 1028-1035
    Electronic Edition (link) BibTeX
  • Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Klopotek:
    Performance of a Strategy Based Packets Forwarding in Ad Hoc Networks. 1036-1043
    Electronic Edition (link) BibTeX
  • Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair:
    Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy. 1044-1051
    Electronic Edition (link) BibTeX
  • Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit, Karim Tamine:
    AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes. 1052-1059
    Electronic Edition (link) BibTeX
  • Agusti Solanas, Gloria Pujol, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz:
    A Post-processing Method to Lessen k-Anonymity Dissimilarities. 1060-1066
    Electronic Edition (link) BibTeX
  • Zhiyao Liang, Rakesh M. Verma:
    Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols. 1067-1074
    Electronic Edition (link) BibTeX
  • Duffy Angevine, A. Nur Zincir-Heywood:
    A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set. 1075-1079
    Electronic Edition (link) BibTeX
  • Yasuhiro Ohtaki:
    Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries. 1083-1090
    Electronic Edition (link) BibTeX
  • Karel Wouters, Koen Simoens, Danny Lathouwers, Bart Preneel:
    Secure and Privacy-Friendly Logging for eGovernment Services. 1091-1096
    Electronic Edition (link) BibTeX
  • Flora Amato, Valentina Casola, Antonino Mazzeo, Valeria Vittorini:
    The REM Framework for Security Evaluation. 1097-1103
    Electronic Edition (link) BibTeX
  • René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst:
    Static Validation of Licence Conformance Policies. 1104-1111
    Electronic Edition (link) BibTeX
  • Fabio Massacci, Katsiaryna Naliuka:
    Towards Practical Security Monitors of UML Policies for Mobile Applications. 1112-1119
    Electronic Edition (link) BibTeX
  • Fabio Martinelli, Ilaria Matteucci:
    Synthesis of Local Controller Programs for Enforcing Global Security Properties. 1120-1127
    Electronic Edition (link) BibTeX
  • Stefano Bistarelli, Fabio Martinelli, Francesco Santini:
    Weighted Datalog and Levels of Trust. 1128-1134
    Electronic Edition (link) BibTeX
  • Alexander Pretschner, Thomas Walter:
    Negotiation of Usage Control Policies - Simply the Best? 1135-1136
    Electronic Edition (link) BibTeX
  • Albin Zuccato, Viktor Endersz, Nils Daniels:
    Security Requirement Engineering at a Telecom Provider. 1139-1147
    Electronic Edition (link) BibTeX
  • Takao Okubo, Hidehiko Tanaka:
    Identifying Security Aspects in Early Development Stages. 1148-1155
    Electronic Edition (link) BibTeX
  • Thomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen:
    Using Security Patterns to Combine Security Metrics. 1156-1163
    Electronic Edition (link) BibTeX
  • Per Håkon Meland, Jostein Jensen:
    Secure Software Design in Practice. 1164-1171
    Electronic Edition (link) BibTeX
  • Martin Gilje Jaatun, Inger Anne Tøndel:
    Covering Your Assets in Software Engineering. 1172-1179
    Electronic Edition (link) BibTeX
  • Shangping Ren, Kevin A. Kwiat:
    A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. 1180-1187
    Electronic Edition (link) BibTeX
  • Sarah Whittaker, Mohammad Zulkernine, Karen Rudie:
    Towards Incorporating Discrete-Event Systems in Secure Software Development. 1188-1195
    Electronic Edition (link) BibTeX
  • James A. Kupsch, Barton P. Miller:
    How to Open a File and Not Get Hacked. 1196-1203
    Electronic Edition (link) BibTeX
  • Holger Peine:
    Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of Rules. 1204-1209
    Electronic Edition (link) BibTeX
  • Vincenzo De Florio, Chris Blondia:
    Adaptive Data Integrity through Dynamically Redundant Data Structures. 1213-1218
    Electronic Edition (link) BibTeX
  • Daisuke Horie, Shoichi Morimoto, Noor Azimah, Yuichi Goto, Jingde Cheng:
    ISEDS: An Information Security Engineering Database System Based on ISO Standards. 1219-1225
    Electronic Edition (link) BibTeX
  • Daniel Slamanig, Christian Stingl:
    Privacy Aspects of eHealth. 1226-1233
    Electronic Edition (link) BibTeX
  • Kaliappa Nadar Ravindran, Jiang Wu, Kevin A. Kwiat, Ali Sabbir:
    Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks. 1234-1239
    Electronic Edition (link) BibTeX
  • Yudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone:
    Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. 1240-1247
    Electronic Edition (link) BibTeX
  • Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
    Implementing Multidimensional Security into OLAP Tools. 1248-1253
    Electronic Edition (link) BibTeX
  • Nasrullah Memon, David L. Hicks:
    Detecting Key Players in 11-M Terrorist Network: A Case Study. 1254-1259
    Electronic Edition (link) BibTeX
