Abstract is missing.
- Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health SystemsOluwafemi Ajayi, Richard O. Sinnott, Anthony Stell. 3-10 [doi]
- From Trust to Dependability through Risk AnalysisYudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone. 19-26 [doi]
- Dynamic trust domains for secure, private, technology-assisted livingJatinder Singh, Jean Bacon, Ken Moody. 27-34 [doi]
- A Hybrid Trust Model for Enhancing Security in Distributed SystemsChing Lin, Vijay Varadharajan. 35-42 [doi]
- A Reliable Component-Based Architecture for E-Mail FilteringWilfried N. Gansterer, Andreas Janecek, Peter Lechner. 43-52 [doi]
- Availability and Performance of the Adaptive Voting ReplicationJohannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Goeschka. 53-60 [doi]
- Distributed Stream Processing Analysis in High Availability ContextMarcin Gorawski, Pawel Marks. 61-68 [doi]
- Implementing Network Partition-Aware Fault-Tolerant CORBA SystemsStefan Beyer, Francesc D. Muñoz-Escoí, Pablo Galdámez. 69-76 [doi]
- Failure Recovery in Cooperative Data Stream AnalysisBin Rong, Fred Douglis, Cathy H. Xia, Zhen Liu. 77-84 [doi]
- A Recovery Protocol for Middleware Replicated Databases Providing GSIJosé Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Bettina Kemme. 85-92 [doi]
- Revisiting Hot Passive ReplicationRubén de Juan-Marín, Hendrik Decker, Francesc D. Muñoz-Escoí. 93-102 [doi]
- Reputation Management SurveySini Ruohomaa, Lea Kutvonen, Eleni Koutrouli. 103-111 [doi]
- Dirichlet Reputation SystemsAudun Jøsang, Jochen Haller. 112-119 [doi]
- Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted ComputingSebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy. 120-127 [doi]
- Secure Anonymous Union Computation Among Malicious PartnersStefan Böttcher, Sebastian Obermeier. 128-138 [doi]
- A Privacy Enhancing Service Architecture for Ticket-based Mobile ApplicationsOliver Jorns, Oliver Jung, Gerald Quirchmayr. 139-146 [doi]
- Privacy in Pervasive Computing and Open IssuesPankaj Bhaskar, Sheikh Iqbal Ahamed. 147-154 [doi]
- Context-Dependent Access Control for Contextual InformationChristin Groba, Stephan Grob, Thomas Springer. 155-161 [doi]
- Bytecode Verification for Enhanced JVM Access ControlDongxi Liu. 162-172 [doi]
- Automatic Failure Detection with Separation of ConcernsP. Hazy, Rudolph E. Seviora. 173-181 [doi]
- A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor NetworksMourad Elhadef, Azzedine Boukerche. 182-189 [doi]
- Intrusion detection system for signal based SIP attacks through timed HCPNYanlan Ding, Guiping Su. 190-197 [doi]
- 3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security ModelMuhammad Sher, Thomas Magedanz. 198-205 [doi]
- Specification and Detection of TCP/IP Based Attacks Using the ADM-LogicMeriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri. 206-212 [doi]
- Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a NetworkFrank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin. 213-222 [doi]
- Errors in Attacks on Authentication ProtocolsAnders Moen Hagalisletto. 223-229 [doi]
- Effects of Architectural Decisions in Authentication and Authorisation InfrastructuresChristian Schläger, Monika Ganslmayer. 230-237 [doi]
- Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication ProtocolTieyan Li, Robert H. Deng. 238-245 [doi]
- Authentication Mechanisms for Mobile AgentsLeila Ismail. 246-253 [doi]
- Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource ProvisioningYuri Demchenko, Leon Gommans, Cees de Laat. 254-262 [doi]
- Implicit Authorization for Accessing Location Data in a Social ContextGeorg Treu, Florian Fuchs, Christiane Dargatz. 263-272 [doi]
- Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational DistancesAbinandhan Chandrasekaran, Bhavani M. Thuraisingham. 273-280 [doi]
