ARES B

141 papers

YearTitle / Authors
2006A 2
Agusti Solanas, Antoni Martínez-Ballesté, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz
2006A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements.
Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
2006A Component Based Software Architecture for E-Government Applications.
Daniel Beer, Raphael Kunis, Gudula Rünger
2006A Declarative Control Language for Dependable XML Message Queues.
Alexander Böhm, Carl-Christian Kanne, Guido Moerkotte
2006A Dependable Device Discovery Approach for Pervasive Computing Middleware.
Sheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri
2006A Framework of Survivability Model for Wireless Sensor Network.
Dong Seong Kim, Khaja Mohammad Shazzad, Jong Sou Park
2006A Hybrid Network Intrusion Detection Technique Using Random Forests.
Jiong Zhang, Mohammad Zulkernine
2006A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter?.
Marc Conrad, Tim French, Wei Huang, Carsten Maple
2006A Method for the Identification of Inaccuracies in Pupil Segmentation.
Hugo Proença, Luís A. Alexandre
2006A Novel Artificial-Immune-Based Approach for System-Level Fault Diagnosis.
Mourad Elhadef, Shantanu Das, Amiya Nayak
2006A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities.
Zhiqiang Lin, Bing Mao, Li Xie
2006A Proposal of An Anonymous Authentication Method For Flat-rate Service.
Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji
2006A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce.
Christian Schläger, Thomas Nowey, José A. Montenegro
2006A Secure E-Exam Management System.
Jordi Castellà-Roca, Jordi Herrera-Joancomartí, Aleix Dorca-Josa
2006A Secure Event Agreement (SEA) protocol for peer-to-peer games.
Amy Beth Corman, Scott Douglas, Peter Schachte, Vanessa Teague
2006A Selector Method for Providing Mobile Location Estimation Services within a Radio Cellular Network.
Junyang Zhou, Joseph Kee-Yin Ng
2006A Simple Component Connection Approach for Fault Tree Conversion to Binary Decision Diagram.
Rasa Remenyte, John D. Andrews
2006A Study of Security Architectural Patterns.
David Garcia Rosado, Eduardo Fernández-Medina, Mario Piattini, Carlos Gutiérrez
2006A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems.
Johannes Osrael, Lorenz Froihofer, Karl M. Göschka, Stefan Beyer, Pablo Galdámez, Francesc D. Muñoz-Escoí
2006ARES and Workshops Committees.
2006Access Control in a Privacy-Aware eLearning Environment.
Elke Franz, Hagen Wahrig, Alexander Böttcher, Katrin Borcea-Pfitzmann
2006Achieving Availability and Reliability in Wireless Sensor Networks Applications.
Amirhosein Taherkordi, Majid Alkaee Taleghan, Mohsen Sharifi
2006Achieving Fairness and Timeliness in a Previous Electronic Contract Signing Protocol.
Magdalena Payeras-Capellà, Josep-Lluís Ferrer-Gomila, Llorenç Huguet i Rotger
2006Active/Active Replication for Highly Available HPC System Services.
Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin (Ben) He
2006Adding Security to a Multiagent Learning Platform.
Carine G. Webber, Maria de Fátima Webber do Prado Lima, Marcos E. Casa, Alexandre M. Ribeiro
2006An Architecture for Service Discovery Based on Capability Matching.
Jaka Mocnik, Piotr Karwaczynski
2006An Extended Verifiable Secret Redistribution Protocol for Archival Systems.
V. H. Gupta, K. Gopinath
2006An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol.
Maurizio Adriano Strangio
2006An integral IT continuity framework for undisrupted business operations.
Remko W. Helms, S. Van Oorschot, J. Herweijer, M. Plas
2006An ontology for secure e-government applications.
Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas
2006Analysis of Current VPN Technologies.
Thomas Berger
2006Application of the Digraph Method in System Fault Diagnostics.
E. M. Kelly, Lisa M. Bartlett
2006Automatically Translating Dynamic Fault Trees into Dynamic Bayesian Networks by Means of a Software Tool.
