ARES B

159 papers

YearTitle / Authors
2009A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier.
Keita Emura, Atsuko Miyaji, Kazumasa Omote
2009A Criteria-Based Evaluation Framework for Authentication Schemes in IMS.
Charlott Eliasson, Markus Fiedler, Ivar Jørstad
2009A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics.
Keita Emura, Atsuko Miyaji, Kazumasa Omote
2009A First Step towards Characterizing Stealthy Botnets.
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu
2009A Framework for Understanding Botnets.
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu
2009A High Speed and Low Cost Error Correction Technique for the Carry Select Adder.
Alireza Namazi, Seyed Ghassem Miremadi, Alireza Ejlali
2009A Knowledge Management Approach to Support a Secure Software Development.
Francisco José Barreto Nunes, Arnaldo Dias Belchior, Adriano Bessa Albuquerque
2009A Micro-FT-UART for Safety-Critical SoC-Based Applications.
Mohammad-Hamed Razmkhah, Seyed Ghassem Miremadi, Alireza Ejlali
2009A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation.
Virginia N. L. Franqueira, Pascal van Eck, Roel J. Wieringa, Raul H. C. Lopes
2009A New Approach for Implementing the MPL Method toward Higher SPA Resistance.
Masami Izumi, Kazuo Sakiyama, Kazuo Ohta
2009A New Approach for the Construction of Fault Trees from System Simulink.
Gholamreza Latif Shabgahi, F. Tajarrod
2009A New Watermarking Attack Using Long-Range Correlation Image Restoration.
Amirhossein Taherinia, Mehran Fotouhi, Mansour Jamzad
2009A Perceptron Neural Network for Asymmetric Comparison-Based System-Level Fault Diagnosis.
Mourad Elhadef
2009A Pluggable Domain Management Approach for Building Practical Distributed Coalitions.
Yasuharu Katsuno, Yuji Watanabe, Michiharu Kudo, Eiji Okamoto
2009A Policy Framework for Data Management in Services Marketplaces.
Jun Li, Bryan Stephenson, Sharad Singhal
2009A Post-Mortem Incident Modeling Method.
Shanai Ardi, Nahid Shahmehri
2009A Practical Framework for the Dataflow Pointcut in AspectJ.
Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi
2009A Reconfigurable-Permutation Algorithm for M_S-Box.
Hiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, Yoshio Yoshioka
2009A Robust Image Watermarking Method in Wavelet Domain Using Genetic Algorithm.
S. Hamid Amiri, Mansour Jamzad
2009A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising.
Amirhossein Taherinia, Mansour Jamzad
2009A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems.
George Poulopoulos, Konstantinos Markantonakis, Keith Mayes
2009A Security Management Assurance Model to Holistically Assess the Information Security Posture.
Igli Tashi, Solange Ghernaouti-Helie
2009A Signature Scheme Associated with Universal Re-signcryption.
Kohei Tatara, Kouichi Sakurai
2009A Standard MIDI File Steganography Based on Fluctuation of Duration.
Kotaro Yamamoto, Munetoshi Iwakiri
2009A System of Privacy Preserving Distributed Spatial Data Warehouse Using Relation Decomposition.
Marcin Gorawski, Szymon Panfil
2009A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases.
Gerardo Canfora, Corrado Aaron Visaggio, Vito Paradiso
2009A-COLD: Access Control of Web OLAP over Multi-data Warehouse.
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt
2009AVISPA in the Validation of Ambient Intelligence Scenarios.
Antonio Muñoz, Antonio Maña, Daniel Serrano
2009Accuracy: The Fundamental Requirement for Voting Systems.
Tim Storer, Russell Lock
2009Advanced Flooding Attack on a SIP Server.
Xianglin Deng, Malcolm Shore
2009Algebraic Properties in Alice and Bob Notation.
Sebastian Mödersheim
2009An Analysis of Fault Effects and Propagations in AVR Microcontroller ATmega103(L).
Alireza Rohani, Hamid R. Zarandi
2009An Architectural Foundation for Security Model Sharing and Reuse.
Per Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri, Inger Anne Tøndel
2009An Authentication Watermark Algorithm for JPEG images.
Xiaowei Shi, Fenlin Liu, Daofu Gong, Jing Jing
2009An Automatic Privacy Policy Agreement Checker for E-services.
George O. M. Yee
2009An Efficient Measurement of Object Oriented Design Vulnerability.
Alka Agrawal, Shalini Chandra, Raees Ahmad Khan
2009An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents.
Frank Innerhofer-Oberperfler, Ruth Breu
2009An Experimental System for Studying the Tradeoff between Usability and Security.