- A Reconfigurable Implementation of the New Secure Hash AlgorithmM. Zeghid, Belgacem Bouallegue, Adel Baganne, M. Machhout, Rached Tourki. 281-285 [doi]
- Applications for Provably Secure Intent Protection with Bounded Input-Size ProgramsJ. Todd McDonald, Alec Yasinsac. 286-293 [doi]
- A Framework for the Development of Secure Data Warehouses based on MDA and QVTEmilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. 294-300 [doi]
- Design of a Process for Software SecurityDavid Byers, Nahid Shahmehri. 301-309 [doi]
- STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor NetworksChristoph Krauß, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert. 310-317 [doi]
- A secure architecture for the pseudonymization of medical dataBernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck. 318-324 [doi]
- Collection of Quantitative Data on Security IncidentsThomas Nowey, Hannes Federrath. 325-334 [doi]
- Security vulnerabilities in DNS and DNSSECSuranjith Ariyapperuma, Chris J. Mitchell. 335-342 [doi]
- Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)David Arsenault, Arun Sood, Yih Huang. 343-350 [doi]
- Applying a Tradeoff Model (TOM) to TACTRaihan Al-Ekram, Richard C. Holt, Chris Hobbs. 351-355 [doi]
- A Pattern System for Security Requirements EngineeringDenis Hatebur, Maritta Heisel, Holger Schmidt. 356-365 [doi]
- Security Requirements for a Semantic Service-oriented ArchitectureStefan Durbeck, Rolf Schillinger, Jan Kolter. 366-373 [doi]
- Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity ManagementLudwig Fuchs, Günther Pernul. 374-384 [doi]
- A New Classification Scheme for Anonymization of Real Data Used in IDS BenchmarkingVidar Evenrud Seeberg, Slobodan Petrovic. 385-390 [doi]
- Static evaluation of Certificate Policies for GRID PKIs interoperabilityValentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina. 391-399 [doi]
- Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFEMansoor Ahmed, Amin Andjomshoaa, Tho Manh Nguyen, A. Min Tjoa. 400-407 [doi]
- Universally Composable Three-Party Key DistributionTingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang. 408-416 [doi]
- An Efficient eAuction ProtocolBrian Curtis, Josef Pieprzyk, Jan Seruga. 417-421 [doi]
- Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting SchemesBenedikt Ostermaier, Florian Dotzer, Markus Strassberger. 422-431 [doi]
- A Practical Verifiable e-Voting Protocol for Large Scale Elections over a NetworkOrhan Cetinkaya, Ali Doganaksoy. 432-442 [doi]
- Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object SystemsLorenz Froihofer, Johannes Osrael, Karl M. Goeschka. 443-450 [doi]
- Dependability Aspects of Ubiquitous ComputingLu Yan, Kaisa Sere. 451-453 [doi]
- Concurrency Control using Subject- and Purpose-Oriented (SPO) ViewTomoya Enokido, Makoto Takizawa. 454-464 [doi]
- Comparing Classifier Combining Techniques for Mobile-Masquerader DetectionOleksiy Mazhelis, Seppo Puuronen. 465-472 [doi]
- Process Profiling Using Frequencies of System CallsSurekha Mariam Varghese, K. Poulose Jacob. 473-479 [doi]
- Terrorist Networks Analysis through Argument Driven Hypotheses ModelDil Muhammad Akbar Hussain. 480-492 [doi]
- High Availability for Network Management ApplicationsS. Prabhu, R. Venkat. 493-498 [doi]
- RWAR: A Resilient Window-consistent Asynchronous Replication ProtocolYanlong Wang, Zhanhuai Li, Wei Lin. 499-505 [doi]
- Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) ModelKeiji Ozaki, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa. 506-516 [doi]
- Realizing fine-granular Read andWrite Rights on Tree Structured DocumentsFranz Kollmann. 517-523 [doi]
- Access Control Model for Web Services with Attribute Disclosure RestrictionVipin Singh Mewar, Subhendu Aich, Shamik Sural. 524-531 [doi]
