| 2006 | A 2 Agusti Solanas, Antoni Martínez-Ballesté, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz |
| 2006 | A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini |
| 2006 | A Component Based Software Architecture for E-Government Applications. Daniel Beer, Raphael Kunis, Gudula Rünger |
| 2006 | A Declarative Control Language for Dependable XML Message Queues. Alexander Böhm, Carl-Christian Kanne, Guido Moerkotte |
| 2006 | A Dependable Device Discovery Approach for Pervasive Computing Middleware. Sheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri |
| 2006 | A Framework of Survivability Model for Wireless Sensor Network. Dong Seong Kim, Khaja Mohammad Shazzad, Jong Sou Park |
| 2006 | A Hybrid Network Intrusion Detection Technique Using Random Forests. Jiong Zhang, Mohammad Zulkernine |
| 2006 | A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter?. Marc Conrad, Tim French, Wei Huang, Carsten Maple |
| 2006 | A Method for the Identification of Inaccuracies in Pupil Segmentation. Hugo Proença, Luís A. Alexandre |
| 2006 | A Novel Artificial-Immune-Based Approach for System-Level Fault Diagnosis. Mourad Elhadef, Shantanu Das, Amiya Nayak |
| 2006 | A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. Zhiqiang Lin, Bing Mao, Li Xie |
| 2006 | A Proposal of An Anonymous Authentication Method For Flat-rate Service. Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji |
| 2006 | A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. Christian Schläger, Thomas Nowey, José A. Montenegro |
| 2006 | A Secure E-Exam Management System. Jordi Castellà-Roca, Jordi Herrera-Joancomartí, Aleix Dorca-Josa |
| 2006 | A Secure Event Agreement (SEA) protocol for peer-to-peer games. Amy Beth Corman, Scott Douglas, Peter Schachte, Vanessa Teague |
| 2006 | A Selector Method for Providing Mobile Location Estimation Services within a Radio Cellular Network. Junyang Zhou, Joseph Kee-Yin Ng |
| 2006 | A Simple Component Connection Approach for Fault Tree Conversion to Binary Decision Diagram. Rasa Remenyte, John D. Andrews |
| 2006 | A Study of Security Architectural Patterns. David Garcia Rosado, Eduardo Fernández-Medina, Mario Piattini, Carlos Gutiérrez |
| 2006 | A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems. Johannes Osrael, Lorenz Froihofer, Karl M. Göschka, Stefan Beyer, Pablo Galdámez, Francesc D. Muñoz-Escoí |
| 2006 | ARES and Workshops Committees. |
| 2006 | Access Control in a Privacy-Aware eLearning Environment. Elke Franz, Hagen Wahrig, Alexander Böttcher, Katrin Borcea-Pfitzmann |
| 2006 | Achieving Availability and Reliability in Wireless Sensor Networks Applications. Amirhosein Taherkordi, Majid Alkaee Taleghan, Mohsen Sharifi |
| 2006 | Achieving Fairness and Timeliness in a Previous Electronic Contract Signing Protocol. Magdalena Payeras-Capellà, Josep-Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
| 2006 | Active/Active Replication for Highly Available HPC System Services. Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin (Ben) He |
| 2006 | Adding Security to a Multiagent Learning Platform. Carine G. Webber, Maria de Fátima Webber do Prado Lima, Marcos E. Casa, Alexandre M. Ribeiro |
| 2006 | An Architecture for Service Discovery Based on Capability Matching. Jaka Mocnik, Piotr Karwaczynski |
| 2006 | An Extended Verifiable Secret Redistribution Protocol for Archival Systems. V. H. Gupta, K. Gopinath |
| 2006 | An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol. Maurizio Adriano Strangio |
| 2006 | An integral IT continuity framework for undisrupted business operations. Remko W. Helms, S. Van Oorschot, J. Herweijer, M. Plas |
| 2006 | An ontology for secure e-government applications. Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas |
| 2006 | Analysis of Current VPN Technologies. Thomas Berger |
| 2006 | Application of the Digraph Method in System Fault Diagnostics. E. M. Kelly, Lisa M. Bartlett |
| 2006 | Automatically Translating Dynamic Fault Trees into Dynamic Bayesian Networks by Means of a Software Tool. Stefania Montani, Luigi Portinale, Andrea Bobbio, Daniele Codetta Raiteri |
