| 2008 | A Bayesian Approach for on-Line Max Auditing. Gerardo Canfora, Bice Cavallo |
| 2008 | A Behavioral Model of Ideologically-motivated "Snowball" Attacks. Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani |
| 2008 | A Case for High Availability in a Virtualized Environment (HAVEN). Erin Farr, Richard E. Harper, Lisa Spainhower, Jimi Xenidis |
| 2008 | A Cause-Based Approach to Preventing Software Vulnerabilities. David Byers, Nahid Shahmehri |
| 2008 | A Comprehensive Approach for Context-dependent Privacy Management. Elke Franz, Christin Groba, Thomas Springer, Mike Bergmann |
| 2008 | A Critique of k-Anonymity and Some of Its Enhancements. Josep Domingo-Ferrer, Vicenç Torra |
| 2008 | A Database Replication Protocol Where Multicast Writesets Are Always Committed. J. R. Juárez-Rodríguez, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil, Francesc D. Muñoz-Escoí |
| 2008 | A Distributed Defense Framework for Flooding-Based DDoS Attacks. Yonghua You, Mohammad Zulkernine, Anwar Haque |
| 2008 | A Federated Physical and Logical Access Control Enforcement Model. Stéphane Onno |
| 2008 | A Framework for Detecting Anomalies in VoIP Networks. Yacine Bouzida, Christophe Mangin |
| 2008 | A Framework for Proactive Fault Tolerance. Geoffroy Vallée, Kulathep Charoenpornwattana, Christian Engelmann, Anand Tikotekar, Chokchai Leangsuksun, Thomas J. Naughton, Stephen L. Scott |
| 2008 | A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors. Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer |
| 2008 | A Lightweight Security Analyzer inside GCC. Davide Pozza, Riccardo Sisto |
| 2008 | A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case. Ryma Abassi, Sihem Guemara El Fatmi |
| 2008 | A New Approach to Analysis of Interval Availability. Ezzat Kirmani, Cynthia S. Hood |
| 2008 | A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai |
| 2008 | A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. Shangping Ren, Kevin A. Kwiat |
| 2008 | A Novel Approach for Multiplication over GF(2m) in Polynomial Basis Representation. Abdulah Abdulah Zadeh |
| 2008 | A Novel Testbed for Detection of Malicious Software Functionality. Jostein Jensen |
| 2008 | A Pattern-Driven Security Process for SOA Applications. Nelly A. Delessy, Eduardo B. Fernández |
| 2008 | A Post-processing Method to Lessen k-Anonymity Dissimilarities. Agusti Solanas, Gloria Pujol, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz |
| 2008 | A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set. Duffy Angevine, Nur Zincir-Heywood |
| 2008 | A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection. Ulf Larson, Erland Jonsson, Stefan Lindskog |
| 2008 | A Secure High-Speed Identification Scheme for RFID Using Bloom Filters. Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura |
| 2008 | A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi |
| 2008 | A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. Jan Willemson, Arne Ansper |
| 2008 | A Security Model and its Application to a Distributed Decision Support System for Healthcare. Liang Xiao, Javier Vicente, Carlos Sáez, Andrew Peet, Alex Gibb, Paul H. Lewis, Srinandan Dasmahapatra, Madalina Croitoru, Horacio González-Vélez, Magí Lluch i Ariet, David Dupplaw |
| 2008 | A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. Zhili Chen, Liusheng Huang, Zhenshan Yu, Lingjun Li, Wei Yang |
| 2008 | A Survey on Trust and Reputation Schemes in Ad Hoc Networks. Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani |
| 2008 | A Systematic Review and Comparison of Security Ontologies. Carlos Blanco, Joaquín Lasheras, Rafael Valencia-García, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini |
| 2008 | Adaptabilty of a GP Based IDS on Wireless Networks. Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios |
| 2008 | Adaptive Data Integrity through Dynamically Redundant Data Structures. Vincenzo De Florio, Chris Blondia |
