| 2011 | A Complexity Based Forensic Analysis of the Trojan Horse Defence. Richard E. Overill, Jantje A. M. Silomon |
| 2011 | A Discussion of Visualization Techniques for the Analysis of Digital Evidence. Gerald Schrenk, Rainer Poisel |
| 2011 | A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network. Ghenima Bourkache, Mohamed Mezghiche, Karim Tamine |
| 2011 | A Gate Level Analysis of Transient Faults Effects on Dual-Core Chip-Multi Processors. Moslem Didehban, Ario Sadafi, Sajjad Salehi, Mohammad Bagher Chami |
| 2011 | A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks. Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang |
| 2011 | A Hypervisor-Based Bus System for Usage Control. Cornelius Moucha, Enrico Lovat, Alexander Pretschner |
| 2011 | A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) Applications. Ratnesh Sahay, Ronan Fox, Antoine Zimmermann, Axel Polleres, Manfred Hauswirth |
| 2011 | A Novel Chaining Approach to Indirect Control Transfer Instructions. Wei Chen, Zhiying Wang, Qiang Dou, Yongwen Wang |
| 2011 | A Novel Phase Coding Technique for Steganography in Auditive Media. Marcus Nutzinger, Juergen Wurzer |
| 2011 | A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis. Munkhbaatar Doyoddorj, Kyung Hyune Rhee |
| 2011 | A Proposed Web Access Control System Request Policy Framework for Cooperation of DNS and a Web Browser. Takashi Uemura, Shota Takagi, Yusuke Kosuda, Ryôichi Sasaki |
| 2011 | A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting. Maria B. Line, Inger Anne Tøndel, Erlend Andreas Gjære |
| 2011 | A Robust Anti-tamper Protection Scheme. Hing-Chung Tsang, Moon-Chuen Lee, Chi-Man Pun |
| 2011 | A Security Policy Model for Agent Based Service-Oriented Architectures. Eckehard Hermann |
| 2011 | A Server-side Approach to Privacy Policy Matching. Åsmund Ahlmann Nyre, Karin Bernsmed, Solvar Bo, Stian Pedersen |
| 2011 | A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies. Masaki Fujikawa, Masakatsu Nishigaki |
| 2011 | A Study on Context Services Model with Location Privacy. Hoon Ko, Goreti Marreiros, Zita A. Vale, Jongmyung Choi |
| 2011 | A Survey on Saving Personal Data in the Mobile Phone. Iosif Androulidakis, Gorazd Kandus |
| 2011 | A Trustworthy Usage Control Enforcement Framework. Ricardo Neisse, Alexander Pretschner, Valentina Di Giacomo |
| 2011 | A Visualization Method for Helping Children Assess the Risk of Websites. Tomoko Kajiyama |
| 2011 | ACON: Activity-Centric Access Control for Social Computing. Jaehong Park, Ravi S. Sandhu, Yuan Cheng |
| 2011 | ASPF: Adaptive anti-SPIT Policy-based Framework. Yannis Soupionis, Dimitris Gritzalis |
| 2011 | AW-RBAC: Access Control in Adaptive Workflow Systems. Maria Leitner, Stefanie Rinderle-Ma, Jürgen Mangler |
| 2011 | Accurate Adware Detection Using Opcode Sequence Extraction. Raja Khurram Shahzad, Niklas Lavesson, Henric Johnson |
| 2011 | An Approach to Access Control under Uncertainty. Farzad Salim, Jason Reid, Ed Dawson, Uwe Dulleck |
| 2011 | An Approach to Model-based Development of Secure and Reliable Systems. Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Michael VanHilst |
| 2011 | An Attribute Based Framework for Risk-Adaptive Access Control Models. Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipati |
| 2011 | An Epistemic Logic Based Framework for Reasoning about Information Hiding. I. Goriac |
| 2011 | An Identity-Centric Internet: Identity in the Cloud, Identity as a Service and Other Delights. Mikaël Ates, Serge Ravet, Abakar Mohamat Ahmat, Jacques Fayolle |
