| 2007 | 3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. Muhammad Sher, Thomas Magedanz |
| 2007 | A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace. Dalia El-Mansy, Ahmed Sameh |
| 2007 | A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor Networks. Mourad Elhadef, Azzedine Boukerche |
| 2007 | A Framework for the Development of Secure Data Warehouses based on MDA and QVT. Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini |
| 2007 | A Human-Verifiable Authentication Protocol Using Visible Laser Light. Rene Mayrhofer, Martyn Welch |
| 2007 | A Hybrid Trust Model for Enhancing Security in Distributed Systems. Ching Lin, Vijay Varadharajan |
| 2007 | A Modular Architecture for Secure and Reliable Distributed Communication. C. M. Jayalath, R. U. Fernando |
| 2007 | A Near-Real-Time Behaviour Control Framework. Bastian Preindl, Alexander Schatten |
| 2007 | A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. Vidar Evenrud Seeberg, Slobodan Petrovic |
| 2007 | A New Method for Reducing the Revocation Delay in the Attribute Authentication. Yoshio Kakizaki, Hidekazu Tsuji |
| 2007 | A Novel Approach to Building Secure Systems. Dragan Vidakovic, Dejan Simic |
| 2007 | A Pattern System for Security Requirements Engineering. Denis Hatebur, Maritta Heisel, Holger Schmidt |
| 2007 | A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. Hyung Chan Kim, Rudrapatna S. Ramakrishna, Wook Shin, Kouichi Sakurai |
| 2007 | A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network. Orhan Cetinkaya, Ali Doganaksoy |
| 2007 | A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications. Oliver Jorns, Oliver Jung, Gerald Quirchmayr |
| 2007 | A Reconfigurable Implementation of the New Secure Hash Algorithm. Zeghid Medien, Belgacem Bouallegue, Adel Baganne, Mohsen Machhout, Rached Tourki |
| 2007 | A Recovery Protocol for Middleware Replicated Databases Providing GSI. José Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Bettina Kemme |
| 2007 | A Reflection-Based Framework for Content Validation. Lars-Helge Netland, Yngve Espelid, Khalid A. Mughal |
| 2007 | A Reliable Component-Based Architecture for E-Mail Filtering. Wilfried N. Gansterer, Andreas Janecek, Peter Lechner |
| 2007 | A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications. Yijun He, Nan Xu, Jie Li |
| 2007 | A Security Framework in RFID Multi-domain System. Dong Seong Kim, Taek-Hyun Shin, Jong Sou Park |
| 2007 | A Security Model and Architecture for Multichannel E-Government Systems. Mariagrazia Fugini |
| 2007 | A Semantic and Time Related Recommendation-Feedback Trust Model. Lin Zhang, Feng Xu, Yuan Wang, Jian Lv |
| 2007 | A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam. Jimmy McGibney, Dmitri Botvich |
| 2007 | A Universal Construction for Concurrent Objects. Rachid Guerraoui, Michel Raynal |
| 2007 | A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. Rafael Páez, Cristina Satizábal, Jordi Forné |
| 2007 | A research agenda for Autonomous Business Process Management. Thomas Neubauer, Gernot Goluch, Bernhard Riedl |
| 2007 | A secure architecture for the pseudonymization of medical data. Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck |
| 2007 | A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses. Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini |
| 2007 | AProSec: an Aspect for Programming Secure Web Applications. Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien |
| 2007 | Access Control Model for Web Services with Attribute Disclosure Restriction. Vipin Singh Mewar, Subhendu Aich, Shamik Sural |
| 2007 | Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges. Lillian Røstad, Øystein Nytrø |
| 2007 | Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack. Dong Seong Kim, Chung Su Yang, Jong Sou Park |
| 2007 | Agent Alliances: A Means for Practical Threshold Signature. Regine Endsuleit, Christoph Amma |
| 2007 | Aggregating and Deploying Network Access Control Policies. Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
| 2007 | An Application of Learning Problem in Anomaly-based Intrusion Detection Systems. Veselina G. Jecheva, Evgeniya P. Nikolova |
| 2007 | An Approach for Adaptive Intrusion Prevention Based on The Danger. Alexander Krizhanovsky, Alexander Marasanov |
| 2007 | An Efficient eAuction Protocol. Brian Curtis, Josef Pieprzyk, Jan Seruga |