| 2008 | Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks. Kaliappa Nadar Ravindran, Jiang Wu, Kevin A. Kwiat, Ali Sabbir |
| 2008 | Alignment of Misuse Cases with Security Risk Management. Raimundas Matulevicius, Nicolas Mayer, Patrick Heymans |
| 2008 | An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. Gang Yao, Hongji Wang, Qingshan Jiang |
| 2008 | An End-to-End Security Solution for SCTP. Stefan Lindskog, Anna Brunström |
| 2008 | An Identity-Based Group Key Agreement Protocol from Pairing. Hongji Wang, Gang Yao, Qingshan Jiang |
| 2008 | An Image Encryption System by Cellular Automata with Memory. Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri |
| 2008 | An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200. Xiaolei Li, Jin Tian, Tingdi Zhao |
| 2008 | An Independent Evaluation of Web Timing Attack and its Countermeasure. Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi |
| 2008 | An Initial Model and a Discussion of Access Control in Patient Controlled Health Records. Lillian Røstad |
| 2008 | An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. Liwei Kuang, Mohammad Zulkernine |
| 2008 | An Ontological Approach to Secure MANET Management. Mark E. Orwat, Timothy E. Levin, Cynthia E. Irvine |
| 2008 | Analysis and Component-based Realization of Security Requirements. Denis Hatebur, Maritta Heisel, Holger Schmidt |
| 2008 | Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract). Orhan Cetinkaya |
| 2008 | Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessor. Nima Mehdizadeh, Mohammad Shokrollah-Shirazi, Seyed Ghassem Miremadi |
| 2008 | Annotating Regulations Using Cerno: An Application to Italian Documents - Extended Abstract. Nicola Zeni, Nadzeya Kiyavitskaya, James R. Cordy, Luisa Mich, John Mylopoulos |
| 2008 | AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes. Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit, Karim Tamine |
| 2008 | Anti-DDoS Virtualized Operating System. Sanjam Garg, Huzur Saran |
| 2008 | Application-Oriented Trust in Distributed Computing. Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi |
| 2008 | Applications for IT-Risk Management - Requirements and Practical Evaluation. Heinz Lothar Grob, Gereon Strauch, Christian Buddendick |
| 2008 | Assessing the Reliability and Cost of Web and Grid Orchestrations. Alan Stewart, Maurice Clint, Terry Harmer, Peter Kilpatrick, Ronald H. Perrott, Joaquim Gabarró |
| 2008 | Assessing the Value of Enterprise Identity Management (EIdM) - Towards a Generic Evaluation Approach. Denis Royer |
| 2008 | Automated Process Classi?cation Framework using SELinux Security Context. Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli |
| 2008 | Avoiding Policy-based Deadlocks in Business Processes. Mathias Kohler, Andreas Schaad |
| 2008 | Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy. Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair |
| 2008 | Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. Asier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez |
| 2008 | BlueTrust in a Real World. Bradley Markides, Marijke Coetzee |
| 2008 | Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho |
| 2008 | CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. José María de Fuentes, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda |
| 2008 | Cluster-Specific Information Loss Measures in Data Privacy: A Review. Vicenç Torra, Susana Ladra |
| 2008 | Cluster-based Group Key Agreement for Wireless Ad hoc Networks. Elisavet Konstantinou |
| 2008 | Clustering Oriented Architectures in Medical Sensor Environments. Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis |
| 2008 | Considerations Towards a Cyber Crime Profiling System. Kweku Kwakye Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff |
| 2008 | Context Ontology for Secure Interoperability. Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli |
