ARES B

203 papers

YearTitle / Authors
2008A Bayesian Approach for on-Line Max Auditing.
Gerardo Canfora, Bice Cavallo
2008A Behavioral Model of Ideologically-motivated "Snowball" Attacks.
Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani
2008A Case for High Availability in a Virtualized Environment (HAVEN).
Erin Farr, Richard E. Harper, Lisa Spainhower, Jimi Xenidis
2008A Cause-Based Approach to Preventing Software Vulnerabilities.
David Byers, Nahid Shahmehri
2008A Comprehensive Approach for Context-dependent Privacy Management.
Elke Franz, Christin Groba, Thomas Springer, Mike Bergmann
2008A Critique of k-Anonymity and Some of Its Enhancements.
Josep Domingo-Ferrer, Vicenç Torra
2008A Database Replication Protocol Where Multicast Writesets Are Always Committed.
J. R. Juárez-Rodríguez, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil, Francesc D. Muñoz-Escoí
2008A Distributed Defense Framework for Flooding-Based DDoS Attacks.
Yonghua You, Mohammad Zulkernine, Anwar Haque
2008A Federated Physical and Logical Access Control Enforcement Model.
Stéphane Onno
2008A Framework for Detecting Anomalies in VoIP Networks.
Yacine Bouzida, Christophe Mangin
2008A Framework for Proactive Fault Tolerance.
Geoffroy Vallée, Kulathep Charoenpornwattana, Christian Engelmann, Anand Tikotekar, Chokchai Leangsuksun, Thomas J. Naughton, Stephen L. Scott
2008A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors.
Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer
2008A Lightweight Security Analyzer inside GCC.
Davide Pozza, Riccardo Sisto
2008A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case.
Ryma Abassi, Sihem Guemara El Fatmi
2008A New Approach to Analysis of Interval Availability.
Ezzat Kirmani, Cynthia S. Hood
2008A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai
2008A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features.
Shangping Ren, Kevin A. Kwiat
2008A Novel Approach for Multiplication over GF(2m) in Polynomial Basis Representation.
Abdulah Abdulah Zadeh
2008A Novel Testbed for Detection of Malicious Software Functionality.
Jostein Jensen
2008A Pattern-Driven Security Process for SOA Applications.
Nelly A. Delessy, Eduardo B. Fernández
2008A Post-processing Method to Lessen k-Anonymity Dissimilarities.
Agusti Solanas, Gloria Pujol, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz
2008A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set.
Duffy Angevine, Nur Zincir-Heywood
2008A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection.
Ulf Larson, Erland Jonsson, Stefan Lindskog
2008A Secure High-Speed Identification Scheme for RFID Using Bloom Filters.
Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura
2008A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy.
Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi
2008A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications.
Jan Willemson, Arne Ansper
2008A Security Model and its Application to a Distributed Decision Support System for Healthcare.
Liang Xiao, Javier Vicente, Carlos Sáez, Andrew Peet, Alex Gibb, Paul H. Lewis, Srinandan Dasmahapatra, Madalina Croitoru, Horacio González-Vélez, Magí Lluch i Ariet, David Dupplaw
2008A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words.
Zhili Chen, Liusheng Huang, Zhenshan Yu, Lingjun Li, Wei Yang
2008A Survey on Trust and Reputation Schemes in Ad Hoc Networks.
Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani
2008A Systematic Review and Comparison of Security Ontologies.
Carlos Blanco, Joaquín Lasheras, Rafael Valencia-García, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini
2008Adaptabilty of a GP Based IDS on Wireless Networks.
Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios
2008Adaptive Data Integrity through Dynamically Redundant Data Structures.
Vincenzo De Florio, Chris Blondia
2008Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks.
Kaliappa Nadar Ravindran, Jiang Wu, Kevin A. Kwiat, Ali Sabbir
2008Alignment of Misuse Cases with Security Risk Management.
Raimundas Matulevicius, Nicolas Mayer, Patrick Heymans
2008An Authenticated 3-Round Identity-Based Group Key Agreement Protocol.
Gang Yao, Hongji Wang, Qingshan Jiang
2008An End-to-End Security Solution for SCTP.
Stefan Lindskog, Anna Brunström
2008An Identity-Based Group Key Agreement Protocol from Pairing.
Hongji Wang, Gang Yao, Qingshan Jiang
2008An Image Encryption System by Cellular Automata with Memory.
Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri
2008An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200.
Xiaolei Li, Jin Tian, Tingdi Zhao
2008An Independent Evaluation of Web Timing Attack and its Countermeasure.
Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi
2008An Initial Model and a Discussion of Access Control in Patient Controlled Health Records.
Lillian Røstad
2008An Intrusion-Tolerant Mechanism for Intrusion Detection Systems.
Liwei Kuang, Mohammad Zulkernine
2008An Ontological Approach to Secure MANET Management.
Mark E. Orwat, Timothy E. Levin, Cynthia E. Irvine
2008Analysis and Component-based Realization of Security Requirements.
Denis Hatebur, Maritta Heisel, Holger Schmidt
2008Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract).
Orhan Cetinkaya
2008Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessor.
Nima Mehdizadeh, Mohammad Shokrollah-Shirazi, Seyed Ghassem Miremadi
2008Annotating Regulations Using Cerno: An Application to Italian Documents - Extended Abstract.
Nicola Zeni, Nadzeya Kiyavitskaya, James R. Cordy, Luisa Mich, John Mylopoulos
2008AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes.
Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit, Karim Tamine
2008Anti-DDoS Virtualized Operating System.
Sanjam Garg, Huzur Saran
2008Application-Oriented Trust in Distributed Computing.
Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi
2008Applications for IT-Risk Management - Requirements and Practical Evaluation.
Heinz Lothar Grob, Gereon Strauch, Christian Buddendick
2008Assessing the Reliability and Cost of Web and Grid Orchestrations.
Alan Stewart, Maurice Clint, Terry Harmer, Peter Kilpatrick, Ronald H. Perrott, Joaquim Gabarró
2008Assessing the Value of Enterprise Identity Management (EIdM) - Towards a Generic Evaluation Approach.
Denis Royer
2008Automated Process Classi?cation Framework using SELinux Security Context.
Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli
2008Avoiding Policy-based Deadlocks in Business Processes.
Mathias Kohler, Andreas Schaad
2008Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy.
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair
2008Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks.
Asier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez
2008BlueTrust in a Real World.
Bradley Markides, Marijke Coetzee
2008Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender.
Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho
2008CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies.
José María de Fuentes, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda
2008Cluster-Specific Information Loss Measures in Data Privacy: A Review.
Vicenç Torra, Susana Ladra
2008Cluster-based Group Key Agreement for Wireless Ad hoc Networks.
Elisavet Konstantinou
2008Clustering Oriented Architectures in Medical Sensor Environments.
Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis
2008Considerations Towards a Cyber Crime Profiling System.
Kweku Kwakye Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff
2008Context Ontology for Secure Interoperability.
Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli
2008Context-based Profiling for Anomaly Intrusion Detection with Diagnosis.
Salem Benferhat, Karim Tabia
2008Covering Your Assets in Software Engineering.
Martin Gilje Jaatun, Inger Anne Tøndel
2008Cryptanalysis and Improvement of an "Improved Remote Authentication Scheme with Smart Card".
Marko Hölbl, Tatjana Welzer
2008Cryptographic Properties of Second-Order Memory Elementary Cellular Automata.
Ascensión Hernández Encinas, Ángel Martín del Rey, José Luis Pérez Iglesias, Gerardo Rodríguez Sánchez, Araceli Queiruga Dios
2008Defending On-Line Web Application Security with User-Behavior Surveillance.
Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen
2008Defining Secure Business Processes with Respect to Multiple Objectives.
Thomas Neubauer, Johannes Heurix
2008Design of an FDB based Intra-domain Packet Traceback System.
Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi
2008Detecting Bots Based on Keylogging Activities.
Yousof Al-Hammadi, Uwe Aickelin
2008Detecting Key Players in 11-M Terrorist Network: A Case Study.
2008Detecting Suspicious Relational Database Queries.
Stefan Böttcher, Rita Hartel, Matthias Kirschner
2008Detection of Malcodes by Packet Classification.
Irfan Ahmed, Kyung-suk Lhee
2008Distributed Information Retrieval Service for Ubiquitous Services.
Takeshi Tsuchiya, Marc Lihan, Hirokazu Yoshinaga, Kei'ichi Koyanagi
2008Dynamic Maintenance of Software Systems at Runtime.
Habib Seifzadeh, Mostafa Kermani, Mohsen Sadighi Moshkenani
2008Economic and Security Aspects of Applying a Threshold Scheme in e-Health.
Bernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer
2008Effective Monitoring of a Survivable Distributed Networked Information System.
Paul Rubel, Michael Atighetchi, Partha P. Pal, Martin W. Fong, Richard O'Brien
2008Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols.
Rafael Martínez-Peláez, Cristina Satizábal, Francisco Rico-Novella, Jordi Forné
2008Efficient High Availability Commit Processing.
Heine Kolltveit, Svein-Olaf Hvasshovd
2008Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes.
Tsukasa Endo, Isao Echizen, Hiroshi Yoshiura
2008Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology.
Simon Tjoa, Stefan Jakoubi, Gerald Quirchmayr
2008Enhancing Face Recognition with Location Information.
R. J. Hulsebosch, P. W. G. Ebben
2008Enocoro-80: A Hardware Oriented Stream Cipher.
Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko
2008Ensuring Progress in Amnesiac Replicated Systems.
Rubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí
2008Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks.
Mehdi Kiani, Andrew J. Clark, George M. Mohay
2008Examination of Forwarding Obstruction Attacks in Structured Overlay Networks.
Yo Mashimo, Shintaro Ueda, Yasutaka Shinzaki, Hiroshi Shigeno
2008Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System.
Esma Aïmeur, Gilles Brassard, José M. Fernandez, Flavien Serge Mani Onana, Zbigniew Rakowski
2008Extending Mixed Serialisation Graphs to Replicated Environments.
Josep M. Bernabé-Gisbert, Francesc D. Muñoz-Escoí
2008FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program Interruption.
Navid Farazmand, Mahdi Fazeli, Seyed Ghassem Miremadi
2008Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets.
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca
2008Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems.
Natsumi Kitajima, Yuichi Goto, Jingde Cheng
2008Fault Effects in FlexRay-Based Networks with Hybrid Topology.
Mehdi Dehbashi, Vahid Lari, Seyed Ghassem Miremadi, Mohammad Shokrollah-Shirazi
2008Finding Evidence of Antedating in Digital Investigations.
Svein Yngvar Willassen
2008Fostering the Uptake of Secure Multiparty Computation in E-Commerce.
Octavian Catrina, Florian Kerschbaum
2008From Omega to ?P in the Crash-Recovery Failure Model with Unknown Membership.
Mikel Larrea, Cristian Martín
2008Fuzzy Belief-Based Supervision.
Alexandre Vorobiev, Rudolph E. Seviora
2008Fuzzy Private Matching (Extended Abstract).
Lukasz Chmielewski, Jaap-Henk Hoepman
2008GOST-28147 Encryption Implementation on Graphics Processing Units.
Victor Korobitsin, Sergey Ilyin
2008Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements.
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, Mohamed Eltoweissy
2008Hardening XDS-Based Architectures.
Kim Wuyts, Riccardo Scandariato, Geert Claeys, Wouter Joosen
2008Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems.
Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino
2008Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms.
Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella
2008High Capacity Steganographic Method Based Upon JPEG.
Adel Almohammad, Robert M. Hierons, Gheorghita Ghinea
2008Histogram Matrix: Log File Visualization for Anomaly Detection.
Adrian Frei, Marc Rennhard
2008How to Open a File and Not Get Hacked.
James A. Kupsch, Barton P. Miller
2008IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI.
Youhui Zhang, Hongyi Wang, Yu Gu, Dongsheng Wang
2008ISEDS: An Information Security Engineering Database System Based on ISO Standards.
Daisuke Horie, Shoichi Morimoto, Noor Azimah, Yuichi Goto, Jingde Cheng
2008Identifying Security Aspects in Early Development Stages.
Takao Okubo, Hidehiko Tanaka
2008Implementing Multidimensional Security into OLAP Tools.
Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
2008Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols.
Zhiyao Liang, Rakesh M. Verma
2008Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis.
Joshua Broadway, Benjamin P. Turnbull, Jill Slay
2008Increasing the Performability of Computer Clusters Using RADIC II.
Guna Santos, Angelo Duarte, Dolores Rexachs, Emilio Luque
2008Information Stream Based Model for Organizing Security.
Bernhard Thalheim, Sabah S. Al-Fedaghi, Khaled Al-Saqabi
2008Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles.
Chik How Tan
2008Integrating a Security Plug-in with the OpenUP/Basic Development Process.
Shanai Ardi, Nahid Shahmehri
2008Intelligent Video Surveillance Networks: Data Protection Challenges.
