Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria. IEEE Computer Society 2007 BibTeX
Session 1: Trust Model & Trust Management
Oluwafemi Ajayi , Richard O. Sinnott , Anthony Stell : Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. 3-10Electronic Edition (link) BibTeX
Yudistira Asnar , Paolo Giorgini , Fabio Massacci , Nicola Zannone : From Trust to Dependability through Risk Analysis. 19-26Electronic Edition (link) BibTeX
Jatinder Singh , Jean Bacon , Ken Moody : Dynamic trust domains for secure, private, technology-assisted living. 27-34Electronic Edition (link) BibTeX
Ching Lin , Vijay Varadharajan : A Hybrid Trust Model for Enhancing Security in Distributed Systems. 35-42Electronic Edition (link) BibTeX
Wilfried N. Gansterer , Andreas Janecek , Peter Lechner : A Reliable Component-Based Architecture for E-Mail Filtering. 43-52Electronic Edition (link) BibTeX
Session 2: Availability, Fault-Tolerant & Recovery
Johannes Osrael , Lorenz Froihofer , Norbert Chlaupek , Karl M. Goeschka : Availability and Performance of the Adaptive Voting Replication. 53-60Electronic Edition (link) BibTeX
Marcin Gorawski , Pawel Marks : Distributed Stream Processing Analysis in High Availability Context. 61-68Electronic Edition (link) BibTeX
Stefan Beyer , Francesc D. Muñoz-Escoí , Pablo Galdámez : Implementing Network Partition-Aware Fault-Tolerant CORBA Systems. 69-76Electronic Edition (link) BibTeX
Bin Rong , Fred Douglis , Cathy H. Xia , Zhen Liu : Failure Recovery in Cooperative Data Stream Analysis. 77-84Electronic Edition (link) BibTeX
José Enrique Armendáriz-Iñigo , Francesc D. Muñoz-Escoí , J. R. Juárez-Rodríguez , José Ramón González de Mendívil , Bettina Kemme : A Recovery Protocol for Middleware Replicated Databases Providing GSI. 85-92Electronic Edition (link) BibTeX
Rubén de Juan-Marín , Hendrik Decker , Francesc D. Muñoz-Escoí : Revisiting Hot Passive Replication. 93-102Electronic Edition (link) BibTeX
Session 3: Reputation Management & Trust
Session 4: Privacy & Access Control
Session 5: Failure Detection & Attack Prevention
Session 6: Authentication & Authorisation
Session 7: Security Algorithm & Framework
Session 8: Software Security
David Byers , Nahid Shahmehri : Design of a Process for Software Security. 301-309Electronic Edition (link) BibTeX
Christoph Krauß , Markus Schneider , Kpatcha M. Bayarou , Claudia Eckert : STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. 310-317Electronic Edition (link) BibTeX
Bernhard Riedl , Thomas Neubauer , Gernot Goluch , Oswald Boehm , Gert Reinauer , Alexander Krumboeck : A secure architecture for the pseudonymization of medical data. 318-324Electronic Edition (link) BibTeX
Thomas Nowey , Hannes Federrath : Collection of Quantitative Data on Security Incidents. 325-334Electronic Edition (link) BibTeX
Session 9: Security Models
Suranjith Ariyapperuma , Chris J. Mitchell : Security vulnerabilities in DNS and DNSSEC. 335-342Electronic Edition (link) BibTeX
David Arsenault , Arun Sood , Yih Huang : Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). 343-350Electronic Edition (link) BibTeX
Raihan Al-Ekram , Richard C. Holt , Chris Hobbs : Applying a Tradeoff Model (TOM) to TACT. 351-355Electronic Edition (link) BibTeX
Denis Hatebur , Maritta Heisel , Holger Schmidt : A Pattern System for Security Requirements Engineering. 356-365Electronic Edition (link) BibTeX
Stefan Durbeck , Rolf Schillinger , Jan Kolter : Security Requirements for a Semantic Service-oriented Architecture. 366-373Electronic Edition (link) BibTeX
Ludwig Fuchs , Günther Pernul : Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. 374-384Electronic Edition (link) BibTeX
Session 10: Miscellaneous Security Techniques
Vidar Evenrud Seeberg , Slobodan Petrovic : A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. 385-390Electronic Edition (link) BibTeX
Valentina Casola , Nicola Mazzocca , Jesus Luna , Oscar Manso , Manel Medina : Static evaluation of Certificate Policies for GRID PKIs interoperability. 391-399Electronic Edition (link) BibTeX
Mansoor Ahmed , Amin Andjomshoaa , Tho Manh Nguyen , A. Min Tjoa : Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE. 400-407Electronic Edition (link) BibTeX
TingMao Chang , Yuefei Zhu , Jin Zhou , YaJuan Zhang : Universally Composable Three-Party Key Distribution. 408-416Electronic Edition (link) BibTeX
Session 11: eAuction & eVoting Protocol
Session 12: Dependability in Distributed & Ubiquitous Computing
Session 13: Anomaly & Intrusion Detection