| 2007 | Analysis on Bleichenbacher's Forgery Attack. Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama |
| 2007 | Application of QVT for the Development of Secure Data Warehouses: A case study. Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini |
| 2007 | Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. Jeffrey Todd McDonald, Alec Yasinsac |
| 2007 | Applying a Flexible Mining Architecture to Intrusion Detection. Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Giuliano Bellone de Grecis, Flaviano Fiorino |
| 2007 | Applying a Tradeoff Model (TOM) to TACT. Raihan Al-Ekram, Richard C. Holt, Chris Hobbs |
| 2007 | AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. Mohammad Feroz Raihan, Mohammad Zulkernine |
| 2007 | Attacks are Protocols Too. Anders Moen Hagalisletto |
| 2007 | Authentication Mechanisms for Mobile Agents. Leila Ismail |
| 2007 | Automatic Failure Detection with Separation of Concerns. P. Hazy, Rudolph E. Seviora |
| 2007 | Availability and Performance of the Adaptive Voting Replication. Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Göschka |
| 2007 | Blended Learning Technology in Information Security Management Courses. Gerald Quirchmayr |
| 2007 | Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain. Bogdan Groza |
| 2007 | Building a Dependable Messaging Infrastructure for Electronic Government. Elsa Estevez, Tomasz Janowski |
| 2007 | Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. Nenad Stojanovski, Marjan Gusev, Danilo Gligoroski, Svein J. Knapskog |
| 2007 | Bytecode Verification for Enhanced JVM Access Control. Dongxi Liu |
| 2007 | CASSIS - Computer-based Academy for Security and Safety in Information Systems. Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa |
| 2007 | CSP-Based Firewall Rule Set Diagnosis using Security Policies. Sergio Pozo, Rafael Ceballos, Rafael M. Gasca |
| 2007 | Collection of Quantitative Data on Security Incidents. Thomas Nowey, Hannes Federrath |
| 2007 | Comparing Classifier Combining Techniques for Mobile-Masquerader Detection. Oleksiy Mazhelis, Seppo Puuronen |
| 2007 | Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
| 2007 | Concurrency Control using Subject- and Purpose-Oriented (SPO) View. Tomoya Enokido, Makoto Takizawa |
| 2007 | Context-Dependent Access Control for Contextual Information. Christin Groba, Stephan Groß, Thomas Springer |
| 2007 | CppTest: A Prototype Tool for Testing C/C++ Programs. Chengying Mao, Yansheng Lu |
| 2007 | Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems. Lorenz Froihofer, Johannes Osrael, Karl M. Göschka |
| 2007 | Defining a Trusted Service-Oriented Network Environment. Emmanuel A. Adigun, Jan H. P. Eloff |
| 2007 | Dependability Aspects of Ubiquitous Computing. Lu Yan, Kaisa Sere |
| 2007 | Design of a Process for Software Security. David Byers, Nahid Shahmehri |
| 2007 | Designing a Cryptographic Scheme for e-Surveys in Higher-Education Institutions. Alan Ward, Jordi Castellà-Roca, Aleix Dorca-Josa |
| 2007 | Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology. Paulina Januszkiewicz, Marek Pyka |
| 2007 | Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. |
| 2007 | Dirichlet Reputation Systems. Audun Jøsang, Jochen Haller |
| 2007 | Distributed Stream Processing Analysis in High Availability Context. Marcin Gorawski, Pawel Marks |
| 2007 | Dynamic trust domains for secure, private, technology-assisted living. Jatinder Singh, Jean Bacon, Ken Moody |
| 2007 | E-Learning 2.0 = e-Learning 1.0 + Web 2.0? Martin Ebner |
| 2007 | Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. Christian Schläger, Monika Ganslmayer |
| 2007 | Efficient Malicious Agreement in a Virtual Subnet Network. Shu-Ching Wang, Shyi-Ching Liang, Kuo-Qin Yan, Guang-Yan Zheng |
| 2007 | Efficient Multiparty Computation for Comparator Networks. Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota |
| 2007 | Empirical and statistical analysis of risk analysis-driven techniques for threat management. Koen Buyens, Bart De Win, Wouter Joosen |
| 2007 | Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes. Benedikt Ostermaier, Florian Dotzer, Markus Strassberger |
| 2007 | Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments. Niraj Swami, Sheikh Iqbal Ahamed |