| 2006 | Availability Constraints for Avionic Data Buses. Alban Gabillon, Laurent Gallon |
| 2006 | Availability Enforcement by Obligations and Aspects Identification. Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard |
| 2006 | Availability Modeling and Analysis on High Performance Cluster Computing Systems. Hertong Song, Chokchai Leangsuksun, Raja Nassar |
| 2006 | Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability Uncertainty. Christophe Simon, Philippe Weber |
| 2006 | Building an Encrypted File System on the EGEE grid: Application to Protein Sequence Analysis. Christophe Blanchet, Rémi Mollon, Gilbert Deléage |
| 2006 | Building governments in e-government: settlement of trusted e-oligarchy. Semir Daskapan |
| 2006 | Censorship-Resistant and Anonymous P2P Filesharing. Regine Endsuleit, Thilo Mie |
| 2006 | Choosing the Right Wireless LAN Security Protocol for the Home and Business User. Carsten Maple, Helen Jacobs, Matthew Reeve |
| 2006 | Computing Multiple Diagnoses in Large Devices Using Bayesian Networks. Véronique Delcroix, Mohamed-Amine Maalej, Sylvain Piechowiak |
| 2006 | DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems. Stefan Beyer, Alexander Sánchez, Francesc D. Muñoz-Escoí, Pablo Galdámez |
| 2006 | Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration. Jochen Dinger, Hannes Hartenstein |
| 2006 | Defense trees for economic evaluation of security investments. Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti |
| 2006 | Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy. Omar Batarfi, Lindsay F. Marshall |
| 2006 | Deontic Relevant Logic as the Logical Basis for Specifying, Verifying, and Reasoning about Information Security and Information Assurance. Jingde Cheng, Junichi Miura |
| 2006 | Dependability in Data Mining: A Perspective from the Cost of Making Decisions. H. Michael Chung |
| 2006 | Deriving Ratings Through Social Network Structures. Hameeda Alshabib, Omer F. Rana, Ali Shaikh Ali |
| 2006 | Designing mutual-aid model for RAQ (Rarely Asked Question) in e-Government: Practical use of anonymity. Akiko Orita |
| 2006 | Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets. Calin Ciufudean, Adrian Graur, Constantin Filote, Cornel Turcu, Valentin Popa |
| 2006 | Digital Signatures for Modifiable Collections. Serge Abiteboul, Bogdan Cautis, Amos Fiat, Tova Milo |
| 2006 | Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. Thomas Neubauer, Edgar R. Weippl, Stefan Biffl |
| 2006 | Diversity to Enhance Autonomic Computing Self-Protection. Michael Jarrett, Rudolph E. Seviora |
| 2006 | E-voting: Dependability Requirements and Design for Dependability. Jeremy W. Bryans, Bev Littlewood, Peter Y. A. Ryan, Lorenzo Strigini |
| 2006 | Ecosystem of Naming Systems: Discussions on a Framework to Induce Smart Space Naming Systems Development. Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Tomohiro Ishihara, Yojiro Uo |
| 2006 | Efficient Link Failure Detection and Localization using P2P-Overlay Networks. Barbara Emmert, Andreas Binzenhöfer |
| 2006 | Ensuring Privacy for E-Health Services. George Yee, Larry Korba, Ronggong Song |
| 2006 | Evaluating Certification Protocols in the Partial Database State Machine. António Luís Sousa, Alfrânio Correia Jr., Francisco Moura, José Pereira, Rui Oliveira |
| 2006 | Evaluation of Network Robustness for Given Defense Resource Allocation Strategies. Frank Yeong-Sung Lin, Po-Hao Tsang, C.-H. Chen, Chung-Lien Tseng, Y.-L. Lin |
| 2006 | Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems. Kenji Saito, Eiichi Morino, Jun Murai |
| 2006 | Feasibility of Multi-Protocol Attacks. Cas Cremers |
| 2006 | Gait Recognition Using Acceleration from MEMS. Davrondzhon Gafurov, Kirsi Helkala, Torkjel Søndrol |
| 2006 | Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project. Richard O. Sinnott, Micha Bayer, A. J. Stell, Jos Koetsier |
| 2006 | Guidelines for Biometric Recognition in Wireless System for Payment Confirmation. Leon Grabensek, Sasa Divjak |
| 2006 | High Availability support for the design of stateful networking equipments. Pablo Neira Ayuso, Laurent Lefèvre, Rafael M. Gasca |