| 2008 | Context-based Profiling for Anomaly Intrusion Detection with Diagnosis. Salem Benferhat, Karim Tabia |
| 2008 | Covering Your Assets in Software Engineering. Martin Gilje Jaatun, Inger Anne Tøndel |
| 2008 | Cryptanalysis and Improvement of an "Improved Remote Authentication Scheme with Smart Card". Marko Hölbl, Tatjana Welzer |
| 2008 | Cryptographic Properties of Second-Order Memory Elementary Cellular Automata. Ascensión Hernández Encinas, Ángel Martín del Rey, José Luis Pérez Iglesias, Gerardo Rodríguez Sánchez, Araceli Queiruga Dios |
| 2008 | Defending On-Line Web Application Security with User-Behavior Surveillance. Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen |
| 2008 | Defining Secure Business Processes with Respect to Multiple Objectives. Thomas Neubauer, Johannes Heurix |
| 2008 | Design of an FDB based Intra-domain Packet Traceback System. Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi |
| 2008 | Detecting Bots Based on Keylogging Activities. Yousof Al-Hammadi, Uwe Aickelin |
| 2008 | Detecting Key Players in 11-M Terrorist Network: A Case Study. |
| 2008 | Detecting Suspicious Relational Database Queries. Stefan Böttcher, Rita Hartel, Matthias Kirschner |
| 2008 | Detection of Malcodes by Packet Classification. Irfan Ahmed, Kyung-suk Lhee |
| 2008 | Distributed Information Retrieval Service for Ubiquitous Services. Takeshi Tsuchiya, Marc Lihan, Hirokazu Yoshinaga, Kei'ichi Koyanagi |
| 2008 | Dynamic Maintenance of Software Systems at Runtime. Habib Seifzadeh, Mostafa Kermani, Mohsen Sadighi Moshkenani |
| 2008 | Economic and Security Aspects of Applying a Threshold Scheme in e-Health. Bernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer |
| 2008 | Effective Monitoring of a Survivable Distributed Networked Information System. Paul Rubel, Michael Atighetchi, Partha P. Pal, Martin W. Fong, Richard O'Brien |
| 2008 | Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols. Rafael Martínez-Peláez, Cristina Satizábal, Francisco Rico-Novella, Jordi Forné |
| 2008 | Efficient High Availability Commit Processing. Heine Kolltveit, Svein-Olaf Hvasshovd |
| 2008 | Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes. Tsukasa Endo, Isao Echizen, Hiroshi Yoshiura |
| 2008 | Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology. Simon Tjoa, Stefan Jakoubi, Gerald Quirchmayr |
| 2008 | Enhancing Face Recognition with Location Information. R. J. Hulsebosch, P. W. G. Ebben |
| 2008 | Enocoro-80: A Hardware Oriented Stream Cipher. Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko |
| 2008 | Ensuring Progress in Amnesiac Replicated Systems. Rubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí |
| 2008 | Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. Mehdi Kiani, Andrew J. Clark, George M. Mohay |
| 2008 | Examination of Forwarding Obstruction Attacks in Structured Overlay Networks. Yo Mashimo, Shintaro Ueda, Yasutaka Shinzaki, Hiroshi Shigeno |
| 2008 | Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. Esma Aïmeur, Gilles Brassard, José M. Fernandez, Flavien Serge Mani Onana, Zbigniew Rakowski |
| 2008 | Extending Mixed Serialisation Graphs to Replicated Environments. Josep M. Bernabé-Gisbert, Francesc D. Muñoz-Escoí |
| 2008 | FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program Interruption. Navid Farazmand, Mahdi Fazeli, Seyed Ghassem Miremadi |
| 2008 | Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets. Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca |
| 2008 | Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems. Natsumi Kitajima, Yuichi Goto, Jingde Cheng |
| 2008 | Fault Effects in FlexRay-Based Networks with Hybrid Topology. Mehdi Dehbashi, Vahid Lari, Seyed Ghassem Miremadi, Mohammad Shokrollah-Shirazi |
| 2008 | Finding Evidence of Antedating in Digital Investigations. Svein Yngvar Willassen |
| 2008 | Fostering the Uptake of Secure Multiparty Computation in E-Commerce. Octavian Catrina, Florian Kerschbaum |