| 2011 | An Inductive Approach to Provable Anonymity. Yongjian Li, Jun Pang |
| 2011 | An Obfuscation-Based Approach against Injection Attacks. Fabrizio Baiardi, Daniele Sgandurra |
| 2011 | Application of Answer Set Programming for Public Health Data Integration and Analysis. Monica L. Nogueira, Noel P. Greis |
| 2011 | Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection. Tomasz Hachaj, Marek R. Ogiela |
| 2011 | Augmenting Surveillance System Capabilities by Exploiting Event Correlation and Distributed Attack Detection. Francesco Flammini, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini |
| 2011 | Automated Construction of a False Digital Alibi. Alfredo De Santis, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Mario Ianulardo |
| 2011 | Benefits of Federated Identity Management - A Survey from an Integrated Operations Viewpoint. Jostein Jensen |
| 2011 | Biometric Authentication as a Service for Enterprise Identity Management Deployment: A Data Protection Perspective. Christian Senk, Florian Dotzler |
| 2011 | Bulletin Boards in Voting Systems: Modelling and Measuring Privacy. Hugo Jonker, Jun Pang |
| 2011 | CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IP. Stefan Hofbauer, Gerald Quirchmayr, Christopher C. Wills |
| 2011 | Characterising and Analysing Security Requirements Modelling Initiatives. Péter Kárpáti, Guttorm Sindre, Andreas L. Opdahl |
| 2011 | Compositional Synthesis of Temporal Fault Trees from State Machines. Nidhal Mahmud, Martin Walker, Yiannis Papadopoulos |
| 2011 | Considering Dependent Components in the Terminal Pair Reliability Problem. Minh Lê, Max Walter |
| 2011 | Consistency Checks for Duties in Extended UML2 Activity Models. Sigrid Schefer |
| 2011 | Crowds Based on Secret-Sharing. Stefan Rass, Raphael Wigoutschnigg, Peter Schartner |
| 2011 | Cyber-Physical Systems Based Modeling of Dependability of Complex Network Systems. Kaliappa Ravindran |
| 2011 | Declassification Policy Management in Dynamic Information Systems. Julien A. Thomas, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2011 | Deriving Current State RBAC Models from Event Logs. Anne Baumgrass |
| 2011 | Development and Trial Application of Prototype Program for "Social-MRC": Social Consensus Formation Support System Concerning IT Risk Countermeasures. Ryôichi Sasaki, Kazushige Takakusaki, Masaru Ohkawara, Hiroshi Yajima, Hidetaka Masuda, Tetsuro Kobayashi |
| 2011 | Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence. Grant Osborne, Jill Slay |
| 2011 | Digital Profiling: A Computer Forensics Approach. Clara Maria Colombini, Antonio Colella |
| 2011 | Discovery and Integration of Web 2.0 Content into Geospatial Information Infrastructures: A Use Case in Wild Fire Monitoring. Manuela Núñez-Redó, Laura Díaz, José Gil, David González, Joaquín Huerta |
| 2011 | Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management. Cédric Bonhomme, Christophe Feltus, Michaël Petit |
| 2011 | ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo |
| 2011 | Early Detection of Security Misconfiguration Vulnerabilities in Web Applications. Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam |
| 2011 | Effective Security Impact Analysis with Patterns for Software Enhancement. Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka |
| 2011 | Enhance Data Privacy in Service Compositions through a Privacy Proxy. Zhendong Ma, Jürgen Mangler, Christian Wagner, Thomas Bleier |
| 2011 | Enhancing Fuzzing Technique for OKL4 Syscalls Testing. Amaury Gauthier, Clement Mazin, Julien Iguchi-Cartigny, Jean-Louis Lanet |