  • Dong Seong Kim, Muhammad Anwarul Azim, Jong Sou Park:
    Privacy Preserving Support Vector Machines in Wireless Sensor Networks. 1260-1265
    Electronic Edition (link) BibTeX
  • Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri:
    An Image Encryption System by Cellular Automata with Memory. 1266-1271
    Electronic Edition (link) BibTeX
  • Chik How Tan:
    Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. 1275-1281
    Electronic Edition (link) BibTeX
  • Tomohiro Kobori, Hiroaki Kikuchi, Masato Terada:
    Internet Observation with ISDAS: How Long Does a Worm Perform Scanning? 1282-1286
    Electronic Edition (link) BibTeX
  • Tsukasa Endo, Isao Echizen, Hiroshi Yoshiura:
    Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes. 1287-1293
    Electronic Edition (link) BibTeX
  • Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko:
    Enocoro-80: A Hardware Oriented Stream Cipher. 1294-1300
    Electronic Edition (link) BibTeX
  • Marko Hölbl, Tatjana Welzer:
    Cryptanalysis and Improvement of an ‘Improved Remote Authentication Scheme with Smart Card’. 1301-1305
    Electronic Edition (link) BibTeX
  • Paul Rubel, Michael Atighetchi, Partha Pal, Martin Fong, Richard O'Brien:
    Effective Monitoring of a Survivable Distributed Networked Information System. 1306-1312
    Electronic Edition (link) BibTeX
  • Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi:
    Design of an FDB based Intra-domain Packet Traceback System. 1313-1318
    Electronic Edition (link) BibTeX
  • Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
    An Independent Evaluation of Web Timing Attack and its Countermeasure. 1319-1324
    Electronic Edition (link) BibTeX
  • Arjan Durresi, Mimoza Durresi, Leonard Barolli:
    Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks. 1325-1331
    Electronic Edition (link) BibTeX
  • Qingsong Ye, Huaxiong Wang, Christophe Tartary:
    Privacy-Preserving Distributed Set Intersection. 1332-1339
    Electronic Edition (link) BibTeX
  • Yo Mashimo, Shintaro Ueda, Yasutaka Shinzaki, Hiroshi Shigeno:
    Examination of Forwarding Obstruction Attacks in Structured Overlay Networks. 1340-1345
    Electronic Edition (link) BibTeX
  • Abdulah Abdulah Zadeh:
    A Novel Approach for Multiplication over GF(2m) in Polynomial Basis Representation. 1346-1351
    Electronic Edition (link) BibTeX
  • Benjamin Turnbull, Jill Slay:
    Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. 1355-1360
    Electronic Edition (link) BibTeX
  • Joshua Broadway, Benjamin Turnbull, Jill Slay:
    Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. 1361-1368
    Electronic Edition (link) BibTeX
  • Christopher Hargreaves, Howard Chivers:
    Recovery of Encryption Keys from Memory Using a Linear Scan. 1369-1376
    Electronic Edition (link) BibTeX
  • Jooyoung Lee:
    Proposal for Efficient Searching and Presentation in Digital Forensics. 1377-1381
    Electronic Edition (link) BibTeX
  • Bin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun:
    Secure Steganography in Compressed Video Bitstreams. 1382-1387
    Electronic Edition (link) BibTeX
  • Kweku K. Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff:
    Considerations Towards a Cyber Crime Profiling System. 1388-1393
    Electronic Edition (link) BibTeX
  • Raimundas Matulevicius, Nicolas Mayer, Patrick Heymans:
    Alignment of Misuse Cases with Security Risk Management. 1397-1404
    Electronic Edition (link) BibTeX
  • Bernhard Thalheim, Sabah S. Al-Fedaghi, Khaled Al-Saqabi:
    Information Stream Based Model for Organizing Security. 1405-1412
    Electronic Edition (link) BibTeX
  • Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
    Security Requirements Variability for Software Product Lines. 1413-1420
    Electronic Edition (link) BibTeX
  • Koen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen:
    Transforming Security Requirements into Architecture. 1421-1428
    Electronic Edition (link) BibTeX
  • Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang:
    Modelling Security Properties in a Grid-based Operating System with Anti-Goals. 1429-1436
    Electronic Edition (link) BibTeX
  • Nicola Zeni, Nadzeya Kiyavitskaya, James R. Cordy, Luisa Mich, John Mylopoulos:
    Annotating Regulations Using Cerno: An Application to Italian Documents - Extended Abstract. 1437-1442
    Electronic Edition (link) BibTeX
  • Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, Mohamed Eltoweissy:
    Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements. 1443-1450
    Electronic Edition (link) BibTeX
  • Orhan Cetinkaya:
    Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract). 1451-1456
    Electronic Edition (link) BibTeX
posted @ 2008-06-27 13:22  yijiangchunxue  阅读(1012)  评论(0)    收藏  举报
刷新页面返回顶部
博客园  ©  2004-2025
浙公网安备 33010602011771号 浙ICP备2021040463号-3