ARES B

155 papers

YearTitle / Authors
20073G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model.
Muhammad Sher, Thomas Magedanz
2007A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace.
Dalia El-Mansy, Ahmed Sameh
2007A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor Networks.
Mourad Elhadef, Azzedine Boukerche
2007A Framework for the Development of Secure Data Warehouses based on MDA and QVT.
Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini
2007A Human-Verifiable Authentication Protocol Using Visible Laser Light.
Rene Mayrhofer, Martyn Welch
2007A Hybrid Trust Model for Enhancing Security in Distributed Systems.
Ching Lin, Vijay Varadharajan
2007A Modular Architecture for Secure and Reliable Distributed Communication.
C. M. Jayalath, R. U. Fernando
2007A Near-Real-Time Behaviour Control Framework.
Bastian Preindl, Alexander Schatten
2007A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking.
Vidar Evenrud Seeberg, Slobodan Petrovic
2007A New Method for Reducing the Revocation Delay in the Attribute Authentication.
Yoshio Kakizaki, Hidekazu Tsuji
2007A Novel Approach to Building Secure Systems.
Dragan Vidakovic, Dejan Simic
2007A Pattern System for Security Requirements Engineering.
Denis Hatebur, Maritta Heisel, Holger Schmidt
2007A Policy Language for the Extended Reference Monitor in Trusted Operating Systems.
Hyung Chan Kim, Rudrapatna S. Ramakrishna, Wook Shin, Kouichi Sakurai
2007A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network.
Orhan Cetinkaya, Ali Doganaksoy
2007A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications.
Oliver Jorns, Oliver Jung, Gerald Quirchmayr
2007A Reconfigurable Implementation of the New Secure Hash Algorithm.
Zeghid Medien, Belgacem Bouallegue, Adel Baganne, Mohsen Machhout, Rached Tourki
2007A Recovery Protocol for Middleware Replicated Databases Providing GSI.
José Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Bettina Kemme
2007A Reflection-Based Framework for Content Validation.
Lars-Helge Netland, Yngve Espelid, Khalid A. Mughal
2007A Reliable Component-Based Architecture for E-Mail Filtering.
Wilfried N. Gansterer, Andreas Janecek, Peter Lechner
2007A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications.
Yijun He, Nan Xu, Jie Li
2007A Security Framework in RFID Multi-domain System.
Dong Seong Kim, Taek-Hyun Shin, Jong Sou Park
2007A Security Model and Architecture for Multichannel E-Government Systems.
Mariagrazia Fugini
2007A Semantic and Time Related Recommendation-Feedback Trust Model.
Lin Zhang, Feng Xu, Yuan Wang, Jian Lv
2007A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam.
Jimmy McGibney, Dmitri Botvich
2007A Universal Construction for Concurrent Objects.
Rachid Guerraoui, Michel Raynal
2007A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS.
Rafael Páez, Cristina Satizábal, Jordi Forné
2007A research agenda for Autonomous Business Process Management.
Thomas Neubauer, Gernot Goluch, Bernhard Riedl
2007A secure architecture for the pseudonymization of medical data.
Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck
2007A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses.
Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini
2007AProSec: an Aspect for Programming Secure Web Applications.
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien
2007Access Control Model for Web Services with Attribute Disclosure Restriction.
Vipin Singh Mewar, Subhendu Aich, Shamik Sural
2007Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges.
Lillian Røstad, Øystein Nytrø
2007Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack.
Dong Seong Kim, Chung Su Yang, Jong Sou Park
2007Agent Alliances: A Means for Practical Threshold Signature.
Regine Endsuleit, Christoph Amma
2007Aggregating and Deploying Network Access Control Policies.
Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia
2007An Application of Learning Problem in Anomaly-based Intrusion Detection Systems.
Veselina G. Jecheva, Evgeniya P. Nikolova
2007An Approach for Adaptive Intrusion Prevention Based on The Danger.