Stefania Montani, Luigi Portinale, Andrea Bobbio, Daniele Codetta Raiteri
2006Availability Constraints for Avionic Data Buses.
Alban Gabillon, Laurent Gallon
2006Availability Enforcement by Obligations and Aspects Identification.
Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard
2006Availability Modeling and Analysis on High Performance Cluster Computing Systems.
Hertong Song, Chokchai Leangsuksun, Raja Nassar
2006Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability Uncertainty.
Christophe Simon, Philippe Weber
2006Building an Encrypted File System on the EGEE grid: Application to Protein Sequence Analysis.
Christophe Blanchet, Rémi Mollon, Gilbert Deléage
2006Building governments in e-government: settlement of trusted e-oligarchy.
Semir Daskapan
2006Censorship-Resistant and Anonymous P2P Filesharing.
Regine Endsuleit, Thilo Mie
2006Choosing the Right Wireless LAN Security Protocol for the Home and Business User.
Carsten Maple, Helen Jacobs, Matthew Reeve
2006Computing Multiple Diagnoses in Large Devices Using Bayesian Networks.
Véronique Delcroix, Mohamed-Amine Maalej, Sylvain Piechowiak
2006DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems.
Stefan Beyer, Alexander Sánchez, Francesc D. Muñoz-Escoí, Pablo Galdámez
2006Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration.
Jochen Dinger, Hannes Hartenstein
2006Defense trees for economic evaluation of security investments.
Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti
2006Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy.
Omar Batarfi, Lindsay F. Marshall
2006Deontic Relevant Logic as the Logical Basis for Specifying, Verifying, and Reasoning about Information Security and Information Assurance.
Jingde Cheng, Junichi Miura
2006Dependability in Data Mining: A Perspective from the Cost of Making Decisions.
H. Michael Chung
2006Deriving Ratings Through Social Network Structures.
Hameeda Alshabib, Omer F. Rana, Ali Shaikh Ali
2006Designing mutual-aid model for RAQ (Rarely Asked Question) in e-Government: Practical use of anonymity.
Akiko Orita
2006Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets.
Calin Ciufudean, Adrian Graur, Constantin Filote, Cornel Turcu, Valentin Popa
2006Digital Signatures for Modifiable Collections.
Serge Abiteboul, Bogdan Cautis, Amos Fiat, Tova Milo
2006Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF.
Thomas Neubauer, Edgar R. Weippl, Stefan Biffl
2006Diversity to Enhance Autonomic Computing Self-Protection.
Michael Jarrett, Rudolph E. Seviora
2006E-voting: Dependability Requirements and Design for Dependability.
Jeremy W. Bryans, Bev Littlewood, Peter Y. A. Ryan, Lorenzo Strigini
2006Ecosystem of Naming Systems: Discussions on a Framework to Induce Smart Space Naming Systems Development.
Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Tomohiro Ishihara, Yojiro Uo
2006Efficient Link Failure Detection and Localization using P2P-Overlay Networks.
Barbara Emmert, Andreas Binzenhöfer
2006Ensuring Privacy for E-Health Services.
George Yee, Larry Korba, Ronggong Song
2006Evaluating Certification Protocols in the Partial Database State Machine.
António Luís Sousa, Alfrânio Correia Jr., Francisco Moura, José Pereira, Rui Oliveira
2006Evaluation of Network Robustness for Given Defense Resource Allocation Strategies.
Frank Yeong-Sung Lin, Po-Hao Tsang, C.-H. Chen, Chung-Lien Tseng, Y.-L. Lin
2006Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems.
Kenji Saito, Eiichi Morino, Jun Murai
2006Feasibility of Multi-Protocol Attacks.
Cas Cremers
2006Gait Recognition Using Acceleration from MEMS.
Davrondzhon Gafurov, Kirsi Helkala, Torkjel Søndrol
2006Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project.
Richard O. Sinnott, Micha Bayer, A. J. Stell, Jos Koetsier
2006Guidelines for Biometric Recognition in Wireless System for Payment Confirmation.
