ARES B

144 papers

YearTitle / Authors
2011A Complexity Based Forensic Analysis of the Trojan Horse Defence.
Richard E. Overill, Jantje A. M. Silomon
2011A Discussion of Visualization Techniques for the Analysis of Digital Evidence.
Gerald Schrenk, Rainer Poisel
2011A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network.
Ghenima Bourkache, Mohamed Mezghiche, Karim Tamine
2011A Gate Level Analysis of Transient Faults Effects on Dual-Core Chip-Multi Processors.
Moslem Didehban, Ario Sadafi, Sajjad Salehi, Mohammad Bagher Chami
2011A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks.
Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang
2011A Hypervisor-Based Bus System for Usage Control.
Cornelius Moucha, Enrico Lovat, Alexander Pretschner
2011A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) Applications.
Ratnesh Sahay, Ronan Fox, Antoine Zimmermann, Axel Polleres, Manfred Hauswirth
2011A Novel Chaining Approach to Indirect Control Transfer Instructions.
Wei Chen, Zhiying Wang, Qiang Dou, Yongwen Wang
2011A Novel Phase Coding Technique for Steganography in Auditive Media.
Marcus Nutzinger, Juergen Wurzer
2011A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis.
Munkhbaatar Doyoddorj, Kyung Hyune Rhee
2011A Proposed Web Access Control System Request Policy Framework for Cooperation of DNS and a Web Browser.
Takashi Uemura, Shota Takagi, Yusuke Kosuda, Ryôichi Sasaki
2011A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting.
Maria B. Line, Inger Anne Tøndel, Erlend Andreas Gjære
2011A Robust Anti-tamper Protection Scheme.
Hing-Chung Tsang, Moon-Chuen Lee, Chi-Man Pun
2011A Security Policy Model for Agent Based Service-Oriented Architectures.
Eckehard Hermann
2011A Server-side Approach to Privacy Policy Matching.
Åsmund Ahlmann Nyre, Karin Bernsmed, Solvar Bo, Stian Pedersen
2011A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies.
Masaki Fujikawa, Masakatsu Nishigaki
2011A Study on Context Services Model with Location Privacy.
Hoon Ko, Goreti Marreiros, Zita A. Vale, Jongmyung Choi
2011A Survey on Saving Personal Data in the Mobile Phone.
Iosif Androulidakis, Gorazd Kandus
2011A Trustworthy Usage Control Enforcement Framework.
Ricardo Neisse, Alexander Pretschner, Valentina Di Giacomo
2011A Visualization Method for Helping Children Assess the Risk of Websites.
Tomoko Kajiyama
2011ACON: Activity-Centric Access Control for Social Computing.
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
2011ASPF: Adaptive anti-SPIT Policy-based Framework.
Yannis Soupionis, Dimitris Gritzalis
2011AW-RBAC: Access Control in Adaptive Workflow Systems.
Maria Leitner, Stefanie Rinderle-Ma, Jürgen Mangler
2011Accurate Adware Detection Using Opcode Sequence Extraction.
Raja Khurram Shahzad, Niklas Lavesson, Henric Johnson
2011An Approach to Access Control under Uncertainty.
Farzad Salim, Jason Reid, Ed Dawson, Uwe Dulleck
2011An Approach to Model-based Development of Secure and Reliable Systems.
Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Michael VanHilst
2011An Attribute Based Framework for Risk-Adaptive Access Control Models.
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipati
2011An Epistemic Logic Based Framework for Reasoning about Information Hiding.
I. Goriac
2011An Identity-Centric Internet: Identity in the Cloud, Identity as a Service and Other Delights.
Mikaël Ates, Serge Ravet, Abakar Mohamat Ahmat, Jacques Fayolle
2011An Inductive Approach to Provable Anonymity.
Yongjian Li, Jun Pang
2011An Obfuscation-Based Approach against Injection Attacks.
Fabrizio Baiardi, Daniele Sgandurra
2011Application of Answer Set Programming for Public Health Data Integration and Analysis.
Monica L. Nogueira, Noel P. Greis
2011Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection.
Tomasz Hachaj, Marek R. Ogiela
2011Augmenting Surveillance System Capabilities by Exploiting Event Correlation and Distributed Attack Detection.
Francesco Flammini, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini
2011Automated Construction of a False Digital Alibi.
Alfredo De Santis, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Mario Ianulardo
2011Benefits of Federated Identity Management - A Survey from an Integrated Operations Viewpoint.