| 2006 | Highly Adaptable Dynamic Quorum Schemes for Managing Replicated Data. Christian Storm, Oliver E. Theel |
| 2006 | Identifying Intrusions in Computer Networks with Principal Component Analysis. Wei Wang, Roberto Battiti |
| 2006 | Improving Security Management through Passive Network Observation. Yohann Thomas, Hervé Debar, Benjamin Morin |
| 2006 | Integration of Quantum Cryptography in 802.11 Networks. Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie |
| 2006 | Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS). Muhammad Sher, Thomas Magedanz, Walter T. Penzhorn |
| 2006 | Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects. Elke Franz, Katrin Borcea-Pfitzmann |
| 2006 | Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address. Rob Peters, Pim Jorg, Marco Meesters, Marcel Hoogwout, Edwin Stuart |
| 2006 | Making Web Services Dependable. Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao |
| 2006 | Message from the Organizing Committee. |
| 2006 | Mitigating Denial of Service Threats in GSM Networks. Valer Bocan, Vladimir Cretu |
| 2006 | Model Driven Security. David A. Basin |
| 2006 | Modeling Dependable Systems using Hybrid Bayesian Networks. Martin Neil, Manesh Tailor, Norman E. Fenton, David Marquez, Peter Stewart Hearty |
| 2006 | Modeling permissions in a (U/X)ML world. Muhammad Alam, Ruth Breu, Michael Hafner |
| 2006 | Modeling the Reliability of Search and Rescue Operations within the UK Through Bayesian Belief Networks. Ashley Russell, John Quigley, Robert Van der Meer |
| 2006 | Multi-Agent Causal Models for Dependability Analysis. Sam Maes, Philippe Leray |
| 2006 | Multipath Key Exchange on P2P Networks. Yuuki Takano, Naoki Isozaki, Yoichi Shinoda |
| 2006 | No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies. Kenji Saito, Eiichi Morino, Jun Murai |
| 2006 | Offline Internet Banking Fraud Detection. Vasilis Aggelis |
| 2006 | On Efficiency and Data Privacy Level of Association Rules Mining Algorithms within Parallel Spatial Data Warehouse. Marcin Gorawski, Karol Stachurski |
| 2006 | On the Reliability of Web Clusters with Partial Replication of Contents. José Daniel García, Jesús Carretero, Javier Fernández, Félix García, David E. Singh, Alejandro Calderón |
| 2006 | PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model. Cristina Satizábal, Rafael Páez, Jordi Forné |
| 2006 | Persistent Computing Systems as Continuously Available, Reliable, and Secure Systems. Jingde Cheng |
| 2006 | Personalized Security for E-Services. George Yee |
| 2006 | Practical Approach of a Secure Management System based on ISO/IEC 17799. Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini |
| 2006 | Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. |
| 2006 | Privacy threats and issues in mobile RFID. Hyangjin Lee, Jeeyeon Kim |
| 2006 | Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria |
| 2006 | Proposed Framework for Achieving Interoperable Services Between European Public Administrations. Amir Hayat, Thomas Rössler, Muhammad Alam |
| 2006 | Provably Secure Anonymous Access Control for Heterogeneous Trusts. Kilho Shin, Hiroshi Yasuda |
| 2006 | Providing Response Identity and Authentication in IP Telephony. Feng Cao, Cullen Jennings |
| 2006 | Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. Juan Vera del Campo, Josep Pegueroles, Miguel Soriano |
| 2006 | Proxy Oblivious Transfer Protocol. Gang Yao, Dengguo Feng |
| 2006 | Quality of Password Management Policy. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini |
| 2006 | RATING: Rigorous Assessment of Trust in Identity Management. Rajarajan Sampath, Deepak Goel |
| 2006 | Recovery Mechanism of Cooperative Process Chain in Grid. Mingchu Li, Hongyan Yao |
| 2006 | Recovery Mechanism of Online Certification Chain in Grid Computing. Mingchu Li, Hongyan Yao, Jianbo Ma |
| 2006 | Reliability Forecasting in Complex Hardware/Software Systems. Javier Cano-Montero, David Ríos Insua |
| 2006 | Reliability Modeling Strategy of an Industrial System. Syed M. Rizwan, K. P. Ramachandran |
| 2006 | Replication Strategies for Reliable Decentralised Storage. Matthew John Leslie, Jim Davies, Todd Huffman |
| 2006 | Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel. Emilio Soler, Rodolfo Villarroel, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini |
| 2006 | Representing levels of abstraction to facilitate the Secure Multidimensional Modeling. Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo |
| 2006 | Resource Management Continuity With Constraint Inheritance Relation. Zude Li, Guoqiang Zhan, Xiaojun Ye |
| 2006 | Risk Management and Risk Assessment at ENISA: Issues and Challenges. Louis Marinos |
| 2006 | Risk Management approach on identity theft in biometric systems context. Sabine Delaître |
| 2006 | Run-Time Detection of Covert Channels. Naoyuki Nagatou, Takuo Watanabe |
| 2006 | Sandboxing in myKlaim. René Rydhof Hansen, Christian W. Probst, Flemming Nielson |
| 2006 | Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay Networks. Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido, S. Misbah Deen |
| 2006 | Schedulability Driven Security Optimization in Real-time Systems. Man Lin, Laurence Tianruo Yang |
| 2006 | Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols. Melanie Volkamer, Robert Krimmer |
| 2006 | Secure 3G User Authentication in Adhoc Serving Networks. Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard Barolli |
| 2006 | Secure Business Process Management: A Roadmap. Thomas Neubauer, Markus D. Klemen, Stefan Biffl |
| 2006 | Secure Enhanced Wireless Transfer Protocol. Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang |
| 2006 | Secure and Reliable Java-Based Middleware - Challenges and Solutions. Walter Binder |
| 2006 | Securing DNS Services through System Self Cleansing and Hardware Enhancements. Yih Huang, David Arsenault, Arun Sood |
| 2006 | Security Analysis for IP-based Government Emergency Telephony Service. Feng Cao, Saadat Malik |
| 2006 | Security Requirement with a UML 2.0 Profile. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini |
| 2006 | Single sign-on framework for AAA operations within commercial mobile networks. Saber Zrelli, Yoichi Shinoda |
| 2006 | Supporting Attribute-based Access Control with Ontologies. Torsten Priebe, Wolfgang Dobmeier, Nora Kamprath |
| 2006 | Systematic Error Detection for RFID Reliability. Sozo Inoue, Hiroto Yasuura, Daisuke Hagiwara |
| 2006 | Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures. Alexander Zangerl |
| 2006 | Testing Complex Business Process Solutions. Gerd Saurer, Alexander Schatten |
| 2006 | The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. Nevena Stolba, Marko Banek, A Min Tjoa |
| 2006 | The Usability and Practicality of Biometric Authentication in the Workplace. Carsten Maple, Peter Norrington |
| 2006 | The knowledge pressure on Risk and Security managers is increasing. Christer Magnusson, Heidi Ola, Camilla Silversjo Holmqvist |
| 2006 | Timed Modelling and Analysis in Web Service Compositions. Raman Kazhamiakin, Paritosh K. Pandya, Marco Pistore |
| 2006 | Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition. Judith E. Y. Rossebø, Rolv Bræk |
| 2006 | Towards a Security Architecture for Vehicular Ad Hoc Networks. Klaus Plößl, Thomas Nowey, Christian Mletzko |
| 2006 | Towards a Stochastic Model for Integrated Security and Dependability Evaluation. Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog |
| 2006 | Towards an Integrated Conceptual Model of Security and Dependability. Erland Jonsson |
| 2006 | Trust Based Risk Management for Distributed System Security - A New Approach. Ching Lin, Vijay Varadharajan |
| 2006 | Unlocking Repositories: Federated Security Solution for Attribute and Policy Based Access to Repositories via Web Services. Marek Hatala, Ty Mey Eap, Ashok Shah |
| 2006 | Using A Bayesian Averaging Model for Estimating the Reliability of Decisions in Multimodal Biometrics. Carsten Maple, Vitaly Schetinin |
| 2006 | Validation of IT-Security Measurement Tools. Ruedi Baer, Martin Dietrich |
| 2006 | Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks. Lukasz Juszczyk, Jaroslaw Lazowski, Schahram Dustdar |
| 2006 | Workshop-based Multiobjective Security Safeguard Selection. Thomas Neubauer, Christian Stummer, Edgar R. Weippl |