Fanny Coudert, Jos Dumortier
2008Intensive Programme on Information and Communication Security.
Christian Schläger, Ludwig Fuchs, Günther Pernul
2008Internet Observation with ISDAS: How Long Does a Worm Perform Scanning?
Tomohiro Kobori, Hiroaki Kikuchi, Masato Terada
2008Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme.
Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani
2008Intrusion Detection with Data Correlation Relation Graph.
Amin Hassanzadeh, Babak Sadeghian
2008Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations.
Sini Ruohomaa, Lea Kutvonen
2008Managing Priorities in Atomic Multicast Protocols.
Emili Miedes, Francesc D. Muñoz-Escoí
2008Matching Policies with Security Claims of Mobile Applications.
Nataliia Bielova, Marco Dalla Torre, Nicola Dragoni, Ida Sri Rejeki Siahaan
2008Modelling Security Properties in a Grid-based Operating System with Anti-Goals.
Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang
2008Multi-Level Reputation-Based Greylisting.
Andreas Janecek, Wilfried N. Gansterer, K. Ashwin Kumar
2008NFC Devices: Security and Privacy.
Gerald Madlmayr, Josef Langer, Christian Kantner, Josef Scharinger
2008Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge.
Jens-Uwe Bußer, Steffen Fries, Martin Otto, Peter Hartmann
2008Negotiation of Usage Control Policies - Simply the Best?
Alexander Pretschner, Thomas Walter
2008New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group.
Shengke Zeng, Mingxing He, Weidong Luo
2008New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem.
Youan Xiao
2008On the Possibility of Small, Service-Free Disk Based Storage Systems.
Jehan-François Pâris, Thomas J. E. Schwarz
2008On the Security of VSH in Password Schemes.
Kimmo Halunen, Pauli Rikula, Juha Röning
2008PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices.
David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini
2008Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries.
Yasuhiro Ohtaki
2008Performance Analysis of Anonymous Communication Channels Provided by Tor.
Andriy Panchenko, Lexi Pimenidis, Johannes Renner
2008Performance of a Strategy Based Packets Forwarding in Ad Hoc Networks.
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Klopotek
2008Policy-based Group Organizational Structure Management using an Ontological Approach.
Mario Anzures-García, Luz A. Sánchez-Gálvez
2008Privacy Aspects of eHealth.
Daniel Slamanig, Christian Stingl
2008Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles.
Ananda Swarup Das, Jitu Kumar Keshri, Kannan Srinathan, Vaibhav Srivastava
2008Privacy Preserving Support Vector Machines in Wireless Sensor Networks.
Dong Seong Kim, Muhammad Anwarul Azim, Jong Sou Park
2008Privacy Protected ELF for Private Computing on Public Platforms.
Thomas H. Morris, V. S. S. Nair
2008Privacy-Preserving Distributed Set Intersection.
Qingsong Ye, Huaxiong Wang, Christophe Tartary
2008Privacy-Preserving Recommendation Systems for Consumer Healthcare Services.
Stefan Katzenbeisser, Milan Petkovic
2008Privacy-preserving Protocols for Finding the Convex Hulls.
Qi Wang, Yonglong Luo, Liusheng Huang
2008Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case.
William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham
2008Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain
2008Property Specification and Static Verification of UML Models.
Igor Siveroni, Andrea Zisman, George Spanoudakis
2008Proposal for Efficient Searching and Presentation in Digital Forensics.
Jooyoung Lee
2008Providing Fault Tolerance in Wireless Backhaul Network Design with Path Restoration.
Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo, Pakorn Leesutthipornchai
2008Pure MPLS Technology.
Liwen He, Paul Botham
2008Quantitative Assessment of Enterprise Security System.
Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Yautsiukhin
2008RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks.
Bo Zhang, Kai Han, Binoy Ravindran, E. Douglas Jensen
2008Rapid Detection of Constant-Packet-Rate Flows.
Kuan-Ta Chen, Jing-Kai Lou
2008Recovery of Encryption Keys from Memory Using a Linear Scan.
Christopher James Hargreaves, Howard Chivers
2008Reliability Analysis using Graphical Duration Models.
Roland Donat, Laurent Bouillaut, Patrice Aknin, Philippe Leray
2008Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach.
Boustia Narhimene, Aïcha Mokhtari
2008Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach.
Yudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone
2008Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of Rules.