Jostein Jensen
2011Biometric Authentication as a Service for Enterprise Identity Management Deployment: A Data Protection Perspective.
Christian Senk, Florian Dotzler
2011Bulletin Boards in Voting Systems: Modelling and Measuring Privacy.
Hugo Jonker, Jun Pang
2011CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IP.
Stefan Hofbauer, Gerald Quirchmayr, Christopher C. Wills
2011Characterising and Analysing Security Requirements Modelling Initiatives.
Péter Kárpáti, Guttorm Sindre, Andreas L. Opdahl
2011Compositional Synthesis of Temporal Fault Trees from State Machines.
Nidhal Mahmud, Martin Walker, Yiannis Papadopoulos
2011Considering Dependent Components in the Terminal Pair Reliability Problem.
Minh Lê, Max Walter
2011Consistency Checks for Duties in Extended UML2 Activity Models.
Sigrid Schefer
2011Crowds Based on Secret-Sharing.
Stefan Rass, Raphael Wigoutschnigg, Peter Schartner
2011Cyber-Physical Systems Based Modeling of Dependability of Complex Network Systems.
Kaliappa Ravindran
2011Declassification Policy Management in Dynamic Information Systems.
Julien A. Thomas, Nora Cuppens-Boulahia, Frédéric Cuppens
2011Deriving Current State RBAC Models from Event Logs.
Anne Baumgrass
2011Development and Trial Application of Prototype Program for "Social-MRC": Social Consensus Formation Support System Concerning IT Risk Countermeasures.
Ryôichi Sasaki, Kazushige Takakusaki, Masaru Ohkawara, Hiroshi Yajima, Hidetaka Masuda, Tetsuro Kobayashi
2011Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence.
Grant Osborne, Jill Slay
2011Digital Profiling: A Computer Forensics Approach.
Clara Maria Colombini, Antonio Colella
2011Discovery and Integration of Web 2.0 Content into Geospatial Information Infrastructures: A Use Case in Wild Fire Monitoring.
Manuela Núñez-Redó, Laura Díaz, José Gil, David González, Joaquín Huerta
2011Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management.
Cédric Bonhomme, Christophe Feltus, Michaël Petit
2011ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments.
Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
2011Early Detection of Security Misconfiguration Vulnerabilities in Web Applications.
Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam
2011Effective Security Impact Analysis with Patterns for Software Enhancement.
Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
2011Enhance Data Privacy in Service Compositions through a Privacy Proxy.
Zhendong Ma, Jürgen Mangler, Christian Wagner, Thomas Bleier
2011Enhancing Fuzzing Technique for OKL4 Syscalls Testing.
Amaury Gauthier, Clement Mazin, Julien Iguchi-Cartigny, Jean-Louis Lanet
2011Evaluating RBAC Supported Techniques and their Validation and Verification.
Nafees Qamar, Yves Ledru, Akram Idani
2011Evaluation of Topological Vulnerability of the Internet under Regional Failures.
Wei Peng, Zimu Li, Jinshu Su, Muwei Dong
2011Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations.
Péter Kárpáti, Andreas L. Opdahl, Guttorm Sindre
2011Extended Spatio-temporal Relations between Moving and Non-moving Objects.
Chang Choi, Junho Choi, Juhyun Shin, Ilsun You, Pankoo Kim
2011Fast Implementation of the Advanced Encryption Standard Using Atmega1281.
Kasumi Toriumi, Yoshio Kakizaki, Keiichi Iwamura
2011Federated Authentication and Authorisation in the Social Science Domain.
John P. Watt, Richard O. Sinnott, George Inman, David W. Chadwick
2011File Block Classification by Support Vector Machine.
Luigi Sportiello, Stefano Zanero
2011Formalization of Receipt-Freeness in the Context of Electronic Voting.
Katharina Bräunlich, Rüdiger Grimm
2011Gaining Flexibility and Compliance in Rescue Processes with BPM.
Kai Kittel, Stefan Sackmann
2011Health Care Reform and the Internet.
Patricia MacTaggart, Stephanie Fiore
2011Here's Johnny: A Methodology for Developing Attacker Personas.
Andrea S. Atzeni, Cesare Cameroni, Shamal Faily, John Lyle, Ivan Flechais
2011Hidden Price of User Authentication: Cost Analysis and Stakeholder Motivation.
Ludwig Meyer, Martin Auer, Markus D. Klemen, Stefan Biffl
2011Hierarchical Knowledge Structure Applied to Image Analyzing System - Possibilities of Practical Usage.
Krzysztof Wójcik
2011IT Issues on Homeland Security and Defense.