- Aggregating and Deploying Network Access Control PoliciesJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. 532-542 [doi]
- Secure Spatial Authentication using Cell PhonesArjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli. 543-549 [doi]
- Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues ChainBogdan Groza. 550-557 [doi]
- A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile CommunicationsYijun He, Nan Xu, Jie Li. 558-563 [doi]
- Improved Client-to-Client Password-Authenticated Key Exchange ProtocolGang Yao, Dengguo Feng, Xiaoxi Han. 564-574 [doi]
- Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service AttackDong Seong Kim, Chung Su Yang, Jong Sou Park. 575-579 [doi]
- Models for automatic generation of safety-critical real-time systemsChristian Buckl, Matthias Regensburger, Alois Knoll, Gerhard Schrott. 580-587 [doi]
- A Near-Real-Time Behaviour Control FrameworkBastian Preindl, Alexander Schatten. 588-598 [doi]
- RFID Security Issues in Military Supply ChainsQinghan Xiao, Cam Boulet, Thomas Gibbons. 599-605 [doi]
- The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym ProtocolsJens Mache, Chris Allick. 606-609 [doi]
- Mobile phone based RFID architecture for secure electronic Payments using RFID credit cardsGeethapriya Venkataramani, Srividya Gopalan. 610-620 [doi]
- A Modular Architecture for Secure and Reliable Distributed CommunicationC. M. Jayalath, R. U. Fernando. 621-628 [doi]
- Security Oriented e-Infrastructures Supporting Neurological Research and Clinical TrialsAnthony Stell, Richard O. Sinnott, Oluwafemi Ajayi, Jipu Jiang. 629-636 [doi]
- Securing Medical Sensor Environments: The CodeBlue Framework CaseGeorgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis. 637-643 [doi]
- A set of QVT relations to transform PIM to PSM in the Design of Secure Data WarehousesEmilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. 644-654 [doi]
- Agent Alliances: A Means for Practical Threshold SignatureRegine Endsuleit, Christoph Amma. 655-662 [doi]
- Protecting Online Transactions with Unique Embedded Key GeneratorsMartin Boesgaard, Erik Zenner. 663-669 [doi]
- A research agenda for Autonomous Business Process ManagementThomas Neubauer, Gernot Goluch, Bernhard Riedl. 670-680 [doi]
- Secure Web Application Development and Global RegulationWilliam Bradley Glisson, L. Milton Glisson, Ray Welland. 681-688 [doi]
- Query Assurance Verification for Dynamic Outsourced XML DatabasesViet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng. 689-696 [doi]
- A Reflection-Based Framework for Content ValidationLars-Helge Netland, Yngve Espelid, Khalid A. Mughal. 697-706 [doi]
- Web Engineering Security: Essential ElementsWilliam Bradley Glisson, Ray Welland. 707-714 [doi]
- Designing a Security Policy According to BS 7799 Using the OCTAVE MethodologyJanuszkiewicz Paulina, Pyka Marek. 715-722 [doi]
- CSP-Based Firewall Rule Set Diagnosis using Security PoliciesSergio Pozo, Rafael Ceballos, Rafael M. Gasca. 723-729 [doi]
- CASSIS - Computer-based Academy for Security and Safety in Information SystemsGernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa. 730-740 [doi]
- Trust in global computing systems as a limit property emerging from short range random interactionsVasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou. 741-748 [doi]
- A Trust Overlay Architecture and Protocol for Enhanced Protection against SpamJimmy McGibney, Dmitri Botvich. 749-756 [doi]
- HICI: An Approach for Identifying Trust Elements The case of technological trust perspective in VBEsSimon Samwel Msanjila, Hamideh Afsarmanesh. 757-764 [doi]
- A Semantic and Time Related Recommendation-Feedback Trust ModelZhang Lin, Xu Feng, Wang Yuan, Lv Jian. 765-774 [doi]
- AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario SpecificationMohammad Feroz Raihan, Mohammad Zulkernine. 775-782 [doi]
- Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing EnvironmentsNiraj Swami, Sheikh Iqbal Ahamed. 783-790 [doi]
- A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDSRafael Páez, Cristina Satizábal, Jordi Forné. 791-798 [doi]
- On the Assessment of the Interaction Quality of Users with Cerebral PalsyC. Mauri, Toni Granollers, A. Solanas. 799-805 [doi]
- Research and Design of Mobile Impeachment System with Semi-cryptonymChaobo Yang, Ming Qi. 806-811 [doi]
- Efficient Malicious Agreement in a Virtual Subnet NetworkShu-Ching Wang, Shyi-Ching Liang, Kuo-Qin Yan, Guang-Yan Zheng. 812-820 [doi]
- Extended RBAC - Based Design and Implementation for a Secure Data WarehouseBhavani M. Thuraisingham, Srinivasan Iyer. 821-828 [doi]
- Application of QVT for the Development of Secure Data Warehouses: A case studyEmilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. 829-836 [doi]
- Protecting Private Information by Data Separation in Distributed Spatial Data WarehouseMarcin Gorawski, Jakub Bularz. 837-844 [doi]
- Applying a Flexible Mining Architecture to Intrusion DetectionMarcello Castellano, Giuseppe Mastronardi, Angela Aprile, Giuliano Bellone de Grecis, Flaviano Fiorino. 845-852 [doi]
- An Application of Learning Problem in Anomaly-based Intrusion Detection SystemsVeselina G. Jecheva, Evgeniya P. Nikolova. 853-860 [doi]
- Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists NetworkNasrullah Memon, Kim C. Kristoffersen, David L. Hicks, Henrik Legind Larsen. 861-870 [doi]
- Access Control and Integration of Health Care Systems: An Experience Report and Future ChallengesLillian Røstad, Øystein Nytrø. 871-878 [doi]
- A Collaborative Inter Data Grids Strong Semantic Model with Hybrid NamespaceDalia El-Mansy, Ahmed Sameh. 878-885 [doi]
- Reliability Markov Chains for Security Data Transmitter AnalysisCalin Ciufudean, Bianca Satco, Constantin Filote. 886-894 [doi]
- Requirements and Evaluation Procedures for eVotingMelanie Volkamer, Margaret McGaley. 895-902 [doi]
- Towards Secure E-Elections in Turkey: Requirements and PrinciplesOrhan Cetinkaya, Deniz Cetinkaya. 903-907 [doi]
- On Coercion-Resistant Electronic Elections with Linear WorkStefan G. Weber, Roberto Araujo, Johannes Buchmann. 908-916 [doi]
- A Security Model and Architecture for Multichannel E-Government SystemsMariagrazia Fugini. 917-924 [doi]
- eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEuropeJudith E. Y. Rossebø, Scott Cadzow, Paul Sijben. 925-933 [doi]
- Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access PoliciesKailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair. 934-940 [doi]
- Secure Distributed Dossier Management in the Legal DomainMartijn Warnier, Frances M. T. Brazier, Martin Apistola, Anja Oskamp. 941-947 [doi]
- Building a Dependable Messaging Infrastructure for Electronic GovernmentElsa Estevez, Tomasz Janowski. 948-958 [doi]
- A Universal Construction for Concurrent ObjectsRachid Guerraoui, Michel Raynal. 959-966 [doi]
- FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-ToleranceBastian Braun. 967-974 [doi]
- On the implementation of the Omega failure detector in the crash-recovery failure modelCristian Martín, Mikel Larrea, Ernesto Jiménez. 975-982 [doi]
- Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based ApproachMourad Elhadef, Azzedine Boukerche, Hisham Elkadiki. 983-990 [doi]
- Self-Stabilization as a Foundation for Autonomic ComputingOlga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuven Yagel. 991-998 [doi]
- On Programming Models for Service-Level High AvailabilityChristian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He. 999-1008 [doi]
- Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design ProcessChristos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis. 1009-1017 [doi]
- How can the developer benefit from security modeling?Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri. 1017-1025 [doi]
- AProSec: an Aspect for Programming Secure Web ApplicationsGabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien. 1026-1033 [doi]
- Empirical and statistical analysis of risk analysis-driven techniques for threat managementKoen Buyens, Bart De Win, Wouter Joosen. 1034-1041 [doi]
- Secure Software Development through Coding Conventions and FrameworksTakao Okubo, Hidehiko Tanaka. 1042-1051 [doi]
- Pastures: Towards Usable Security Policy EngineeringSergey Bratus, Alex Ferguson, Doug McIlroy, Sean Smith. 1052-1059 [doi]
- Security Objectives within a Security Testing Case StudyKaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala. 1060-1065 [doi]
- CppTest: A Prototype Tool for Testing C/C++ ProgramsChengying Mao, Yansheng Lu. 1066-1073 [doi]
- A Novel Approach to Building Secure SystemsDragan Vidakovic, Dejan Simic. 1074-1084 [doi]
- Exception Handling in an Event-Driven SystemJan Ploski, Wilhelm Hasselbring. 1085-1092 [doi]
- Issues in Testing Dependable Event-Based Systems at a Systems Integration CompanyArmin Beer, Matthias Heindl. 1093-1100 [doi]
- Optimizing Events Traffic in Event-based Systems by means of Evolutionary AlgorithmsJirí Kubalík, Richard Mordinyi. 1101-1107 [doi]
- Event-Based Monitoring of Open Source Software ProjectsDindin Wahyudin, A. Min Tjoa. 1108-1115 [doi]
- Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management SystemMarcus Mor, Richard Mordinyi, Johannes Riemer. 1116-1123 [doi]
- Indexing and Search of Correlated Business EventsRoland Vecera, Szabolcs Rozsnyai, Heinz Roth. 1124-1134 [doi]
- An Approach for Adaptive Intrusion Prevention Based on The DangerAlexander Krizhanovsky, Alexander Marasanov. 1135-1142 [doi]
- A Human-Verifiable Authentication Protocol Using Visible Laser LightRene Mayrhofer, Martyn Welch. 1143-1148 [doi]
- Insider-secure Hybrid Signcryption SchemeWithout Random OraclesChik-How Tan. 1148-1154 [doi]
- ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation ProtocolKei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki. 1155-1159 [doi]
- A Policy Language for the Extended Reference Monitor in Trusted Operating SystemsHyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai. 1160-1166 [doi]
- Analysis on Bleichenbacher s Forgery AttackTetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama. 1167-1174 [doi]
- A New Method for Reducing the Revocation Delay in the Attribute AuthenticationYoshio Kakizaki, Hidekazu Tsuji. 1175-1182 [doi]
- Efficient Multiparty Computation for Comparator NetworksKoji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota. 1183-1189 [doi]
- Pseudo-Voter Identity (PVID) Scheme for e-Voting ProtocolsOrhan Cetinkaya, Ali Doganaksoy. 1190-1196 [doi]
- Attacks are Protocols TooAnders Moen Hagalisletto. 1197-1206 [doi]
- Evaluation Function for Synthesizing Security Protocols by means of Genetic AlgorithmsLuis Zarza, Josep Pegueroles, Miguel Soriano. 1207-1213 [doi]
- On the use of one-way chain based authentication protocols in secure control systemsBogdan Groza, Toma-Leonida Dragomir. 1214-1221 [doi]
- Bypassing Data Execution Prevention on MicrosoftWindows XP SP2Nenad Stojanovski, Marjan Gusev, Danilo Gligoroski, Svein J. Knapskog. 1222-1226 [doi]
- A Security Framework in RFID Multi-domain SystemDong Seong Kim, Taek-Hyun Shin, Jong Sou Park. 1227-1234 [doi]
- E-Learning 2.0 = e-Learning 1.0 + Web 2.0?Martin Ebner. 1235-1239 [doi]
- Blended Learning Technology in Information Security Management CoursesGerald Quirchmayr. 1240-1244 [doi]
- Defining a Trusted Service-Oriented Network EnvironmentEmmanuel A. Adigun, Jan H. P. Eloff. 1245-1250 [doi]
- Designing a Cryptographic Scheme for e-Surveys in Higher-Education InstitutionsAlan Ward, Jordi Castellà-Roca, Aleix Dorca-Josa. 1251-1255 [doi]