| 2008 | From Omega to ?P in the Crash-Recovery Failure Model with Unknown Membership. Mikel Larrea, Cristian Martín |
| 2008 | Fuzzy Belief-Based Supervision. Alexandre Vorobiev, Rudolph E. Seviora |
| 2008 | Fuzzy Private Matching (Extended Abstract). Lukasz Chmielewski, Jaap-Henk Hoepman |
| 2008 | GOST-28147 Encryption Implementation on Graphics Processing Units. Victor Korobitsin, Sergey Ilyin |
| 2008 | Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements. Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, Mohamed Eltoweissy |
| 2008 | Hardening XDS-Based Architectures. Kim Wuyts, Riccardo Scandariato, Geert Claeys, Wouter Joosen |
| 2008 | Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino |
| 2008 | Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella |
| 2008 | High Capacity Steganographic Method Based Upon JPEG. Adel Almohammad, Robert M. Hierons, Gheorghita Ghinea |
| 2008 | Histogram Matrix: Log File Visualization for Anomaly Detection. Adrian Frei, Marc Rennhard |
| 2008 | How to Open a File and Not Get Hacked. James A. Kupsch, Barton P. Miller |
| 2008 | IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI. Youhui Zhang, Hongyi Wang, Yu Gu, Dongsheng Wang |
| 2008 | ISEDS: An Information Security Engineering Database System Based on ISO Standards. Daisuke Horie, Shoichi Morimoto, Noor Azimah, Yuichi Goto, Jingde Cheng |
| 2008 | Identifying Security Aspects in Early Development Stages. Takao Okubo, Hidehiko Tanaka |
| 2008 | Implementing Multidimensional Security into OLAP Tools. Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini |
| 2008 | Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols. Zhiyao Liang, Rakesh M. Verma |
| 2008 | Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. Joshua Broadway, Benjamin P. Turnbull, Jill Slay |
| 2008 | Increasing the Performability of Computer Clusters Using RADIC II. Guna Santos, Angelo Duarte, Dolores Rexachs, Emilio Luque |
| 2008 | Information Stream Based Model for Organizing Security. Bernhard Thalheim, Sabah S. Al-Fedaghi, Khaled Al-Saqabi |
| 2008 | Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. Chik How Tan |
| 2008 | Integrating a Security Plug-in with the OpenUP/Basic Development Process. Shanai Ardi, Nahid Shahmehri |
| 2008 | Intelligent Video Surveillance Networks: Data Protection Challenges. Fanny Coudert, Jos Dumortier |
| 2008 | Intensive Programme on Information and Communication Security. Christian Schläger, Ludwig Fuchs, Günther Pernul |
| 2008 | Internet Observation with ISDAS: How Long Does a Worm Perform Scanning? Tomohiro Kobori, Hiroaki Kikuchi, Masato Terada |
| 2008 | Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani |
| 2008 | Intrusion Detection with Data Correlation Relation Graph. Amin Hassanzadeh, Babak Sadeghian |
| 2008 | Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations. Sini Ruohomaa, Lea Kutvonen |
| 2008 | Managing Priorities in Atomic Multicast Protocols. Emili Miedes, Francesc D. Muñoz-Escoí |
| 2008 | Matching Policies with Security Claims of Mobile Applications. Nataliia Bielova, Marco Dalla Torre, Nicola Dragoni, Ida Sri Rejeki Siahaan |
| 2008 | Modelling Security Properties in a Grid-based Operating System with Anti-Goals. Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang |
| 2008 | Multi-Level Reputation-Based Greylisting. Andreas Janecek, Wilfried N. Gansterer, K. Ashwin Kumar |
| 2008 | NFC Devices: Security and Privacy. Gerald Madlmayr, Josef Langer, Christian Kantner, Josef Scharinger |
| 2008 | Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge. Jens-Uwe Bußer, Steffen Fries, Martin Otto, Peter Hartmann |
| 2008 | Negotiation of Usage Control Policies - Simply the Best? Alexander Pretschner, Thomas Walter |
| 2008 | New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group. Shengke Zeng, Mingxing He, Weidong Luo |
| 2008 | New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. Youan Xiao |