Noam Ben-Asher, Joachim Meyer, Sebastian Möller, Roman Englert
2009An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers.
Genta Iha, Hiroshi Doi
2009An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange.
Marko Hölbl, Tatjana Welzer
2009An Improvement of REM: A Replication Oriented Event-Based Middleware.
Youcheng Chen, Mohammad Reza Selim, Yuichi Goto, Jingde Cheng
2009An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information.
Yoshio Kakizaki, Yoshiaki Yoshida, Hidekazu Tsuji
2009An Inclusive Information Society Needs a Global Approach of Information Security.
Solange Ghernaouti-Helie
2009An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications.
Ya-Fen Chang, Yen-Cheng Lai
2009Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs.
Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
2009Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method.
Omar Khadeer Hussain, Tharam S. Dillon
2009Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems.
Frédéric Majorczyk, Jonathan-Christofer Demay
2009Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering.
Daniel Mellado, Jesús Rodríguez, Eduardo Fernández-Medina, Mario Piattini
2009BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability.
Ping Chen, Yi Wang, Zhi Xin, Bing Mao, Li Xie
2009Blue Gene/L Log Analysis and Time to Interrupt Estimation.
Narate Taerat, Nichamon Naksinehaboon, Clayton Chandler, James Elliott, Chokchai Leangsuksun, George Ostrouchov, Stephen L. Scott, Christian Engelmann
2009Building a Responsibility Model Including Accountability, Capability and Commitment.
Christophe Feltus, Michaël Petit
2009Capturing Information Flow with Concatenated Dynamic Taint Analysis.
Hyung Chan Kim, Angelos D. Keromytis, Michael Covington, Ravi Sahita
2009Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack.
Nurdan Buz Saran, Ali Doganaksoy
2009Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide.
Amril Syalim, Yoshiaki Hori, Kouichi Sakurai
2009Computer Forensics in Japan: A Preliminary Study.
Jigang Liu, Tetsutaro Uehara
2009Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001.
Wolfgang Boehmer
2009Deconvolving Protected Signals.
Mohaned Kafi, Sylvain Guilley, Sandra Marcello, David Naccache
2009Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring.
Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang
2009Deploying Security Policy in Intra and Inter Workflow Management Systems.
Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens
2009Detecting Image Tampering Using Feature Fusion.
Pin Zhang, Xiangwei Kong
2009Detecting Stepping-Stone Connection Using Association Rule Mining.
Ying-Wei Kuo, Shou-Hsuan Stephen Huang
2009Different Approaches to In-House Identity Management - Justification of an Assumption.
Ludwig Fuchs, Christian Broser, Günther Pernul
2009Enhancement of Forensic Computing Investigations through Memory Forensic Techniques.
Matthew Simon, Jill Slay
2009Enhancing Automated Detection of Vulnerabilities in Java Components.
Pierre Parrend
2009Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation.
Grant Osborne, Benjamin P. Turnbull
2009Enhancing Control of Service Compositions in Service-Oriented Architectures.
Christian A. Schneider, Frederic Stumpf, Claudia Eckert
2009Enterprise-Oriented Digital Rights Management Mechanism: eDRM.
Chia-Chen Lin, Shih-Chi Wu, Po-Hsuan Chiang, Chang-Chi Chen
2009Estimating ToE Risk Level Using CVSS.
Siv Hilde Houmb, Virginia N. L. Franqueira
2009FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408.
Kenichi Yajima, Shoichi Morimoto, Daisuke Horie, Noor Sheila Azreen, Yuichi Goto, Jingde Cheng
2009Fault Tolerant and Low Energy Write-Back Heterogeneous Set Associative Cache for DSM Technologies.
Mehrtash Manoochehri, Alireza Ejlali, Seyed Ghassem Miremadi
2009Finding Preimages of Multiple Passwords Secured with VSH.
Kimmo Halunen, Pauli Rikula, Juha Röning
2009Formal Analyses of Usage Control Policies.
Alexander Pretschner, Judith Rüesch, Christian Schaefer, Thomas Walter
2009Generalized Robust Combiners for Oblivious Transfer.
Ganugula Umadevi, Sarat C. Addepalli, Kannan Srinathan
2009Generating AMF Configurations from Software Vendor Constraints and User Requirements.
Ali Kanso, Maria Toeroe, Abdelwahab Hamou-Lhadj, Ferhat Khendek
2009Generating User-Understandable Privacy Preferences.
Jan Paul Kolter, Günther Pernul
2009Generation of Prototypes for Masking Sequences of Events.
Aïda Valls, Cristina Gómez-Alonso, Vicenç Torra
2009Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments.