Kangbin Yim, Ilsun You
2011Implicit Buffer Overflow Protection Using Memory Segregation.
Brent G. Roth, Eugene H. Spafford
2011Improving Resilience with Community Cloud Computing.
Gerard Garlick
2011Information Security Automation: How Far Can We Go?
Raydel Montesino, Stefan Fenz
2011Information Security Integral Engineering Technique and its Application in ISMS Design.
Alexander V. Lyubimov, Dmitry V. Cheremushkin, Natalia Andreeva, Sergey Shustikov
2011Information Security for Service Oriented Computing: Ally or Antagonist.
Jacqui Chetty, Marijke Coetzee
2011Integrating Patient-Related Entities Using Hospital Information System Data and Automatic Analysis of Free Text.
Svetla Boytcheva, Galia Angelova, Zhivko Angelov, Dimitar Tcharaktchiev, Hristo Dimitrov
2011Integrity and Confidentiality Annotations for Service Interfaces in SoaML Models.
Bernhard Hoisl, Stefan Sobernig
2011Introducing Verifiability in the POLYAS Remote Electronic Voting System.
Maina M. Olembo, Patrick Schmidt, Melanie Volkamer
2011Key Management Scheme Applicable to Various Topologies of Sensor Networks.
Hidetoshi Yukimaru, Yoshio Kakizaki, Keiichi Iwamura
2011Learning Privacy Preferences.
Inger Anne Tøndel, Åsmund Ahlmann Nyre, Karin Bernsmed
2011Learning Web Application Firewall - Benefits and Caveats.
Dariusz Palka, Marek Zachara
2011LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information.
Reza Rawassizadeh, Johannes Heurix, Soheil Khosravipour, A Min Tjoa
2011Model-Based Security Verification and Testing for Smart-cards.
Elizabeta Fourneret, Martín Ochoa, Fabrice Bouquet, Julien Botella, Jan Jürjens, Parvaneh Yousefi
2011Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets.
Ermeson C. Andrade, Fumio Machida, Dong Seong Kim, Kishor S. Trivedi
2011New Steganographic Techniques for the OOXML File Format.
Aniello Castiglione, Bonaventura D'Alessio, Alfredo De Santis, Francesco Palmieri
2011Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots.
Yves Igor Jerschow, Martin Mauve
2011Observer-based Testing of Distributed Protocols Designed for Harsh Environments.
Kaliappa Ravindran, Gwangyu Ding
2011On the Context-aware, Personalized Delivery of Process Information: Viewpoints, Problems, and Requirements.
Markus Hipp, Bela Mutschler, Manfred Reichert
2011Optimal Budget Allocation in Budget-based Access Control.
Farzad Salim, Uwe Dulleck, Jason Reid, Ed Dawson
2011Optimising CAPTCHA Generation.
Suliman A. Alsuhibany
2011Optimization of Privacy Preserving Mechanisms in Homogeneous Collaborative Association Rules Mining.
Marcin Gorawski, Zacheusz Siedlecki
2011PUF Based Scalable Private RFID Authentication.
Mete Akgün, M. Ufuk Çaglayan
2011Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event.
Sajal Bhatia, George M. Mohay, Alan Tickle, Ejaz Ahmed
2011Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing.
Kristian Beckers, Holger Schmidt, Jan-Christoph Küster, Stephan Faßbender
2011Performance Evaluation of ID-based Group Key Agreement Protocols.
Elisavet Konstantinou, Eleni Klaoudatou, Pavlos Kamparmpakis
2011Pose and Expression Recognition Using Limited Feature Points Based on a Dynamic Bayesian Network.
Wei Zhao, Goo-Rak Kwon, Sang-Woong Lee
2011Practitioners' Perspectives on Security in Agile Development.
Steffen Bartsch
2011Preliminary Thoughts on Cost-based Investment Decisions in IT: A Problem Analysis.
Ralf Gitzel, Christian Cuske, Carsten Munch
2011Privacy Frost: A User-Oriented Data Anonymization Tool.
Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka
2011Privacy Verification Using Ontologies.
Martin Kost, Johann Christoph Freytag, Frank Kargl, Antonio Kung
2011Proactive Detection of Kernel-Mode Rootkits.
Pablo Bravo, Daniel F. García
2011Proactive Failure Management by Integrated Unsupervised and Semi-Supervised Learning for Dependable Cloud Systems.
Qiang Guan, Ziming Zhang, Song Fu
2011Probabilistic Fault-tolerance of Distributed Services: A Paradigm for Dependable Applications.