| 2011 | Evaluating RBAC Supported Techniques and their Validation and Verification. Nafees Qamar, Yves Ledru, Akram Idani |
| 2011 | Evaluation of Topological Vulnerability of the Internet under Regional Failures. Wei Peng, Zimu Li, Jinshu Su, Muwei Dong |
| 2011 | Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations. Péter Kárpáti, Andreas L. Opdahl, Guttorm Sindre |
| 2011 | Extended Spatio-temporal Relations between Moving and Non-moving Objects. Chang Choi, Junho Choi, Juhyun Shin, Ilsun You, Pankoo Kim |
| 2011 | Fast Implementation of the Advanced Encryption Standard Using Atmega1281. Kasumi Toriumi, Yoshio Kakizaki, Keiichi Iwamura |
| 2011 | Federated Authentication and Authorisation in the Social Science Domain. John P. Watt, Richard O. Sinnott, George Inman, David W. Chadwick |
| 2011 | File Block Classification by Support Vector Machine. Luigi Sportiello, Stefano Zanero |
| 2011 | Formalization of Receipt-Freeness in the Context of Electronic Voting. Katharina Bräunlich, Rüdiger Grimm |
| 2011 | Gaining Flexibility and Compliance in Rescue Processes with BPM. Kai Kittel, Stefan Sackmann |
| 2011 | Health Care Reform and the Internet. Patricia MacTaggart, Stephanie Fiore |
| 2011 | Here's Johnny: A Methodology for Developing Attacker Personas. Andrea S. Atzeni, Cesare Cameroni, Shamal Faily, John Lyle, Ivan Flechais |
| 2011 | Hidden Price of User Authentication: Cost Analysis and Stakeholder Motivation. Ludwig Meyer, Martin Auer, Markus D. Klemen, Stefan Biffl |
| 2011 | Hierarchical Knowledge Structure Applied to Image Analyzing System - Possibilities of Practical Usage. Krzysztof Wójcik |
| 2011 | IT Issues on Homeland Security and Defense. Kangbin Yim, Ilsun You |
| 2011 | Implicit Buffer Overflow Protection Using Memory Segregation. Brent G. Roth, Eugene H. Spafford |
| 2011 | Improving Resilience with Community Cloud Computing. Gerard Garlick |
| 2011 | Information Security Automation: How Far Can We Go? Raydel Montesino, Stefan Fenz |
| 2011 | Information Security Integral Engineering Technique and its Application in ISMS Design. Alexander V. Lyubimov, Dmitry V. Cheremushkin, Natalia Andreeva, Sergey Shustikov |
| 2011 | Information Security for Service Oriented Computing: Ally or Antagonist. Jacqui Chetty, Marijke Coetzee |
| 2011 | Integrating Patient-Related Entities Using Hospital Information System Data and Automatic Analysis of Free Text. Svetla Boytcheva, Galia Angelova, Zhivko Angelov, Dimitar Tcharaktchiev, Hristo Dimitrov |
| 2011 | Integrity and Confidentiality Annotations for Service Interfaces in SoaML Models. Bernhard Hoisl, Stefan Sobernig |
| 2011 | Introducing Verifiability in the POLYAS Remote Electronic Voting System. Maina M. Olembo, Patrick Schmidt, Melanie Volkamer |
| 2011 | Key Management Scheme Applicable to Various Topologies of Sensor Networks. Hidetoshi Yukimaru, Yoshio Kakizaki, Keiichi Iwamura |
| 2011 | Learning Privacy Preferences. Inger Anne Tøndel, Åsmund Ahlmann Nyre, Karin Bernsmed |
| 2011 | Learning Web Application Firewall - Benefits and Caveats. Dariusz Palka, Marek Zachara |
| 2011 | LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information. Reza Rawassizadeh, Johannes Heurix, Soheil Khosravipour, A Min Tjoa |
| 2011 | Model-Based Security Verification and Testing for Smart-cards. Elizabeta Fourneret, Martín Ochoa, Fabrice Bouquet, Julien Botella, Jan Jürjens, Parvaneh Yousefi |
| 2011 | Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets. Ermeson C. Andrade, Fumio Machida, Dong Seong Kim, Kishor S. Trivedi |