Leon Grabensek, Sasa Divjak
2006High Availability support for the design of stateful networking equipments.
Pablo Neira Ayuso, Laurent Lefèvre, Rafael M. Gasca
2006Highly Adaptable Dynamic Quorum Schemes for Managing Replicated Data.
Christian Storm, Oliver E. Theel
2006Identifying Intrusions in Computer Networks with Principal Component Analysis.
Wei Wang, Roberto Battiti
2006Improving Security Management through Passive Network Observation.
Yohann Thomas, Hervé Debar, Benjamin Morin
2006Integration of Quantum Cryptography in 802.11 Networks.
Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie
2006Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS).
Muhammad Sher, Thomas Magedanz, Walter T. Penzhorn
2006Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects.
Elke Franz, Katrin Borcea-Pfitzmann
2006Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address.
Rob Peters, Pim Jorg, Marco Meesters, Marcel Hoogwout, Edwin Stuart
2006Making Web Services Dependable.
Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao
2006Message from the Organizing Committee.
2006Mitigating Denial of Service Threats in GSM Networks.
Valer Bocan, Vladimir Cretu
2006Model Driven Security.
David A. Basin
2006Modeling Dependable Systems using Hybrid Bayesian Networks.
Martin Neil, Manesh Tailor, Norman E. Fenton, David Marquez, Peter Stewart Hearty
2006Modeling permissions in a (U/X)ML world.
Muhammad Alam, Ruth Breu, Michael Hafner
2006Modeling the Reliability of Search and Rescue Operations within the UK Through Bayesian Belief Networks.
Ashley Russell, John Quigley, Robert Van der Meer
2006Multi-Agent Causal Models for Dependability Analysis.
Sam Maes, Philippe Leray
2006Multipath Key Exchange on P2P Networks.
Yuuki Takano, Naoki Isozaki, Yoichi Shinoda
2006No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies.
Kenji Saito, Eiichi Morino, Jun Murai
2006Offline Internet Banking Fraud Detection.
Vasilis Aggelis
2006On Efficiency and Data Privacy Level of Association Rules Mining Algorithms within Parallel Spatial Data Warehouse.
Marcin Gorawski, Karol Stachurski
2006On the Reliability of Web Clusters with Partial Replication of Contents.
José Daniel García, Jesús Carretero, Javier Fernández, Félix García, David E. Singh, Alejandro Calderón
2006PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model.
Cristina Satizábal, Rafael Páez, Jordi Forné
2006Persistent Computing Systems as Continuously Available, Reliable, and Secure Systems.
Jingde Cheng
2006Personalized Security for E-Services.
George Yee
2006Practical Approach of a Secure Management System based on ISO/IEC 17799.
Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini
2006Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks.
2006Privacy threats and issues in mobile RFID.
Hyangjin Lee, Jeeyeon Kim
2006Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria
2006Proposed Framework for Achieving Interoperable Services Between European Public Administrations.
Amir Hayat, Thomas Rössler, Muhammad Alam
2006Provably Secure Anonymous Access Control for Heterogeneous Trusts.
Kilho Shin, Hiroshi Yasuda
2006Providing Response Identity and Authentication in IP Telephony.
Feng Cao, Cullen Jennings
2006Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks.
Juan Vera del Campo, Josep Pegueroles, Miguel Soriano
2006Proxy Oblivious Transfer Protocol.
Gang Yao, Dengguo Feng
2006Quality of Password Management Policy.
Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
2006RATING: Rigorous Assessment of Trust in Identity Management.
Rajarajan Sampath, Deepak Goel
2006Recovery Mechanism of Cooperative Process Chain in Grid.
Mingchu Li, Hongyan Yao
2006Recovery Mechanism of Online Certification Chain in Grid Computing.
Mingchu Li, Hongyan Yao, Jianbo Ma
2006Reliability Forecasting in Complex Hardware/Software Systems.
Javier Cano-Montero, David Ríos Insua
2006Reliability Modeling Strategy of an Industrial System.