Kaliappa Ravindran
2011Product Line Engineering in Large-Scale Lean and Agile Software Product Development Environments - Towards a Hybrid Approach to Decentral Control and Managed Reuse.
Benjamin Blau, Tobias Hildenbrand
2011Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility.
Matthew Simon, Jill Slay
2011Responsibility-driven Design and Development of Process-aware Security Policies.
Maria Leitner, Stefanie Rinderle-Ma, Juergen Mangler
2011Roadmap to Approaches for Carving of Fragmented Multimedia Files.
Rainer Poisel, Simon Tjoa
2011SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems.
Rafael Accorsi, Claus Wonnemann, Sebastian Dochow
2011Seamless Fusion of Secure Software and Trusted USB Token for Protecting Enterprise & Government Data.
Asad M. Ali
2011Secure Broadcast with One-Time Signatures in Controller Area Networks.
Bogdan Groza, Pal-Stefan Murvay
2011Securing Location-Aware Services Based on Online/Offline Signatures in VANETs.
Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee
2011Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base.
Christian Jung, Manuel Rudolph, Reinhard Schwarz
2011Security Issues in a Synchronous e-Training Platform.
Juan C. Granda, Pelayo Nuño, Daniel F. García, Francisco J. Suárez
2011Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges.
Maria Leitner
2011Security SLAs for Federated Cloud Services.
Karin Bernsmed, Martin Gilje Jaatun, Per Håkon Meland, Astrid Undheim
2011Security and Privacy in Companies: State-of-the-art and Qualitative Analysis.
Barbara Krumay, Marie Caroline Oetzel
2011Security in Model Driven Development: A Survey.
Jostein Jensen, Martin Gilje Jaatun
2011Selecting Software Packages for Secure Database Installations.
Afonso Araújo Neto, Marco Vieira
2011Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes.
Miroslaw Trzupek
2011Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security.
Albin Zuccato, Nils Daniels, Cheevarat Jampathom
2011Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices.
Leandro Marín, Antonio J. Jara, Antonio Fernandez Gómez-Skarmeta
2011Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011
2011Smatch Model: Extending RBAC Sessions in Virtualization Environment.
Nora Cuppens-Boulahia, Frédéric Cuppens, Marie Nuadi
2011Some Security Issues in SCALANCE Wireless Industrial Networks.
Marius Cristea, Bogdan Groza, Mihai Iacob
2011Stepwise Refinement of Complex Dependability Models Using LARES+.
Max Walter
2011Study of Countermeasures for Content Leaks by Video Recording.
Masaki Fujikawa, Junki Akimoto, Fumihiko Oda, Kengo Moriyasu, Shingo Fuchi, Yoshikazu Takeda
2011Support Access to Distributed EPRs with Three Levels of Identity Privacy Preservation.
Rima Addas, Ning Zhang
2011System State Discovery Via Information Content Clustering of System Logs.
Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios
2011Tag Impersonation Attack on Two RFID Mutual Authentication Protocols.
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Yiyuan Luo, Qi Chai
2011Techniques for Automating Policy Specification for Application-oriented Access Controls.
Z. Cliffe Schreuders, Christian Payne, Tanya Jane McGill
2011Testbed for Mobile Telephony Networks.
Konrad Meier, Dennis Wehrle, Klaus Rechert, Dirk von Suchodoletz
2011The Java SPI Framework for Security Protocol Implementation.
Matteo Avalle, Alfredo Pironti, Riccardo Sisto, Davide Pozza
2011The Problem of Conceptual Incompatibility - Exploring the Potential of Conceptual Data Independence to Ease Data Integration.
Simon McGinnes
2011The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective.
Ludwig Fuchs, Stefan Meier
2011Trustworthiness Benchmarking of Web Applications Using Static Code Analysis.
Afonso Araújo Neto, Marco Vieira
2011Usage Control Enforcement - A Survey.
Åsmund Ahlmann Nyre
2011User-Centered Information Security Policy Development in a Post-Stuxnet World.
Shamal Faily, Ivan Flechais
2011Using CVSS in Attack Graphs.
Laurent Gallon, Jean-Jacques Bascou
2011Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters.
Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara
2011VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss.
Masaya Sato, Toshihiro Yamauchi
2011Van Wijngaarden Grammars and Metamorphism.
Geoffroy Gueguen
2011Web Services Security Policy Assertion Trade-offs.
Tristan Lavarack, Marijke Coetzee
2011Wormhole Attacks Mitigation in Ad Hoc Networks.
Marianne A. Azer