| 2011 | New Steganographic Techniques for the OOXML File Format. Aniello Castiglione, Bonaventura D'Alessio, Alfredo De Santis, Francesco Palmieri |
| 2011 | Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots. Yves Igor Jerschow, Martin Mauve |
| 2011 | Observer-based Testing of Distributed Protocols Designed for Harsh Environments. Kaliappa Ravindran, Gwangyu Ding |
| 2011 | On the Context-aware, Personalized Delivery of Process Information: Viewpoints, Problems, and Requirements. Markus Hipp, Bela Mutschler, Manfred Reichert |
| 2011 | Optimal Budget Allocation in Budget-based Access Control. Farzad Salim, Uwe Dulleck, Jason Reid, Ed Dawson |
| 2011 | Optimising CAPTCHA Generation. Suliman A. Alsuhibany |
| 2011 | Optimization of Privacy Preserving Mechanisms in Homogeneous Collaborative Association Rules Mining. Marcin Gorawski, Zacheusz Siedlecki |
| 2011 | PUF Based Scalable Private RFID Authentication. Mete Akgün, M. Ufuk Çaglayan |
| 2011 | Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event. Sajal Bhatia, George M. Mohay, Alan Tickle, Ejaz Ahmed |
| 2011 | Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing. Kristian Beckers, Holger Schmidt, Jan-Christoph Küster, Stephan Faßbender |
| 2011 | Performance Evaluation of ID-based Group Key Agreement Protocols. Elisavet Konstantinou, Eleni Klaoudatou, Pavlos Kamparmpakis |
| 2011 | Pose and Expression Recognition Using Limited Feature Points Based on a Dynamic Bayesian Network. Wei Zhao, Goo-Rak Kwon, Sang-Woong Lee |
| 2011 | Practitioners' Perspectives on Security in Agile Development. Steffen Bartsch |
| 2011 | Preliminary Thoughts on Cost-based Investment Decisions in IT: A Problem Analysis. Ralf Gitzel, Christian Cuske, Carsten Munch |
| 2011 | Privacy Frost: A User-Oriented Data Anonymization Tool. Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka |
| 2011 | Privacy Verification Using Ontologies. Martin Kost, Johann Christoph Freytag, Frank Kargl, Antonio Kung |
| 2011 | Proactive Detection of Kernel-Mode Rootkits. Pablo Bravo, Daniel F. García |
| 2011 | Proactive Failure Management by Integrated Unsupervised and Semi-Supervised Learning for Dependable Cloud Systems. Qiang Guan, Ziming Zhang, Song Fu |
| 2011 | Probabilistic Fault-tolerance of Distributed Services: A Paradigm for Dependable Applications. Kaliappa Ravindran |
| 2011 | Product Line Engineering in Large-Scale Lean and Agile Software Product Development Environments - Towards a Hybrid Approach to Decentral Control and Managed Reuse. Benjamin Blau, Tobias Hildenbrand |
| 2011 | Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility. Matthew Simon, Jill Slay |
| 2011 | Responsibility-driven Design and Development of Process-aware Security Policies. Maria Leitner, Stefanie Rinderle-Ma, Juergen Mangler |
| 2011 | Roadmap to Approaches for Carving of Fragmented Multimedia Files. Rainer Poisel, Simon Tjoa |
| 2011 | SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems. Rafael Accorsi, Claus Wonnemann, Sebastian Dochow |
| 2011 | Seamless Fusion of Secure Software and Trusted USB Token for Protecting Enterprise & Government Data. Asad M. Ali |
| 2011 | Secure Broadcast with One-Time Signatures in Controller Area Networks. Bogdan Groza, Pal-Stefan Murvay |
| 2011 | Securing Location-Aware Services Based on Online/Offline Signatures in VANETs. Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee |
| 2011 | Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base. Christian Jung, Manuel Rudolph, Reinhard Schwarz |
