| 2012 | A Common Body of Knowledge for Engineering Secure Software and Services. Widura Schwittek, Holger Schmidt, Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel |
| 2012 | A Comparative Study of Software Security Pattern Classifications. Aleem Khalid Alvi, Mohammad Zulkernine |
| 2012 | A Coordination-Driven Authorization Framework for Space Containers. Stefan Craß, Tobias Dönz, Gerson Joskowicz, Eva Kühn |
| 2012 | A Critical Survey of Security Indicator Approaches. Manuel Rudolph, Reinhard Schwarz |
| 2012 | A Group Signature Based Electronic Toll Pricing System. Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang |
| 2012 | A Multi-objective Decision Support Framework for Simulation-Based Security Control Selection. Elmar Kiesling, Christine Strauss, Christian Stummer |
| 2012 | A Personalized Whitelist Approach for Phishing Webpage Detection. Amine Belabed, Esma Aïmeur, Mohammed Amine Chikh |
| 2012 | A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems. Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr |
| 2012 | A Private Information Detector for Controlling Circulation of Private Information through Social Networks. Midori Hirose, Akira Utsumi, Isao Echizen, Hiroshi Yoshiura |
| 2012 | A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem. Abdel Alim Kamal, Amr M. Youssef |
| 2012 | A Statistical Approach for Identifying Videos of Child Pornography at Crime Scenes. Mateus de Castro Polastro, Pedro Monteiro da Silva Eleuterio |
| 2012 | A Taxonomy of Time and State Attacks. Horia V. Corcalciuc |
| 2012 | An Adaptive Risk Control and Security Management for Embedded Real-Time System. Yue Ma, Wei Jiang, Nan Sang, Ziguo Zhong |
| 2012 | An Algorithm for Compression of XACML Access Control Policy Sets by Recursive Subsumption. Bernard Stepien, Stan Matwin, Amy P. Felty |
| 2012 | An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites. Moritz Riesner, Michael Netter, Günther Pernul |
| 2012 | An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides. Anne Baumgrass, Mark Strembeck |
| 2012 | An Economic Model for Maximizing Profit of a Cloud Service Provider. Thanadech Thanakornworakij, Raja Nassar, Chokchai Leangsuksun, Mihaela Paun |
| 2012 | An Empirical Study on Design Diversity of Functionally Equivalent Web Services. Amanda Sávio Nascimento, Fernando Castor, Cecília M. F. Rubira, Rachel Burrows |
| 2012 | An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example. Kristian Beckers, Stephan Faßbender, Holger Schmidt |
| 2012 | An Ontology for Run-Time Verification of Security Certificates for SOA. Stefania D'Agostini, Valentina Di Giacomo, Claudia Pandolfo, Domenico Presenza |
| 2012 | Analyses of Two End-User Software Vulnerability Exposure Metrics. Jason L. Wright, Miles McQueen, Lawrence Wellman |
| 2012 | Anonymous Communication by Branch-and-Bound. Stefan Rass, Peter Schartner, Raphael Wigoutschnigg, Christian Kollmitzer |
| 2012 | Antidotes for DNS Poisoning by Off-Path Adversaries. Amir Herzberg, Haya Schulmann |
| 2012 | Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure. Hoang-Quoc Nguyen-Son, Quoc-Binh Nguyen, Minh-Triet Tran, Dinh-Thuc Nguyen, Hiroshi Yoshiura, Isao Echizen |
| 2012 | BPVrfy: Hybrid Cryptographic Scheme Based - Federate Identity Attributes Verification Model for Business Processes. Nan Guo, Tianhan Gao, Bin Zhang |
| 2012 | Boosting Logical Attack Graph for Efficient Security Control. Zonghua Zhang, Shuzhen Wang |
| 2012 | Building a Flexible Service Architecture for User Controlled Hybrid Clouds. Anja Strunk, Marc Mosch, Stephan Groß, Yvonne Thoß, Alexander Schill |
| 2012 | Building an Incident Management Body of Knowledge. David A. Mundie, Robin Ruefle |
| 2012 | Challenges of Web-Based Information Security Knowledge Sharing. Daniel Feledi, Stefan Fenz |
| 2012 | Civitas and the Real World: Problems and Solutions from a Practical Point of View. Stephan Neumann, Melanie Volkamer |
| 2012 | Classic Replication Techniques on the Cloud. Itziar Arrieta-Salinas, José Enrique Armendáriz-Iñigo, Joan Navarro |
| 2012 | Comparing Privacy Requirements Engineering Approaches. Kristian Beckers |
| 2012 | Design and Implementation of a CBR-based Privacy Agent. Karin Bernsmed, Inger Anne Tøndel, Åsmund Ahlmann Nyre |
| 2012 | Disabilities and Authentication Methods: Usability and Security. Kirsi Helkala |
| 2012 | Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration Context. Jean Michel Combes, Ghada Arfaoui, Maryline Laurent |
| 2012 | E-mail Classification Using Social Network Information. Anton Borg, Niklas Lavesson |
| 2012 | E2E: An Optimized IPsec Architecture for Secure and Fast Offload. Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui, Maryline Laurent |
| 2012 | Efficient Generic Construction of Forward-Secure Identity-Based Signature. Noura Al Ebri, Joonsang Baek, Abdulhadi Shoufan, Quang Hieu Vu |
| 2012 | Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone |
| 2012 | Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites. Tomoko Kajiyama, Isao Echizen |
| 2012 | Fault Tolerance and Power Consumption Analysis on Chip-Multi Processors Architectures. Hossein Khezripour, Saadat Pourmozaffari |
| 2012 | Federated Identity Management Challenges. Jostein Jensen |
| 2012 | From Computationally-proved Protocol Specifications to Implementations. David Cadé, Bruno Blanchet |
| 2012 | High Level Model of Control Flow Attacks for Smart Card Functional Security. Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande |
| 2012 | IO: An Interconnected Asset Ontology in Support of Risk Management Processes. Henk Birkholz, Ingo Sieverdingbeck, Karsten Sohr, Carsten Bormann |
| 2012 | InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl |
| 2012 | Integrating ISO/IEC 27001 and other Managerial Discipline Standards with Processes of Management in Organizations. Juhani Anttila, Kari Jussila, Jorma Kajava, Ilkka Kamaja |
| 2012 | Janitor, Certificate and Jury (JCJ) Trust Scheme for Wireless Ad-hoc Networks. Mohamad M. Abuzaid, Marianne A. Azer |
| 2012 | Location Anonymity Based on Fake Queries in Continuous Location-Based Services. Lin Yao, Chi Lin, Guangya Liu, Fangyu Deng, Guowei Wu |
| 2012 | Model-Based Digit Analysis for Fraud Detection Overcomes Limitations of Benford Analysis. Christian Winter, Markus Schneider, York Yannikos |
| 2012 | Oblivious and Fair Server-Aided Two-Party Computation. Amir Herzberg, Haya Schulmann |
| 2012 | On Measuring the Parasitic Backscatter of Sensor-Enabled UHF RFID Tags. Thomas Plos, Christian Maierhofer |
| 2012 | On the Weak State in GGHN-like Ciphers. Aleksandar Kircanski, Amr M. Youssef |
| 2012 | Organizational Risk Assessment Based on Attacks Repetition. Marianne Azer, Ahmed Shaker, Sherif Nagy, Ahmed Raafat, Mohamad M. Abuzaid |
| 2012 | Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and Performance. Kristian Beckers, Stephan Faßbender |
| 2012 | Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud Infrastructures. Canh Ngo, Peter Membrey, Yuri Demchenko, Cees de Laat |
| 2012 | Privacy Policy Preferences Enforced by SPARQL Query Rewriting. Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci |
| 2012 | RIM: A Method to Defend from JIT Spraying Attack. Rui Wu, Ping Chen, Bing Mao, Li Xie |
| 2012 | Repackaging Android Applications for Auditing Access to Private Data. Pascal Berthomé, Thomas Fécherolle, Nicolas Guilloteau, Jean-François Lalande |
| 2012 | Representing Threats in BPMN 2.0. Per Håkon Meland, Erlend Andreas Gjære |
| 2012 | Return-Oriented Programming Attack on the Xen Hypervisor. Baozeng Ding, Yanjun Wu, Yeping He, Shuo Tian, Bei Guan, Guowei Wu |
| 2012 | Secure Mobile Data Collection Systems for Low-Budget Settings. Federico Mancini, Samson Gejibo, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr |
| 2012 | Security Concept and Implementation for a Cloud Based E-science Infrastructure. Thomas Ludescher, Thomas Feilhauer, Peter Brezany |
| 2012 | Sensitivity Analysis of Loss of Corporate Efficiency and Productivity Associated with Enterprise DRM Technology. Wen Zeng, Kaiyu Liu |
| 2012 | Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012 |
| 2012 | Simplifying RAM Forensics: A GUI and Extensions for the Volatility Framework. Steffen Logen, Hans Höfken, Marko Schuba |
| 2012 | Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks. Anca Jurcut, Tom Coffey, Reiner Dojen |
| 2012 | Synthetic Data Creation for Forensic Tool Testing: Improving Performance of the 3LSPG Framework. York Yannikos, Christian Winter, Markus Schneider |
| 2012 | Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach. Stanislaus Stelle, Mark Manulis, Matthias Hollick |
| 2012 | Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications. Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro |
| 2012 | Towards Concurrent Data Sampling Using GPU Coprocessing. Mark M. Seeger, Stephen D. Wolthusen |
| 2012 | Towards a Holistic Information Security Governance Framework for SOA. Marijke Coetzee |
| 2012 | Towards an Open Standard Vote Verification Framework in Electronic Voting Systems. Ali Fawzi Najm Al-Shammari, Adolfo Villafiorita, Komminist Weldemariam |
| 2012 | Trusted Virtual Infrastructure Bootstrapping for On Demand Services. Peter Membrey, Keith C. C. Chan, Canh Ngo, Yuri Demchenko, Cees de Laat |
| 2012 | Two-Pronged Phish Snagging. Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain |
| 2012 | Type Classification against Fault Enabled Mutant in Java Based Smart Card. Jean Dubreuil, Guillaume Bouffard, Jean-Louis Lanet, Julien Cartigny |
| 2012 | Uncertainty Bounds for Digital Forensic Evidence and Hypotheses. Richard E. Overill, Jantje A. M. Silomon |
| 2012 | Understanding the Development Trends of Electronic Voting Systems. Ali Fawzi Najm Al-Shammari, Adolfo Villafiorita, Komminist Weldemariam |
| 2012 | Using Attack Graphs in Forensic Examinations. Changwei Liu, Anoop Singhal, Duminda Wijesekera |
| 2012 | Using Linear Support Vector Machines to Solve the Asymmetric Comparison-Based Fault Diagnosis Problem. Mourad Elhadef |
| 2012 | Using Ontologies for Adaptive Information Security Training. Lee V. Mangold |
| 2012 | Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation. Kristian Beckers, Stephan Faßbender, Maritta Heisel, Holger Schmidt |
| 2012 | Veto-based Malware Detection. Raja Khurram Shahzad, Niklas Lavesson |