IAS C

62 papers

YearTitle / Authors
2010A case analysis of a Contextual Model of Trust for digital identities using UML 2.0 and context graph algorithms.
Sean S. E. Thorpe
2010A causal model for information security risk assessment.
Suleyman Kondakci
2010A comparison of the standardized versions of ECIES.
Victor Gayoso Martínez, Fernando Hernández Álvarez, Luis Hernández Encinas, Carmen Sánchez Ávila
2010A distributed and cooperative user authentication framework.
Chris G. Hocking, Steven M. Furnell, Nathan L. Clarke, Paul L. Reynolds
2010A framework for cyber surveillance of unlawful activities for critical infrastructure using computational grids.
Václav Snásel, Ajith Abraham, Khalid Saeed, Hameed Al-Qaheri
2010A framework for integrated risk management process using survival analysis approach in information security.
Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail
2010A hierarchical access authentication in network.
He Liu, Man-Gui Liang, Gao-Liang Qi, Xiaowei Chen
2010A hybrid Authentication and authorization process for control system networks.
David O. Manz, Thomas W. Edgar, Glenn Allen Fink
2010A naming system applied to a RESERVOIR cloud.
Antonio Celesti, Massimo Villari, Antonio Puliafito
2010A semantic based methodology to classify and protect sensitive data in medical records.
Flora Amato, Valentina Casola, Antonino Mazzeo, Sara Romano
2010A structured approach to anomaly detection for in-vehicle networks.
Michael Müter, André Groll, Felix C. Freiling
2010A two-tiered authentication and encryption scheme in secure healthcare sensor networks.
Mohammed Raza Kanjee, Kalyani Divi, Hong Liu
2010Anonymous communication system using probabilistic choice of actions and multiple loopbacks.
Kazuhiro Kono, Yoshimichi Ito, Noboru Babaguchi
2010Anonymous service access for Vehicular Ad hoc Networks.
Hesiri Weerasinghe, Huirong Fu, Supeng Leng
2010Assurance in identity management systems.
Maya I. Chehab, Ali E. Abdallah
2010Audited credential delegation - a user-centric identity management solution for computational grid environments.
Ali Nasrat Haidar, Stefan J. Zasada, Peter V. Coveney, Ali E. Abdallah, Bruce Beckles
2010Automatic semantic annotation of images based on Web data.
Guiguang Ding, Na Xu
2010Benchmarking IP blacklists for financial botnet detection.
David Oro, Jesus Luna, Toni Felguera, Marc Vilanova, Jetzabel M. Serna
2010CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments.
Roberto Morales, Jetzabel M. Serna, Manel Medina, Jesus Luna
2010Comparison of real-time DSP-based edge detection techniques for license plate detection.
Zuwena Musoromy, Faycal Bensaali, Soodamani Ramalingam, Georgios Pissanidis
2010Cooperative access control for the Grid.
Alessio Merlo, Alessandro Armando
2010Data aggregation for information authentication in VANETs.
Jezabel Molina-Gil, Pino Caballero-Gil, Candelaria Hernández-Goya, Cándido Caballero-Gil
2010Detect multi-hop stepping-stone pairs with clock skew.
Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Christopher Hill
2010Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards.
Eugen Leontie, Olga Gelbart, Bhagirath Narahari, Rahul Simha
2010Discriminative multinomial Naïve Bayes for network intrusion detection.
Mrutyunjaya Panda, Ajith Abraham, Manas Ranjan Patra
2010Efficient defense strategies to minimize attackers' success probabilities in honeynet.
Frank Yeong-Sung Lin, Yu-Shun Wang, Po-Hao Tsang
2010End-to-end security policy description and management for collaborative system.
Ziyi Su, Frédérique Biennier
2010Extending the definition of guesswork.
Reine Lundin, Stefan Lindskog
2010Fast intrusion detection system based on Flexible Neural Tree.
Tomás Novosád, Jan Platos, Václav Snásel, Ajith Abraham
2010Fault attack on AES with single-bit induced faults.
Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi
2010Fuzzified Aho-Corasick search automata.
Zdenek Horak, Václav Snásel, Ajith Abraham, Aboul Ella Hassanien
2010Identity federation in cloud computing.
Valentina Casola, Massimiliano Rak, Umberto Villano
2010Inconsistency detection method for access control policies.
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski
2010Insider threat discovery using automatic detection of mission critical data based on content.
Jonathan White, Brajendra Panda
2010Integrated security risk management for IT-intensive organizations.
Jeffrey Mounzer, Tansu Alpcan, Nicholas Bambos
2010Integrating a network IDS into an open source Cloud Computing environment.
Claudio Mazzariello, Roberto Bifulco, Roberto Canonico
2010Intelligent response system to mitigate the success likelihood of ongoing attacks.
Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin
2010Link suggestions in terrorists networks using Semi Discrete Decomposition.
Václav Snásel, Zdenek Horak, Ajith Abraham
2010Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cards.
Hanan A. Mahmoud, Khaled Alghathbar
2010Novel technique for steganography in fingerprints images: Design and implementation.
Hanan A. Mahmoud, Hanan Saad Al-Hulaibah, Sarah A. Al-Naeem, Suha Ali Al-Qhatani, Aljoharah Al-Dawood, Buthaina Saleh Al-Nassar, Dhay Yousef Al-Salman
2010Optimum fusion of visual and thermal face images for recognition.
Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu
2010Patient's perception of health information security: The case of selected public and private hospitals in Addis Ababa.
Tibebe Tesema, Dawn Medlin, Ajith Abraham
2010Quantifying authentication Levels of Assurance in grid environments.
Li Yao, Ning Zhang
2010RAPID: Reputation based approach for improving intrusion detection effectiveness.
Ashley Thomas
2010Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment.
Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux
2010Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform.
Mohamed El-Hadedy, Martin Margala, Danilo Gligoroski, Svein J. Knapskog
2010Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework.
Zahri Yunos, Syahrul Hafidz Suid, Rabiah Ahmad, Zuraini Ismail
2010Scaling IDS construction based on Non-negative Matrix factorization using GPU computing.
Jan Platos, Pavel Krömer, Václav Snásel, Ajith Abraham
2010Secure Universal Plug and Play network.
Vesa Pehkonen, Juha Koivisto
2010Secure architecture for healthcare Wireless Sensor Networks.
Kalyani Divi, Mohammed Raza Kanjee, Hong Liu
2010Secure protocol for ad hoc transportation system.
Johnson P. Thomas, Vinay Abburi, Mathews Thomas, Ajith Abraham
2010Securing a tiered re-taskable sensing system.
Alessandra De Benedictis, Andrea Gaglione, Nicola Mazzocca
2010Security preferences specification and implementation in a service-based workflow.
Wendpanga Francis Ouedraogo, Frédérique Biennier, Nicolas Salatgé
2010Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010
2010Specification of attribute relations for access control policies and constraints using Policy Machine.
Vincent C. Hu, David F. Ferraiolo, Serban I. Gavrila
2010The five modes AES applications in sounds and images.
Chi-Wu Huang, Chien-Lun Yen, Che-Hao Chiang, Kuo-Huang Chang, Chi-Jeng Chang
2010The number of the isomorphism classes of hyperelliptic curves of genus four over finite fields.
Lin You, Fugeng Zeng
2010Threat modeling approaches and tools for securing architectural designs of an e-banking application.
Caroline Moeckel, Ali E. Abdallah
2010Towards intrusion detection by information retrieval and genetic programming.
Pavel Krömer, Jan Platos, Václav Snásel, Ajith Abraham
2010Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks.
Yang Liu, Yue Wu, Junhua Tang
2010UDT -Authentication Option field: An approach.
Danilo Valeros Bernardo
2010Using vulnerability information and attack graphs for intrusion detection.
Sebastian Roschke, Feng Cheng, Christoph Meinel