| 2008 | On the Possibility of Small, Service-Free Disk Based Storage Systems. Jehan-François Pâris, Thomas J. E. Schwarz |
| 2008 | On the Security of VSH in Password Schemes. Kimmo Halunen, Pauli Rikula, Juha Röning |
| 2008 | PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini |
| 2008 | Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries. Yasuhiro Ohtaki |
| 2008 | Performance Analysis of Anonymous Communication Channels Provided by Tor. Andriy Panchenko, Lexi Pimenidis, Johannes Renner |
| 2008 | Performance of a Strategy Based Packets Forwarding in Ad Hoc Networks. Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Klopotek |
| 2008 | Policy-based Group Organizational Structure Management using an Ontological Approach. Mario Anzures-García, Luz A. Sánchez-Gálvez |
| 2008 | Privacy Aspects of eHealth. Daniel Slamanig, Christian Stingl |
| 2008 | Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles. Ananda Swarup Das, Jitu Kumar Keshri, Kannan Srinathan, Vaibhav Srivastava |
| 2008 | Privacy Preserving Support Vector Machines in Wireless Sensor Networks. Dong Seong Kim, Muhammad Anwarul Azim, Jong Sou Park |
| 2008 | Privacy Protected ELF for Private Computing on Public Platforms. Thomas H. Morris, V. S. S. Nair |
| 2008 | Privacy-Preserving Distributed Set Intersection. Qingsong Ye, Huaxiong Wang, Christophe Tartary |
| 2008 | Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. Stefan Katzenbeisser, Milan Petkovic |
| 2008 | Privacy-preserving Protocols for Finding the Convex Hulls. Qi Wang, Yonglong Luo, Liusheng Huang |
| 2008 | Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham |
| 2008 | Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain |
| 2008 | Property Specification and Static Verification of UML Models. Igor Siveroni, Andrea Zisman, George Spanoudakis |
| 2008 | Proposal for Efficient Searching and Presentation in Digital Forensics. Jooyoung Lee |
| 2008 | Providing Fault Tolerance in Wireless Backhaul Network Design with Path Restoration. Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo, Pakorn Leesutthipornchai |
| 2008 | Pure MPLS Technology. Liwen He, Paul Botham |
| 2008 | Quantitative Assessment of Enterprise Security System. Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Yautsiukhin |
| 2008 | RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks. Bo Zhang, Kai Han, Binoy Ravindran, E. Douglas Jensen |
| 2008 | Rapid Detection of Constant-Packet-Rate Flows. Kuan-Ta Chen, Jing-Kai Lou |
| 2008 | Recovery of Encryption Keys from Memory Using a Linear Scan. Christopher James Hargreaves, Howard Chivers |
| 2008 | Reliability Analysis using Graphical Duration Models. Roland Donat, Laurent Bouillaut, Patrice Aknin, Philippe Leray |
| 2008 | Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach. Boustia Narhimene, Aïcha Mokhtari |
| 2008 | Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. Yudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone |
| 2008 | Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of Rules. Holger Peine |
| 2008 | Run-time Information Flow Monitoring based on Dynamic Dependence Graphs. Salvador Cavadini, Diego Cheda |
| 2008 | SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa |
| 2008 | SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol. Xiang-he Yang, Huaping Hu, Xin Chen |
| 2008 | SPIT Detection and Prevention Method in VoIP Environment. Guangyu He, Yingyou Wen, Hong Zhao |
| 2008 | Secure Software Design in Practice. Per Håkon Meland, Jostein Jensen |
| 2008 | Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks. Arjan Durresi, Mimoza Durresi, Leonard Barolli |
| 2008 | Secure Steganography in Compressed Video Bitstreams. Bin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun |
| 2008 | Secure Team-Based EPR Access Acquisition in Wireless Networks. Sigurd Eskeland, Vladimir A. Oleshchuk |