| 2007 | Errors in Attacks on Authentication Protocols. Anders Moen Hagalisletto |
| 2007 | Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. Luis Zarza, Josep Pegueroles, Miguel Soriano |
| 2007 | Event-Based Monitoring of Open Source Software Projects. Dindin Wahyudin, A Min Tjoa |
| 2007 | Exception Handling in an Event-Driven System. Jan Ploski, Wilhelm Hasselbring |
| 2007 | Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. Bhavani Thuraisingham, Srinivasan Iyer |
| 2007 | FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance. Bastian Braun |
| 2007 | Failure Recovery in Cooperative Data Stream Analysis. Bin Rong, Fred Douglis, Cathy H. Xia, Zhen Liu |
| 2007 | Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model. Keiji Ozaki, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa |
| 2007 | Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances. Abinandhan Chandrasekaran, Bhavani Thuraisingham |
| 2007 | Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
| 2007 | Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies. Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair |
| 2007 | From Trust to Dependability through Risk Analysis. Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone |
| 2007 | HICI: An Approach for Identifying Trust Elements The case of technological trust perspective in VBEs. Simon Samwel Msanjila, Hamideh Afsarmanesh |
| 2007 | High Availability for Network Management Applications. S. Prabhu, R. Venkat |
| 2007 | How can the developer benefit from security modeling? Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri |
| 2007 | Implementing Network Partition-Aware Fault-Tolerant CORBA Systems. Stefan Beyer, Francesc D. Muñoz-Escoí, Pablo Galdámez |
| 2007 | Implicit Authorization for Accessing Location Data in a Social Context. Georg Treu, Florian Fuchs, Christiane Dargatz |
| 2007 | Improved Client-to-Client Password-Authenticated Key Exchange Protocol. Gang Yao, Dengguo Feng, Xiaoxi Han |
| 2007 | Indexing and Search of Correlated Business Events. Roland Vecera, Szabolcs Rozsnyai, Heinz Roth |
| 2007 | Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. Chik How Tan |
| 2007 | Intrusion detection system for signal based SIP attacks through timed HCPN. Yanlan Ding, Guiping Su |
| 2007 | Issues in Testing Dependable Event-Based Systems at a Systems Integration Company. Armin Beer, Matthias Heindl |
| 2007 | Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards. Geethapriya Venkataramani, Srividya Gopalan |
| 2007 | Models for automatic generation of safety-critical real-time systems. Christian Buckl, Matthias Regensburger, Alois C. Knoll, Gerhard Schrott |
| 2007 | Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network. Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin |
| 2007 | On Coercion-Resistant Electronic Elections with Linear Work. Stefan G. Weber, Roberto Araújo, Johannes Buchmann |
| 2007 | On Programming Models for Service-Level High Availability. Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He |
| 2007 | On the Assessment of the Interaction Quality of Users with Cerebral Palsy. Cesar Mauri, Toni Granollers, Agusti Solanas |
| 2007 | On the implementation of the Omega failure detector in the crash-recovery failure model. Cristian Martín, Mikel Larrea, Ernesto Jiménez |
| 2007 | On the use of one-way chain based authentication protocols in secure control systems. Bogdan Groza, Toma-Leonida Dragomir |
| 2007 | Optimizing Events Traffic in Event-based Systems by means of Evolutionary Algorithms. Jirí Kubalík, Richard Mordinyi |
| 2007 | Pastures: Towards Usable Security Policy Engineering. Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith |
| 2007 | Privacy in Pervasive Computing and Open Issues. Pankaj Bhaskar, Sheikh Iqbal Ahamed |
| 2007 | Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria |
| 2007 | Process Profiling Using Frequencies of System Calls. Surekha Mariam Varghese, K. Poulose Jacob |
| 2007 | Protecting Online Transactions with Unique Embedded Key Generators. Martin Boesgaard, Erik Zenner |
| 2007 | Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. Marcin Gorawski, Jakub Bularz |
| 2007 | Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. Orhan Cetinkaya, Ali Doganaksoy |
| 2007 | Query Assurance Verification for Dynamic Outsourced XML Databases. Viet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng |
| 2007 | RFID Security Issues in Military Supply Chains. Qinghan Xiao, Cam Boulet, Thomas E. Gibbons |
| 2007 | RWAR: A Resilient Window-consistent Asynchronous Replication Protocol. Yanlong Wang, Zhanhuai Li, Wei Lin |
| 2007 | Realizing fine-granular Read andWrite Rights on Tree Structured Documents. Franz Kollmann |
| 2007 | Reliability Markov Chains for Security Data Transmitter Analysis. Calin Ciufudean, Bianca Satco, Constantin Filote |
| 2007 | Reputation Management Survey. Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli |
| 2007 | Requirements and Evaluation Procedures for eVoting. Melanie Volkamer, Margaret McGaley |
| 2007 | Research and Design of Mobile Impeachment System with Semi-cryptonym. Chaobo Yang, Ming Qi |
| 2007 | Revisiting Hot Passive Replication. Rubén de Juan-Marín, Hendrik Decker, Francesc D. Muñoz-Escoí |
| 2007 | STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. Christoph Krauß, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert |
| 2007 | Secure Anonymous Union Computation Among Malicious Partners. Stefan Böttcher, Sebastian Obermeier |
| 2007 | Secure Distributed Dossier Management in the Legal Domain. Martijn Warnier, Frances M. T. Brazier, Martin Apistola, Anja Oskamp |
| 2007 | Secure Software Development through Coding Conventions and Frameworks. Takao Okubo, Hidehiko Tanaka |
| 2007 | Secure Spatial Authentication using Cell Phones. Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli |
| 2007 | Secure Web Application Development and Global Regulation. William Bradley Glisson, L. Milton Glisson, Ray Welland |
| 2007 | Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). David Arsenault, Arun Sood, Yih Huang |
| 2007 | Securing Medical Sensor Environments: The CodeBlue Framework Case. Georgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis |
| 2007 | Security Objectives within a Security Testing Case Study. Kaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala |
| 2007 | Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials. Anthony Stell, Richard O. Sinnott, Oluwafemi O. Ajayi, Jipu Jiang |
| 2007 | Security Requirements for a Semantic Service-oriented Architecture. Stefan Durbeck, Rolf Schillinger, Jan Paul Kolter |
| 2007 | Security vulnerabilities in DNS and DNSSEC. Suranjith Ariyapperuma, Chris J. Mitchell |
| 2007 | Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach. Mourad Elhadef, Azzedine Boukerche, Hisham Elkadiki |
| 2007 | Self-Stabilization as a Foundation for Autonomic Computing. Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuven Yagel |
| 2007 | Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. Meriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri |
| 2007 | Static evaluation of Certificate Policies for GRID PKIs interoperability. Valentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina |
| 2007 | Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. Ludwig Fuchs, Günther Pernul |
| 2007 | Terrorist Networks Analysis through Argument Driven Hypotheses Model. Dil Muhammad Akbar Hussain |
| 2007 | The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols. Jens Mache, Chris Allick |
| 2007 | Towards Secure E-Elections in Turkey: Requirements and Principles. Orhan Cetinkaya, Deniz Cetinkaya |
| 2007 | Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE. Mansoor Ahmed, Amin Andjomshoaa, Tho Manh Nguyen, A Min Tjoa |
| 2007 | Trust in global computing systems as a limit property emerging from short range random interactions. Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou |
| 2007 | Universally Composable Three-Party Key Distribution. TingMao Chang, Yuefei Zhu, Jin Zhou, Yajuan Zhang |
| 2007 | Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis |
| 2007 | Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning. Yuri Demchenko, Leon Gommans, Cees de Laat |
| 2007 | Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management System. Marcus Mor, Richard Mordinyi, Johannes Riemer |
| 2007 | Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. Tieyan Li, Robert H. Deng |
| 2007 | Web Engineering Security: Essential Elements. William Bradley Glisson, Ray Welland |
| 2007 | ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki |
| 2007 | eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben |