ARES B

83 papers

YearTitle / Authors
2012A Common Body of Knowledge for Engineering Secure Software and Services.
Widura Schwittek, Holger Schmidt, Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel
2012A Comparative Study of Software Security Pattern Classifications.
Aleem Khalid Alvi, Mohammad Zulkernine
2012A Coordination-Driven Authorization Framework for Space Containers.
Stefan Craß, Tobias Dönz, Gerson Joskowicz, Eva Kühn
2012A Critical Survey of Security Indicator Approaches.
Manuel Rudolph, Reinhard Schwarz
2012A Group Signature Based Electronic Toll Pricing System.
Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang
2012A Multi-objective Decision Support Framework for Simulation-Based Security Control Selection.
Elmar Kiesling, Christine Strauss, Christian Stummer
2012A Personalized Whitelist Approach for Phishing Webpage Detection.
Amine Belabed, Esma Aïmeur, Mohammed Amine Chikh
2012A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems.
Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr
2012A Private Information Detector for Controlling Circulation of Private Information through Social Networks.
Midori Hirose, Akira Utsumi, Isao Echizen, Hiroshi Yoshiura
2012A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem.
Abdel Alim Kamal, Amr M. Youssef
2012A Statistical Approach for Identifying Videos of Child Pornography at Crime Scenes.
Mateus de Castro Polastro, Pedro Monteiro da Silva Eleuterio
2012A Taxonomy of Time and State Attacks.
Horia V. Corcalciuc
2012An Adaptive Risk Control and Security Management for Embedded Real-Time System.
Yue Ma, Wei Jiang, Nan Sang, Ziguo Zhong
2012An Algorithm for Compression of XACML Access Control Policy Sets by Recursive Subsumption.
Bernard Stepien, Stan Matwin, Amy P. Felty
2012An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites.
Moritz Riesner, Michael Netter, Günther Pernul
2012An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides.
Anne Baumgrass, Mark Strembeck
2012An Economic Model for Maximizing Profit of a Cloud Service Provider.
Thanadech Thanakornworakij, Raja Nassar, Chokchai Leangsuksun, Mihaela Paun
2012An Empirical Study on Design Diversity of Functionally Equivalent Web Services.
Amanda Sávio Nascimento, Fernando Castor, Cecília M. F. Rubira, Rachel Burrows
2012An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example.
Kristian Beckers, Stephan Faßbender, Holger Schmidt
2012An Ontology for Run-Time Verification of Security Certificates for SOA.
Stefania D'Agostini, Valentina Di Giacomo, Claudia Pandolfo, Domenico Presenza
2012Analyses of Two End-User Software Vulnerability Exposure Metrics.
Jason L. Wright, Miles McQueen, Lawrence Wellman
2012Anonymous Communication by Branch-and-Bound.
Stefan Rass, Peter Schartner, Raphael Wigoutschnigg, Christian Kollmitzer
2012Antidotes for DNS Poisoning by Off-Path Adversaries.
Amir Herzberg, Haya Schulmann
2012Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure.
Hoang-Quoc Nguyen-Son, Quoc-Binh Nguyen, Minh-Triet Tran, Dinh-Thuc Nguyen, Hiroshi Yoshiura, Isao Echizen
2012BPVrfy: Hybrid Cryptographic Scheme Based - Federate Identity Attributes Verification Model for Business Processes.
Nan Guo, Tianhan Gao, Bin Zhang
2012Boosting Logical Attack Graph for Efficient Security Control.
Zonghua Zhang, Shuzhen Wang
2012Building a Flexible Service Architecture for User Controlled Hybrid Clouds.
Anja Strunk, Marc Mosch, Stephan Groß, Yvonne Thoß, Alexander Schill
2012Building an Incident Management Body of Knowledge.
David A. Mundie, Robin Ruefle
2012Challenges of Web-Based Information Security Knowledge Sharing.
Daniel Feledi, Stefan Fenz
2012Civitas and the Real World: Problems and Solutions from a Practical Point of View.
Stephan Neumann, Melanie Volkamer
2012Classic Replication Techniques on the Cloud.
Itziar Arrieta-Salinas, José Enrique Armendáriz-Iñigo, Joan Navarro
2012Comparing Privacy Requirements Engineering Approaches.
Kristian Beckers
2012Design and Implementation of a CBR-based Privacy Agent.
Karin Bernsmed, Inger Anne Tøndel, Åsmund Ahlmann Nyre
2012Disabilities and Authentication Methods: Usability and Security.
Kirsi Helkala
2012Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration Context.
Jean Michel Combes, Ghada Arfaoui, Maryline Laurent
2012E-mail Classification Using Social Network Information.
Anton Borg, Niklas Lavesson
2012E2E: An Optimized IPsec Architecture for Secure and Fast Offload.
Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui, Maryline Laurent
2012Efficient Generic Construction of Forward-Secure Identity-Based Signature.
Noura Al Ebri, Joonsang Baek, Abdulhadi Shoufan, Quang Hieu Vu
2012Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption.
Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone
2012Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites.
Tomoko Kajiyama, Isao Echizen
2012Fault Tolerance and Power Consumption Analysis on Chip-Multi Processors Architectures.
Hossein Khezripour, Saadat Pourmozaffari
2012Federated Identity Management Challenges.