| 2011 | Security Issues in a Synchronous e-Training Platform. Juan C. Granda, Pelayo Nuño, Daniel F. García, Francisco J. Suárez |
| 2011 | Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges. Maria Leitner |
| 2011 | Security SLAs for Federated Cloud Services. Karin Bernsmed, Martin Gilje Jaatun, Per Håkon Meland, Astrid Undheim |
| 2011 | Security and Privacy in Companies: State-of-the-art and Qualitative Analysis. Barbara Krumay, Marie Caroline Oetzel |
| 2011 | Security in Model Driven Development: A Survey. Jostein Jensen, Martin Gilje Jaatun |
| 2011 | Selecting Software Packages for Secure Database Installations. Afonso Araújo Neto, Marco Vieira |
| 2011 | Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes. Miroslaw Trzupek |
| 2011 | Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security. Albin Zuccato, Nils Daniels, Cheevarat Jampathom |
| 2011 | Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices. Leandro Marín, Antonio J. Jara, Antonio Fernandez Gómez-Skarmeta |
| 2011 | Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011 |
| 2011 | Smatch Model: Extending RBAC Sessions in Virtualization Environment. Nora Cuppens-Boulahia, Frédéric Cuppens, Marie Nuadi |
| 2011 | Some Security Issues in SCALANCE Wireless Industrial Networks. Marius Cristea, Bogdan Groza, Mihai Iacob |
| 2011 | Stepwise Refinement of Complex Dependability Models Using LARES+. Max Walter |
| 2011 | Study of Countermeasures for Content Leaks by Video Recording. Masaki Fujikawa, Junki Akimoto, Fumihiko Oda, Kengo Moriyasu, Shingo Fuchi, Yoshikazu Takeda |
| 2011 | Support Access to Distributed EPRs with Three Levels of Identity Privacy Preservation. Rima Addas, Ning Zhang |
| 2011 | System State Discovery Via Information Content Clustering of System Logs. Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios |
| 2011 | Tag Impersonation Attack on Two RFID Mutual Authentication Protocols. Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Yiyuan Luo, Qi Chai |
| 2011 | Techniques for Automating Policy Specification for Application-oriented Access Controls. Z. Cliffe Schreuders, Christian Payne, Tanya Jane McGill |
| 2011 | Testbed for Mobile Telephony Networks. Konrad Meier, Dennis Wehrle, Klaus Rechert, Dirk von Suchodoletz |
| 2011 | The Java SPI Framework for Security Protocol Implementation. Matteo Avalle, Alfredo Pironti, Riccardo Sisto, Davide Pozza |
| 2011 | The Problem of Conceptual Incompatibility - Exploring the Potential of Conceptual Data Independence to Ease Data Integration. Simon McGinnes |
| 2011 | The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective. Ludwig Fuchs, Stefan Meier |
| 2011 | Trustworthiness Benchmarking of Web Applications Using Static Code Analysis. Afonso Araújo Neto, Marco Vieira |
| 2011 | Usage Control Enforcement - A Survey. Åsmund Ahlmann Nyre |
| 2011 | User-Centered Information Security Policy Development in a Post-Stuxnet World. Shamal Faily, Ivan Flechais |
| 2011 | Using CVSS in Attack Graphs. Laurent Gallon, Jean-Jacques Bascou |
| 2011 | Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters. Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara |
| 2011 | VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss. Masaya Sato, Toshihiro Yamauchi |
| 2011 | Van Wijngaarden Grammars and Metamorphism. Geoffroy Gueguen |
| 2011 | Web Services Security Policy Assertion Trade-offs. Tristan Lavarack, Marijke Coetzee |
| 2011 | Wormhole Attacks Mitigation in Ad Hoc Networks. Marianne A. Azer |