Syed M. Rizwan, K. P. Ramachandran
2006Replication Strategies for Reliable Decentralised Storage.
Matthew John Leslie, Jim Davies, Todd Huffman
2006Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel.
Emilio Soler, Rodolfo Villarroel, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini
2006Representing levels of abstraction to facilitate the Secure Multidimensional Modeling.
Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo
2006Resource Management Continuity With Constraint Inheritance Relation.
Zude Li, Guoqiang Zhan, Xiaojun Ye
2006Risk Management and Risk Assessment at ENISA: Issues and Challenges.
Louis Marinos
2006Risk Management approach on identity theft in biometric systems context.
Sabine Delaître
2006Run-Time Detection of Covert Channels.
Naoyuki Nagatou, Takuo Watanabe
2006Sandboxing in myKlaim.
René Rydhof Hansen, Christian W. Probst, Flemming Nielson
2006Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay Networks.
Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido, S. Misbah Deen
2006Schedulability Driven Security Optimization in Real-time Systems.
Man Lin, Laurence Tianruo Yang
2006Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
Melanie Volkamer, Robert Krimmer
2006Secure 3G User Authentication in Adhoc Serving Networks.
Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard Barolli
2006Secure Business Process Management: A Roadmap.
Thomas Neubauer, Markus D. Klemen, Stefan Biffl
2006Secure Enhanced Wireless Transfer Protocol.
Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang
2006Secure and Reliable Java-Based Middleware - Challenges and Solutions.
Walter Binder
2006Securing DNS Services through System Self Cleansing and Hardware Enhancements.
Yih Huang, David Arsenault, Arun Sood
2006Security Analysis for IP-based Government Emergency Telephony Service.
Feng Cao, Saadat Malik
2006Security Requirement with a UML 2.0 Profile.
Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
2006Single sign-on framework for AAA operations within commercial mobile networks.
Saber Zrelli, Yoichi Shinoda
2006Supporting Attribute-based Access Control with Ontologies.
Torsten Priebe, Wolfgang Dobmeier, Nora Kamprath
2006Systematic Error Detection for RFID Reliability.
Sozo Inoue, Hiroto Yasuura, Daisuke Hagiwara
2006Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures.
Alexander Zangerl
2006Testing Complex Business Process Solutions.
Gerd Saurer, Alexander Schatten
2006The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine.
Nevena Stolba, Marko Banek, A Min Tjoa
2006The Usability and Practicality of Biometric Authentication in the Workplace.
Carsten Maple, Peter Norrington
2006The knowledge pressure on Risk and Security managers is increasing.
Christer Magnusson, Heidi Ola, Camilla Silversjo Holmqvist
2006Timed Modelling and Analysis in Web Service Compositions.
Raman Kazhamiakin, Paritosh K. Pandya, Marco Pistore
2006Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition.
Judith E. Y. Rossebø, Rolv Bræk
2006Towards a Security Architecture for Vehicular Ad Hoc Networks.
Klaus Plößl, Thomas Nowey, Christian Mletzko
2006Towards a Stochastic Model for Integrated Security and Dependability Evaluation.
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog
2006Towards an Integrated Conceptual Model of Security and Dependability.
Erland Jonsson
2006Trust Based Risk Management for Distributed System Security - A New Approach.
Ching Lin, Vijay Varadharajan
2006Unlocking Repositories: Federated Security Solution for Attribute and Policy Based Access to Repositories via Web Services.
Marek Hatala, Ty Mey Eap, Ashok Shah
2006Using A Bayesian Averaging Model for Estimating the Reliability of Decisions in Multimodal Biometrics.
Carsten Maple, Vitaly Schetinin
2006Validation of IT-Security Measurement Tools.
Ruedi Baer, Martin Dietrich
2006Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks.
Lukasz Juszczyk, Jaroslaw Lazowski, Schahram Dustdar
2006Workshop-based Multiobjective Security Safeguard Selection.
Thomas Neubauer, Christian Stummer, Edgar R. Weippl