Jostein Jensen
2012From Computationally-proved Protocol Specifications to Implementations.
David Cadé, Bruno Blanchet
2012High Level Model of Control Flow Attacks for Smart Card Functional Security.
Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande
2012IO: An Interconnected Asset Ontology in Support of Risk Management Processes.
Henk Birkholz, Ingo Sieverdingbeck, Karsten Sohr, Carsten Bormann
2012InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs.
Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl
2012Integrating ISO/IEC 27001 and other Managerial Discipline Standards with Processes of Management in Organizations.
Juhani Anttila, Kari Jussila, Jorma Kajava, Ilkka Kamaja
2012Janitor, Certificate and Jury (JCJ) Trust Scheme for Wireless Ad-hoc Networks.
Mohamad M. Abuzaid, Marianne A. Azer
2012Location Anonymity Based on Fake Queries in Continuous Location-Based Services.
Lin Yao, Chi Lin, Guangya Liu, Fangyu Deng, Guowei Wu
2012Model-Based Digit Analysis for Fraud Detection Overcomes Limitations of Benford Analysis.
Christian Winter, Markus Schneider, York Yannikos
2012Oblivious and Fair Server-Aided Two-Party Computation.
Amir Herzberg, Haya Schulmann
2012On Measuring the Parasitic Backscatter of Sensor-Enabled UHF RFID Tags.
Thomas Plos, Christian Maierhofer
2012On the Weak State in GGHN-like Ciphers.
Aleksandar Kircanski, Amr M. Youssef
2012Organizational Risk Assessment Based on Attacks Repetition.
Marianne Azer, Ahmed Shaker, Sherif Nagy, Ahmed Raafat, Mohamad M. Abuzaid
2012Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and Performance.
Kristian Beckers, Stephan Faßbender
2012Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud Infrastructures.
Canh Ngo, Peter Membrey, Yuri Demchenko, Cees de Laat
2012Privacy Policy Preferences Enforced by SPARQL Query Rewriting.
Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci
2012RIM: A Method to Defend from JIT Spraying Attack.
Rui Wu, Ping Chen, Bing Mao, Li Xie
2012Repackaging Android Applications for Auditing Access to Private Data.
Pascal Berthomé, Thomas Fécherolle, Nicolas Guilloteau, Jean-François Lalande
2012Representing Threats in BPMN 2.0.
Per Håkon Meland, Erlend Andreas Gjære
2012Return-Oriented Programming Attack on the Xen Hypervisor.
Baozeng Ding, Yanjun Wu, Yeping He, Shuo Tian, Bei Guan, Guowei Wu
2012Secure Mobile Data Collection Systems for Low-Budget Settings.
Federico Mancini, Samson Gejibo, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr
2012Security Concept and Implementation for a Cloud Based E-science Infrastructure.
Thomas Ludescher, Thomas Feilhauer, Peter Brezany
2012Sensitivity Analysis of Loss of Corporate Efficiency and Productivity Associated with Enterprise DRM Technology.
Wen Zeng, Kaiyu Liu
2012Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012
2012Simplifying RAM Forensics: A GUI and Extensions for the Volatility Framework.
Steffen Logen, Hans Höfken, Marko Schuba
2012Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks.
Anca Jurcut, Tom Coffey, Reiner Dojen
2012Synthetic Data Creation for Forensic Tool Testing: Improving Performance of the 3LSPG Framework.
York Yannikos, Christian Winter, Markus Schneider
2012Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
Stanislaus Stelle, Mark Manulis, Matthias Hollick
2012Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications.
Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro
2012Towards Concurrent Data Sampling Using GPU Coprocessing.
Mark M. Seeger, Stephen D. Wolthusen
2012Towards a Holistic Information Security Governance Framework for SOA.
Marijke Coetzee
2012Towards an Open Standard Vote Verification Framework in Electronic Voting Systems.
Ali Fawzi Najm Al-Shammari, Adolfo Villafiorita, Komminist Weldemariam
2012Trusted Virtual Infrastructure Bootstrapping for On Demand Services.
Peter Membrey, Keith C. C. Chan, Canh Ngo, Yuri Demchenko, Cees de Laat
2012Two-Pronged Phish Snagging.
Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain
2012Type Classification against Fault Enabled Mutant in Java Based Smart Card.
Jean Dubreuil, Guillaume Bouffard, Jean-Louis Lanet, Julien Cartigny
2012Uncertainty Bounds for Digital Forensic Evidence and Hypotheses.
Richard E. Overill, Jantje A. M. Silomon
2012Understanding the Development Trends of Electronic Voting Systems.
Ali Fawzi Najm Al-Shammari, Adolfo Villafiorita, Komminist Weldemariam
2012Using Attack Graphs in Forensic Examinations.
Changwei Liu, Anoop Singhal, Duminda Wijesekera
2012Using Linear Support Vector Machines to Solve the Asymmetric Comparison-Based Fault Diagnosis Problem.
Mourad Elhadef
2012Using Ontologies for Adaptive Information Security Training.
Lee V. Mangold
2012Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation.
Kristian Beckers, Stephan Faßbender, Maritta Heisel, Holger Schmidt
2012Veto-based Malware Detection.
Raja Khurram Shahzad, Niklas Lavesson