| 2008 | Secure Wireless Sensor Networks. Xun Yi, Mike Faulkner, Eiji Okamoto |
| 2008 | Secure and Privacy-Friendly Logging for eGovernment Services. Karel Wouters, Koen Simoens, Danny Lathouwers, Bart Preneel |
| 2008 | Securing Telehealth Applications in a Web-Based e-Health Portal. Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli |
| 2008 | Security Analysis of Role-based Separation of Duty with Workflows. Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse |
| 2008 | Security Requirement Engineering at a Telecom Provider. Albin Zuccato, Viktor Endersz, Nils Daniels |
| 2008 | Security Requirements Variability for Software Product Lines. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini |
| 2008 | Software Security; A Vulnerability Activity Revisit. Mohammad Ali Hadavi, Hossein Shirazi, Hasan Mokhtari Sangchi, Vahid Saber Hamishagi |
| 2008 | Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. Alfredo Pironti, Riccardo Sisto |
| 2008 | Static Validation of Licence Conformance Policies. René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst |
| 2008 | Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. Marcus Völp |
| 2008 | Sustaining Web Services High-Availability Using Communities. Zakaria Maamar, Quan Z. Sheng, Djamal Benslimane |
| 2008 | Symmetric Active/Active Replication for Dependent Services. Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He |
| 2008 | Synthesis of Local Controller Programs for Enforcing Global Security Properties. Fabio Martinelli, Ilaria Matteucci |
| 2008 | The Impact of Flooding Attacks on Network-based Services. Meiko Jensen, Nils Gruschka, Norbert Luttenberger |
| 2008 | The REM Framework for Security Evaluation. Flora Amato, Valentina Casola, Antonino Mazzeo, Valeria Vittorini |
| 2008 | Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini |
| 2008 | Towards Formal Specification of Abstract Security Properties. Antonio Maña, Gimena Pujol |
| 2008 | Towards Incorporating Discrete-Event Systems in Secure Software Development. Sarah-Jane Whittaker, Mohammad Zulkernine, Karen Rudie |
| 2008 | Towards Practical Security Monitors of UML Policies for Mobile Applications. Fabio Massacci, Katsiaryna Naliuka |
| 2008 | Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. Frederic Stumpf, Claudia Eckert, Shane Balfe |
| 2008 | Towards a Dependable Architecture for Highly Available Internet Services. Pablo Neira Ayuso, Laurent Lefèvre, Denis Barbaron, Rafael M. Gasca |
| 2008 | Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments. Stefan G. Weber, Andreas Heinemann, Max Mühlhäuser |
| 2008 | Traceable Quantitative Risk Assessment Applied to Investment Decision for Local Backups. Steffen Weiss, Martin Wahl, Michael Tielemann, Klaus Meyer-Wegener |
| 2008 | Transforming Security Requirements into Architecture. Koen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen |
| 2008 | Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. Christian Schläger, Günther Pernul |
| 2008 | Type and Effect Annotations for Safe Memory Access in C. Syrine Tlili, Mourad Debbabi |
| 2008 | Using Composition Policies to Manage Authentication and Authorization Patterns and Services. Judith E. Y. Rossebø, Rolv Bræk |
| 2008 | Using Non-adaptive Group Testing to Construct Spy Agent Routes. Georgios Kalogridis, Chris J. Mitchell |
| 2008 | Using Security Patterns to Combine Security Metrics. Thomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen |
| 2008 | VEA-bility Security Metric: A Network Security Analysis Tool. Melanie Tupper, Nur Zincir-Heywood |
| 2008 | WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. Amir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi |
| 2008 | Weighted Datalog and Levels of Trust. Stefano Bistarelli, Fabio Martinelli, Francesco Santini |
| 2008 | Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. Benjamin P. Turnbull, Jill Slay |
| 2008 | haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism. Chih-Yin Lin |