International Symposium on Frontiers in Availability, Reliability and Security (FARES)
Session 1: Fault-Tolerant & Availability
Session 2: Access Control
Session 3: Authentication
Session 4: Real-Time System & Sensor Network
Session 5: RFID Techniques & Applications
Session 6: Secure Solution & Applications
Session 7: Security Issue in Business Management
Session 8: Web, XML, Content Management
Session 9: Security Policies & Techniques
Session 10: Trust Management & Trust Model
Session 11: Miscellaneous Applications
Mohammad Feroz Raihan , Mohammad Zulkernine : AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. 775-782Electronic Edition (link) BibTeX
Niraj Swami , Sheikh Iqbal Ahamed : Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments. 783-790Electronic Edition (link) BibTeX
Rafael Páez , Cristina Satizábal , Jordi Forné : A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. 791-798Electronic Edition (link) BibTeX
C. Mauri , Toni Granollers , A. Solanas : On the Assessment of the Interaction Quality of Users with Cerebral Palsy. 799-805Electronic Edition (link) BibTeX
Chaobo Yang , Ming Qi : Research and Design of Mobile Impeachment System with Semi-cryptonym. 806-811Electronic Edition (link) BibTeX
Shu-Ching Wang , Shyi-Ching Liang , Kuo-Qin Yan , Guang-Yan Zheng : Efficient Malicious Agreement in a Virtual Subnet Network. 812-820Electronic Edition (link) BibTeX
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)
Bhavani M. Thuraisingham , Srinivasan Iyer : Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. 821-828Electronic Edition (link) BibTeX
Emilio Soler , Juan Trujillo , Eduardo Fernández-Medina , Mario Piattini : Application of QVT for the Development of Secure Data Warehouses: A case study. 829-836Electronic Edition (link) BibTeX
Marcin Gorawski , Jakub Bularz : Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. 837-844Electronic Edition (link) BibTeX
Marcello Castellano , Giuseppe Mastronardi , Angela Aprile , Giuliano Bellone de Grecis , Flaviano Fiorino : Applying a Flexible Mining Architecture to Intrusion Detection. 845-852Electronic Edition (link) BibTeX
Veselina G. Jecheva , Evgeniya P. Nikolova : An Application of Learning Problem in Anomaly-based Intrusion Detection Systems. 853-860Electronic Edition (link) BibTeX
Nasrullah Memon , Kim C. Kristoffersen , David L. Hicks , Henrik Legind Larsen : Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. 861-870Electronic Edition (link) BibTeX
Lillian Røstad , Øystein Nytrø : Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges. 871-878Electronic Edition (link) BibTeX
Dalia El-Mansy , Ahmed Sameh : A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace. 878-885Electronic Edition (link) BibTeX
Calin Ciufudean , Bianca Satco , Constantin Filote : Reliability Markov Chains for Security Data Transmitter Analysis. 886-894Electronic Edition (link) BibTeX
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)
Melanie Volkamer , Margaret McGaley : Requirements and Evaluation Procedures for eVoting. 895-902Electronic Edition (link) BibTeX
Orhan Cetinkaya , Deniz Cetinkaya : Towards Secure E-Elections in Turkey: Requirements and Principles. 903-907Electronic Edition (link) BibTeX
Stefan G. Weber , Roberto Araujo , Johannes Buchmann : On Coercion-Resistant Electronic Elections with Linear Work. 908-916Electronic Edition (link) BibTeX
Mariagrazia Fugini : A Security Model and Architecture for Multichannel E-Government Systems. 917-924Electronic Edition (link) BibTeX
Judith E. Y. Rossebø , Scott Cadzow , Paul Sijben : eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. 925-933Electronic Edition (link) BibTeX
Kailash Bhoopalam , Kurt Maly , Ravi Mukkamala , Mohammad Zubair : Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies. 934-940Electronic Edition (link) BibTeX
Martijn Warnier , Frances M. T. Brazier , Martin Apistola , Anja Oskamp : Secure Distributed Dossier Management in the Legal Domain. 941-947Electronic Edition (link) BibTeX
Elsa Estevez , Tomasz Janowski : Building a Dependable Messaging Infrastructure for Electronic Government. 948-958Electronic Edition (link) BibTeX
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)
Rachid Guerraoui , Michel Raynal : A Universal Construction for Concurrent Objects. 959-966Electronic Edition (link) BibTeX
Bastian Braun : FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance. 967-974Electronic Edition (link) BibTeX
Cristian Martín , Mikel Larrea , Ernesto Jiménez : On the implementation of the Omega failure detector in the crash-recovery failure model. 975-982Electronic Edition (link) BibTeX
Mourad Elhadef , Azzedine Boukerche , Hisham Elkadiki : Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach. 983-990Electronic Edition (link) BibTeX
Olga Brukman , Shlomi Dolev , Yinnon A. Haviv , Reuven Yagel : Self-Stabilization as a Foundation for Autonomic Computing. 991-998Electronic Edition (link) BibTeX
Christian Engelmann , Stephen L. Scott , Chokchai Leangsuksun , Xubin He : On Programming Models for Service-Level High Availability. 999-1008Electronic Edition (link) BibTeX
First International Workshop on Secure Software Engineering (SecSE 2007)
Christos Kalloniatis , Evangelia Kavakli , Stefanos Gritzalis : Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. 1009-1017Electronic Edition (link) BibTeX
Shanai Ardi , David Byers , Per Håkon Meland , Inger Anne Tøndel , Nahid Shahmehri : How can the developer benefit from security modeling? 1017-1025Electronic Edition (link) BibTeX
Gabriel Hermosillo , Roberto Gomez , Lionel Seinturier , Laurence Duchien : AProSec: an Aspect for Programming Secure Web Applications. 1026-1033Electronic Edition (link) BibTeX
Koen Buyens , Bart De Win , Wouter Joosen : Empirical and statistical analysis of risk analysis-driven techniques for threat management. 1034-1041Electronic Edition (link) BibTeX
Takao Okubo , Hidehiko Tanaka : Secure Software Development through Coding Conventions and Frameworks. 1042-1051Electronic Edition (link) BibTeX
Sergey Bratus , Alex Ferguson , Doug McIlroy , Sean Smith : Pastures: Towards Usable Security Policy Engineering. 1052-1059Electronic Edition (link) BibTeX
Kaarina Karppinen , Reijo Savola , Mikko Rapeli , Esa Tikkala : Security Objectives within a Security Testing Case Study. 1060-1065Electronic Edition (link) BibTeX
Chengying Mao , Yansheng Lu : CppTest: A Prototype Tool for Testing C/C++ Programs. 1066-1073Electronic Edition (link) BibTeX
Dragan Vidakovic , Dejan Simic : A Novel Approach to Building Secure Systems. 1074-1084Electronic Edition (link) BibTeX
Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)
First International Workshop on Advances in Information Security (WAIS 2007)
Alexander Krizhanovsky , Alexander Marasanov : An Approach for Adaptive Intrusion Prevention Based on The Danger. 1135-1142Electronic Edition (link) BibTeX
Rene Mayrhofer , Martyn Welch : A Human-Verifiable Authentication Protocol Using Visible Laser Light. 1143-1148Electronic Edition (link) BibTeX
Chik How Tan : Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. 1148-1154Electronic Edition (link) BibTeX
Kei Nagai , Hiroaki Kikuchi , Wakaha Ogata , Masakatsu Nishigaki : ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. 1155-1159Electronic Edition (link) BibTeX
Hyung Chan Kim , R. S. Ramakrishna , Wook Shin , Kouichi Sakurai : A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. 1160-1166Electronic Edition (link) BibTeX
Tetsuya Izu , Masahiko Takenaka , Takeshi Shimoyama : Analysis on Bleichenbacher's Forgery Attack. 1167-1174Electronic Edition (link) BibTeX
Yoshio Kakizaki , Hidekazu Tsuji : A New Method for Reducing the Revocation Delay in the Attribute Authentication. 1175-1182Electronic Edition (link) BibTeX
Koji Chida , Hiroaki Kikuchi , Gembu Morohashi , Keiichi Hirota : Efficient Multiparty Computation for Comparator Networks. 1183-1189Electronic Edition (link) BibTeX
Orhan Cetinkaya , Ali Doganaksoy : Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. 1190-1196Electronic Edition (link) BibTeX
Anders Moen Hagalisletto : Attacks are Protocols Too. 1197-1206Electronic Edition (link) BibTeX
Luis Zarza , Josep Pegueroles , Miguel Soriano : Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. 1207-1213Electronic Edition (link) BibTeX
Bogdan Groza , Toma-Leonida Dragomir : On the use of one-way chain based authentication protocols in secure control systems. 1214-1221Electronic Edition (link) BibTeX
Nenad Stojanovski , Marjan Gusev , Danilo Gligoroski , Svein J. Knapskog : Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. 1222-1226Electronic Edition (link) BibTeX
Dong Seong Kim , Taek-Hyun Shin , Jong Sou Park : A Security Framework in RFID Multi-domain System. 1227-1234Electronic Edition (link) BibTeX
Workshop on "Security in E-Learning" (SEL)
相关文章:
2021-09-15
2021-09-27
2021-05-23
2021-06-10
2022-12-23
2021-08-27
猜你喜欢
2022-12-23
2022-01-08
2021-05-20
2021-06-14
2021-07-06
2021-04-11
2021-10-10
相关资源
下载
2023-02-01
下载
2021-11-03
下载
2021-06-25
下载
2021-06-25
下载
2023-02-10