Alexander Krizhanovsky, Alexander Marasanov
2007An Efficient eAuction Protocol.
Brian Curtis, Josef Pieprzyk, Jan Seruga
2007Analysis on Bleichenbacher's Forgery Attack.
Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama
2007Application of QVT for the Development of Secure Data Warehouses: A case study.
Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini
2007Applications for Provably Secure Intent Protection with Bounded Input-Size Programs.
Jeffrey Todd McDonald, Alec Yasinsac
2007Applying a Flexible Mining Architecture to Intrusion Detection.
Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Giuliano Bellone de Grecis, Flaviano Fiorino
2007Applying a Tradeoff Model (TOM) to TACT.
Raihan Al-Ekram, Richard C. Holt, Chris Hobbs
2007AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification.
Mohammad Feroz Raihan, Mohammad Zulkernine
2007Attacks are Protocols Too.
Anders Moen Hagalisletto
2007Authentication Mechanisms for Mobile Agents.
Leila Ismail
2007Automatic Failure Detection with Separation of Concerns.
P. Hazy, Rudolph E. Seviora
2007Availability and Performance of the Adaptive Voting Replication.
Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Göschka
2007Blended Learning Technology in Information Security Management Courses.
Gerald Quirchmayr
2007Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain.
Bogdan Groza
2007Building a Dependable Messaging Infrastructure for Electronic Government.
Elsa Estevez, Tomasz Janowski
2007Bypassing Data Execution Prevention on MicrosoftWindows XP SP2.
Nenad Stojanovski, Marjan Gusev, Danilo Gligoroski, Svein J. Knapskog
2007Bytecode Verification for Enhanced JVM Access Control.
Dongxi Liu
2007CASSIS - Computer-based Academy for Security and Safety in Information Systems.
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa
2007CSP-Based Firewall Rule Set Diagnosis using Security Policies.
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
2007Collection of Quantitative Data on Security Incidents.
Thomas Nowey, Hannes Federrath
2007Comparing Classifier Combining Techniques for Mobile-Masquerader Detection.
Oleksiy Mazhelis, Seppo Puuronen
2007Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
2007Concurrency Control using Subject- and Purpose-Oriented (SPO) View.
Tomoya Enokido, Makoto Takizawa
2007Context-Dependent Access Control for Contextual Information.
Christin Groba, Stephan Groß, Thomas Springer
2007CppTest: A Prototype Tool for Testing C/C++ Programs.
Chengying Mao, Yansheng Lu
2007Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems.
Lorenz Froihofer, Johannes Osrael, Karl M. Göschka
2007Defining a Trusted Service-Oriented Network Environment.
Emmanuel A. Adigun, Jan H. P. Eloff
2007Dependability Aspects of Ubiquitous Computing.
Lu Yan, Kaisa Sere
2007Design of a Process for Software Security.
David Byers, Nahid Shahmehri
2007Designing a Cryptographic Scheme for e-Surveys in Higher-Education Institutions.
Alan Ward, Jordi Castellà-Roca, Aleix Dorca-Josa
2007Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology.
Paulina Januszkiewicz, Marek Pyka
2007Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network.
2007Dirichlet Reputation Systems.
Audun Jøsang, Jochen Haller
2007Distributed Stream Processing Analysis in High Availability Context.
Marcin Gorawski, Pawel Marks
2007Dynamic trust domains for secure, private, technology-assisted living.
Jatinder Singh, Jean Bacon, Ken Moody
2007E-Learning 2.0 = e-Learning 1.0 + Web 2.0?
Martin Ebner
2007Effects of Architectural Decisions in Authentication and Authorisation Infrastructures.
Christian Schläger, Monika Ganslmayer
2007Efficient Malicious Agreement in a Virtual Subnet Network.
Shu-Ching Wang, Shyi-Ching Liang, Kuo-Qin Yan, Guang-Yan Zheng
2007Efficient Multiparty Computation for Comparator Networks.
Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota
2007Empirical and statistical analysis of risk analysis-driven techniques for threat management.
Koen Buyens, Bart De Win, Wouter Joosen
2007Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes.
Benedikt Ostermaier, Florian Dotzer, Markus Strassberger
2007Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments.
Niraj Swami, Sheikh Iqbal Ahamed
2007Errors in Attacks on Authentication Protocols.
Anders Moen Hagalisletto
2007Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms.
Luis Zarza, Josep Pegueroles, Miguel Soriano
2007Event-Based Monitoring of Open Source Software Projects.
Dindin Wahyudin, A Min Tjoa
2007Exception Handling in an Event-Driven System.
Jan Ploski, Wilhelm Hasselbring
2007Extended RBAC - Based Design and Implementation for a Secure Data Warehouse.
Bhavani Thuraisingham, Srinivasan Iyer
2007FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance.
Bastian Braun
2007Failure Recovery in Cooperative Data Stream Analysis.
Bin Rong, Fred Douglis, Cathy H. Xia, Zhen Liu
2007Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model.
Keiji Ozaki, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa
2007Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances.
Abinandhan Chandrasekaran, Bhavani Thuraisingham
2007Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems.
Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell
2007Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies.
Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair
2007From Trust to Dependability through Risk Analysis.
Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone
2007HICI: An Approach for Identifying Trust Elements The case of technological trust perspective in VBEs.
Simon Samwel Msanjila, Hamideh Afsarmanesh
2007High Availability for Network Management Applications.
S. Prabhu, R. Venkat
2007How can the developer benefit from security modeling?
Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri
2007Implementing Network Partition-Aware Fault-Tolerant CORBA Systems.
Stefan Beyer, Francesc D. Muñoz-Escoí, Pablo Galdámez
2007Implicit Authorization for Accessing Location Data in a Social Context.
Georg Treu, Florian Fuchs, Christiane Dargatz
2007Improved Client-to-Client Password-Authenticated Key Exchange Protocol.
Gang Yao, Dengguo Feng, Xiaoxi Han
2007Indexing and Search of Correlated Business Events.
Roland Vecera, Szabolcs Rozsnyai, Heinz Roth
2007Insider-secure Hybrid Signcryption SchemeWithout Random Oracles.
Chik How Tan
2007Intrusion detection system for signal based SIP attacks through timed HCPN.
Yanlan Ding, Guiping Su
2007Issues in Testing Dependable Event-Based Systems at a Systems Integration Company.
Armin Beer, Matthias Heindl
2007Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards.
Geethapriya Venkataramani, Srividya Gopalan
2007Models for automatic generation of safety-critical real-time systems.
Christian Buckl, Matthias Regensburger, Alois C. Knoll, Gerhard Schrott
2007Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network.
Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin
2007On Coercion-Resistant Electronic Elections with Linear Work.
Stefan G. Weber, Roberto Araújo, Johannes Buchmann
2007On Programming Models for Service-Level High Availability.
Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He
2007On the Assessment of the Interaction Quality of Users with Cerebral Palsy.
Cesar Mauri, Toni Granollers, Agusti Solanas
2007On the implementation of the Omega failure detector in the crash-recovery failure model.
Cristian Martín, Mikel Larrea, Ernesto Jiménez
2007On the use of one-way chain based authentication protocols in secure control systems.
Bogdan Groza, Toma-Leonida Dragomir
2007Optimizing Events Traffic in Event-based Systems by means of Evolutionary Algorithms.
Jirí Kubalík, Richard Mordinyi
2007Pastures: Towards Usable Security Policy Engineering.
Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith
2007Privacy in Pervasive Computing and Open Issues.
Pankaj Bhaskar, Sheikh Iqbal Ahamed
2007Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria
2007Process Profiling Using Frequencies of System Calls.
Surekha Mariam Varghese, K. Poulose Jacob
2007Protecting Online Transactions with Unique Embedded Key Generators.