Juhani Anttila, Jorma Kajava
2009Identifying and Resolving Least Privilege Violations in Software Architectures.
Koen Buyens, Bart De Win, Wouter Joosen
2009Identity-Based Hybrid Signcryption.
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2009Improving Performance in Digital Forensics: A Case Using Pattern Matching Board.
Jooyoung Lee, Sungkyung Un, Dowon Hong
2009Improving Reliability for Multi-home Inbound Traffic: MHLB/I Packet-Level Inter-domain Load-Balancing.
Hiroshi Fujinoki
2009Including Security Rules Support in an MDA Approach for Secure DWs.
Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
2009Information Security Optimization: From Theory to Practice.
David John Simms
2009Intrusion Process Modeling for Security Quantification.
Jaafar Almasizadeh, Mohammad Abdollahi Azgomi
2009Investigating the Implications of Virtual Machine Introspection for Digital Forensics.
Kara L. Nance, Brian Hay, Matt Bishop
2009Linking Privacy Solutions to Developer Goals.
Kim Wuyts, Riccardo Scandariato, Bart De Decker, Wouter Joosen
2009Making Use of Human Visual Capability to Improve Information Security.
Masakatsu Nishigaki, Takumi Yamamoto
2009Managing Rights and Value of Digital Media.
Filippo Chiariglione, Giacomo Cosenza, Sergio Matone
2009Measuring Peer-to-Peer Botnets Using Control Flow Stability.
Binbin Wang, Zhitang Li, Hao Tu, Jie Ma
2009Measuring Voter-Controlled Privacy.
Hugo L. Jonker, Sjouke Mauw, Jun Pang
2009Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests.
Marcelo Masera, Igor Nai Fovino
2009Methodology to Align Business and IT Policies: Use Case from an IT Company.
Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau, André Adelsbach, Marc Camy
2009MixVM - An Approach to Service Isolation and Data Protection in Mobile Context-Sensitive Applications.
Thomas Butter, Markus Aleksy
2009Modeling Misuse Patterns.
Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki
2009Multidimensional Management of Information Security - A Metrics Based Approach Merging Business and Information Security Topics.
Sebastian Sowa, Roland Gabriel
2009Novel Algorithms for Subgroup Detection in Terrorist Networks
2009On Equilibrium Distribution Properties in Software Reliability Modeling.
Xiao Xiao, Tadashi Dohi
2009On Privacy Preserving Convex Hull.
Sandeep Hans, Sarat C. Addepalli, Anuj Gupta, Kannan Srinathan
2009On the Higher Order Nonlinearities of Boolean Functions and S-boxes.
Claude Carlet
2009On the Security of Untrusted Memory.
Jörn-Marc Schmidt, Stefan Tillich
2009P2F: A User-Centric Privacy Protection Framework.
Maryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas
2009Package-Role Based Authorization Control Model for Wireless Network Services.
Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson
2009Patient-Administered Access Control: A Usability Study.
Lillian Røstad, Ole Andreas Alsos
2009Patterns to Support the Development of Privacy Policies.
Luanna Lopes Lobato, Eduardo B. Fernández, Sérgio Donizetti Zorzo
2009Perfect Failure Detection in the Partitioned Synchronous Distributed System Model.
Raimundo José de Araújo Macêdo, Sérgio Gorender
2009Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets.
Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai
2009Position Paper: Secure Infrastructure for Scientific Data Life Cycle Management.
Marco Descher, Thomas Feilhauer, Thomas Ludescher, Philip Masser, B. Wenzel, Peter Brezany, Ibrahim Elsayed, Alexander Wöhrer, A Min Tjoa, David Huemer
2009Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element.
Vincent Alimi, Marc Pasquet
2009Prioritisation and Selection of Software Security Activities.
David Byers, Nahid Shahmehri
2009Privacy-Preserving Collaborative Filtering Schemes.
Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada
2009Proactive Resource Management for Failure Resilient High Performance Computing Clusters.
Song Fu, Cheng-Zhong Xu
2009Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan
2009Protecting Global and Static Variables from Buffer Overflow Attacks.
Yves Younan, Frank Piessens, Wouter Joosen
2009QR-TAN: Secure Mobile Transaction Authentication.
Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka
2009Quantitative Analysis of Secure Information Flow via Probabilistic Semantics.
Chunyan Mu, David Clark
2009Rank Swapping for Partial Orders and Continuous Variables.
Vicenç Torra
2009Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument.
Kotaro Yamamoto, Munetoshi Iwakiri
2009Reducing the Cost of Session Key Establishment.
Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya
2009Regulatory Compliance and Information Security Assurance.
Igli Tashi
2009Retaining Data Control to the Client in Infrastructure Clouds.
Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa, David Huemer
2009Reusable Security Requirements for Healthcare Applications.
Jostein Jensen, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, Herbjørn Andresen
2009Revealing the Calling History of SIP VoIP Systems by Timing Attacks.
Ge Zhang, Simone Fischer-Hübner, Leonardo A. Martucci, Sven Ehlert
2009Risk-Driven Architectural Decomposition.
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
2009Routing Protocol Security Using Symmetric Key Based Techniques.
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poornima, M. Divya
2009Scrubbing in Storage Virtualization Platform for Long-Term Backup Application.
Ao Ma, Yang Yin, Wenwu Na, Xiaoxuan Meng, Qingzhong Bu, Lu Xu
2009SecMiLiA: An Approach in the Agent Protection.
Antonio Muñoz, Antonio Maña, Daniel Serrano
2009Secrecy Capacity of Wireless LAN.
Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai
2009SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications.
Nina Moebius, Kurt Stenzel, Holger Grandy, Wolfgang Reif
2009Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots.
Sarat C. Addepalli, Piyush Bansal, Kannan Srinathan, K. Madhava Krishna
2009Security Analysis for P2P Routing Protocols.
Tatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai
2009Security Credential Mapping in Grids.
Mehran Ahsant, Esteban Talavera Gonzalez, Jim Basney
2009Security Evaluation of an Intrusion Tolerant System with MRSPNs.
Ryutaro Fujimoto, Hiroyuki Okamura, Tadashi Dohi
2009Security Requirements Specification in Service-Oriented Business Process Management.
Michael Menzel, Ivonne Thomas, Christoph Meinel
2009Security in Quantum Networks as an Optimization Problem.
Stefan Rass, Peter Schartner
2009Server-Side Prediction of Source IP Addresses Using Density Estimation.
Markus Goldstein, Matthias Reif, Armin Stahl, Thomas M. Breuel
2009Software Inspections Using Guided Checklists to Ensure Security Goals.
Frank Elberzhager, Alexander Klaus, Marek Jawurek
2009Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols.
Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula
2009Standards-Based Cyber Exercises.
Ronald C. Dodge, Brian Hay, Kara L. Nance
2009State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia.
Sopheak Cheang, Sinawong Sang
2009Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter?
Dejan Baca, Kai Petersen, Bengt Carlsson, Lars Lundberg
2009Statistical Failure Analysis of a Web Server System.
Toshiya Fujii, Tadashi Dohi
2009The Accountability Problem of Flooding Attacks in Service-Oriented Architectures.
Meiko Jensen, Jörg Schwenk
2009The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime Data.
Benjamin P. Turnbull, Robert Taylor, Barry Blundell
2009The Case for a Simpler Security Model in Grid Computing.
Frederik Orellana, Christian Ulrik Søttrup, Anders Wäänänen, Daniel Kalici, Michael Grønager
2009The User-Centric Vision Matches Credentials Exchanges.
Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon
2009Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings.
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
2009Towards Evaluation of Security Assurance during the Software Development Lifecycle.
Ilkka Uusitalo, Kaarina Karppinen, Pasi Ahonen, Heimo Pentikäinen
2009Towards Intrusion Detection for Encrypted Networks.
Vik Tor Goh, Jacob Zimmermann, Mark Looi
2009Traffic Controller: A Practical Approach to Block Network Covert Timing Channel.
Yi Wang, Ping Chen, Yi Ge, Bing Mao, Li Xie
2009Truly Anonymous Paper Submission and Review Scheme.
Chun-I Fan, Ming-Te Chen, Lung-Hsien Chen
2009Trusting User Defined Context in MANETs: Experience from the MIDAS Approach.
Vegar Westerlund, Thomas Pronstad, Inger Anne Tøndel, Leendert W. M. Wienhofen
2009Using Hybrid Trust Model for Handling Inaccurate Resource.
Bagher Rahimpour Cami, Mohammad Reza Matash Brujerdi
2009Using XACML for Embedded and Fine-Grained Access Control Policy.
George Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, Lisa M. Marvel
2009Utility and Risk of JPEG-Based Continuous Microdata Protection Methods.
Javier Jiménez, Vicenç Torra
2009Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones.
Collin Mulliner
2009Web Service Trust: Towards a Dynamic Assessment Framework.
George Spanoudakis, Stephane LoPresti
2009Workflows in Dynamic and Restricted Delegation.
Mehran Ahsant, Jim Basney
2009Yet Another Sanitizable Signature from Bilinear Maps.
Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka
2009hACMEgame: A Tool for Teaching Software Security.
Øyvind Nerbråten, Lillian Røstad