Holger Peine
2008Run-time Information Flow Monitoring based on Dynamic Dependence Graphs.
Salvador Cavadini, Diego Cheda
2008SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks.
Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa
2008SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol.
Xiang-he Yang, Huaping Hu, Xin Chen
2008SPIT Detection and Prevention Method in VoIP Environment.
Guangyu He, Yingyou Wen, Hong Zhao
2008Secure Software Design in Practice.
Per Håkon Meland, Jostein Jensen
2008Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks.
Arjan Durresi, Mimoza Durresi, Leonard Barolli
2008Secure Steganography in Compressed Video Bitstreams.
Bin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun
2008Secure Team-Based EPR Access Acquisition in Wireless Networks.
Sigurd Eskeland, Vladimir A. Oleshchuk
2008Secure Wireless Sensor Networks.
Xun Yi, Mike Faulkner, Eiji Okamoto
2008Secure and Privacy-Friendly Logging for eGovernment Services.
Karel Wouters, Koen Simoens, Danny Lathouwers, Bart Preneel
2008Securing Telehealth Applications in a Web-Based e-Health Portal.
Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli
2008Security Analysis of Role-based Separation of Duty with Workflows.
Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse
2008Security Requirement Engineering at a Telecom Provider.
Albin Zuccato, Viktor Endersz, Nils Daniels
2008Security Requirements Variability for Software Product Lines.
Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
2008Software Security; A Vulnerability Activity Revisit.
Mohammad Ali Hadavi, Hossein Shirazi, Hasan Mokhtari Sangchi, Vahid Saber Hamishagi
2008Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models.
Alfredo Pironti, Riccardo Sisto
2008Static Validation of Licence Conformance Policies.
René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst
2008Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels.
Marcus Völp
2008Sustaining Web Services High-Availability Using Communities.
Zakaria Maamar, Quan Z. Sheng, Djamal Benslimane
2008Symmetric Active/Active Replication for Dependent Services.
Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He
2008Synthesis of Local Controller Programs for Enforcing Global Security Properties.
Fabio Martinelli, Ilaria Matteucci
2008The Impact of Flooding Attacks on Network-based Services.
Meiko Jensen, Nils Gruschka, Norbert Luttenberger
2008The REM Framework for Security Evaluation.
Flora Amato, Valentina Casola, Antonino Mazzeo, Valeria Vittorini
2008Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements.
Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini
2008Towards Formal Specification of Abstract Security Properties.
Antonio Maña, Gimena Pujol
2008Towards Incorporating Discrete-Event Systems in Secure Software Development.
Sarah-Jane Whittaker, Mohammad Zulkernine, Karen Rudie
2008Towards Practical Security Monitors of UML Policies for Mobile Applications.
Fabio Massacci, Katsiaryna Naliuka
2008Towards Secure E-Commerce Based on Virtualization and Attestation Techniques.
Frederic Stumpf, Claudia Eckert, Shane Balfe
2008Towards a Dependable Architecture for Highly Available Internet Services.
Pablo Neira Ayuso, Laurent Lefèvre, Denis Barbaron, Rafael M. Gasca
2008Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments.
Stefan G. Weber, Andreas Heinemann, Max Mühlhäuser
2008Traceable Quantitative Risk Assessment Applied to Investment Decision for Local Backups.
Steffen Weiss, Martin Wahl, Michael Tielemann, Klaus Meyer-Wegener
2008Transforming Security Requirements into Architecture.
Koen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen
2008Trust Modelling in E-Commerce through Fuzzy Cognitive Maps.
Christian Schläger, Günther Pernul
2008Type and Effect Annotations for Safe Memory Access in C.
Syrine Tlili, Mourad Debbabi
2008Using Composition Policies to Manage Authentication and Authorization Patterns and Services.
Judith E. Y. Rossebø, Rolv Bræk
2008Using Non-adaptive Group Testing to Construct Spy Agent Routes.
Georgios Kalogridis, Chris J. Mitchell
2008Using Security Patterns to Combine Security Metrics.
Thomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen
2008VEA-bility Security Metric: A Network Security Analysis Tool.
Melanie Tupper, Nur Zincir-Heywood
2008WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks.
Amir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi
2008Weighted Datalog and Levels of Trust.
Stefano Bistarelli, Fabio Martinelli, Francesco Santini
2008Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics.
Benjamin P. Turnbull, Jill Slay
2008haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism.
Chih-Yin Lin