Martin Boesgaard, Erik Zenner
2007Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse.
Marcin Gorawski, Jakub Bularz
2007Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols.
Orhan Cetinkaya, Ali Doganaksoy
2007Query Assurance Verification for Dynamic Outsourced XML Databases.
Viet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng
2007RFID Security Issues in Military Supply Chains.
Qinghan Xiao, Cam Boulet, Thomas E. Gibbons
2007RWAR: A Resilient Window-consistent Asynchronous Replication Protocol.
Yanlong Wang, Zhanhuai Li, Wei Lin
2007Realizing fine-granular Read andWrite Rights on Tree Structured Documents.
Franz Kollmann
2007Reliability Markov Chains for Security Data Transmitter Analysis.
Calin Ciufudean, Bianca Satco, Constantin Filote
2007Reputation Management Survey.
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
2007Requirements and Evaluation Procedures for eVoting.
Melanie Volkamer, Margaret McGaley
2007Research and Design of Mobile Impeachment System with Semi-cryptonym.
Chaobo Yang, Ming Qi
2007Revisiting Hot Passive Replication.
Rubén de Juan-Marín, Hendrik Decker, Francesc D. Muñoz-Escoí
2007STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks.
Christoph Krauß, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert
2007Secure Anonymous Union Computation Among Malicious Partners.
Stefan Böttcher, Sebastian Obermeier
2007Secure Distributed Dossier Management in the Legal Domain.
Martijn Warnier, Frances M. T. Brazier, Martin Apistola, Anja Oskamp
2007Secure Software Development through Coding Conventions and Frameworks.
Takao Okubo, Hidehiko Tanaka
2007Secure Spatial Authentication using Cell Phones.
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli
2007Secure Web Application Development and Global Regulation.
William Bradley Glisson, L. Milton Glisson, Ray Welland
2007Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES).
David Arsenault, Arun Sood, Yih Huang
2007Securing Medical Sensor Environments: The CodeBlue Framework Case.
Georgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis
2007Security Objectives within a Security Testing Case Study.
Kaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala
2007Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials.
Anthony Stell, Richard O. Sinnott, Oluwafemi O. Ajayi, Jipu Jiang
2007Security Requirements for a Semantic Service-oriented Architecture.
Stefan Durbeck, Rolf Schillinger, Jan Paul Kolter
2007Security vulnerabilities in DNS and DNSSEC.
Suranjith Ariyapperuma, Chris J. Mitchell
2007Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach.
Mourad Elhadef, Azzedine Boukerche, Hisham Elkadiki
2007Self-Stabilization as a Foundation for Autonomic Computing.
Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuven Yagel
2007Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic.
Meriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri
2007Static evaluation of Certificate Policies for GRID PKIs interoperability.
Valentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina
2007Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management.
Ludwig Fuchs, Günther Pernul
2007Terrorist Networks Analysis through Argument Driven Hypotheses Model.
Dil Muhammad Akbar Hussain
2007The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols.
Jens Mache, Chris Allick
2007Towards Secure E-Elections in Turkey: Requirements and Principles.
Orhan Cetinkaya, Deniz Cetinkaya
2007Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE.
Mansoor Ahmed, Amin Andjomshoaa, Tho Manh Nguyen, A Min Tjoa
2007Trust in global computing systems as a limit property emerging from short range random interactions.
Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou
2007Universally Composable Three-Party Key Distribution.
TingMao Chang, Yuefei Zhu, Jin Zhou, Yajuan Zhang
2007Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process.
Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis
2007Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning.
Yuri Demchenko, Leon Gommans, Cees de Laat
2007Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management System.
Marcus Mor, Richard Mordinyi, Johannes Riemer
2007Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol.
Tieyan Li, Robert H. Deng
2007Web Engineering Security: Essential Elements.
William Bradley Glisson, Ray Welland
2007ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol.
Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki
2007eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope.
Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben