Abstract is missing.
- Securing Telehealth Applications in a Web-Based e-Health PortalQian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli. 3-9 [doi]
- Multi-Level Reputation-Based GreylistingAndreas Janecek, Wilfried N. Gansterer, K. Ashwin Kumar. 10-17 [doi]
- Hardening XDS-Based ArchitecturesKim Wuyts, Riccardo Scandariato, Geert Claeys, Wouter Joosen. 18-25 [doi]
- Finding Evidence of Antedating in Digital InvestigationsSvein Yngvar Willassen. 26-32 [doi]
- FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program InterruptionNavid Farazmand, Mahdi Fazeli, Seyed Ghassem Miremadi. 33-38 [doi]
- Economic and Security Aspects of Applying a Threshold Scheme in e-HealthBernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer. 39-46 [doi]
- Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection AttacksMehdi Kiani, Andrew Clark, George M. Mohay. 47-55 [doi]
- On the Possibility of Small, Service-Free Disk Based Storage SystemsJehan-François Pâris, Thomas J. E. Schwarz. 56-63 [doi]
- Efficient High Availability Commit ProcessingHeine Kolltveit, Svein-Olaf Hvasshovd. 64-71 [doi]
- Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol ModelsAlfredo Pironti, Riccardo Sisto. 72-79 [doi]
- Towards Formal Specification of Abstract Security PropertiesAntonio Maña, Gimena Pujol. 80-87 [doi]
- A Behavioral Model of Ideologically-motivated “Snowball” AttacksNatalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani. 88-95 [doi]
- Property Specification and Static Verification of UML ModelsIgor Siveroni, Andrea Zisman, George Spanoudakis. 96-103 [doi]
- Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security RequirementsEmilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. 104-111 [doi]
- A New Scheme for Distributed Density Estimation based Privacy-Preserving ClusteringChunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai. 112-119 [doi]
- A Database Replication Protocol Where Multicast Writesets Are Always CommittedJ. R. Juárez-Rodríguez, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil, Francesc D. Muñoz-Escoí. 120-127 [doi]
- Matching Policies with Security Claims of Mobile ApplicationsNataliia Bielova, Marco Dalla Torre, Nicola Dragoni, Ida Siahaan. 128-135 [doi]
- PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile DevicesDavid G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini. 136-143 [doi]
- WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc NetworksAmir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi. 144-152 [doi]
- Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC SystemsMaria Luisa Damiani, Claudio Silvestri, Elisa Bertino. 153-160 [doi]
- Experimental Demonstration of a Hybrid Privacy-Preserving Recommender SystemEsma Aïmeur, Gilles Brassard, José Manuel Fernandez, Flavien Serge Mani Onana, Zbigniew Rakowski. 161-170 [doi]
- Fast Qualitative Reasoning about Actions for Computing Anticipatory SystemsNatsumi Kitajima, Yuichi Goto, Jingde Cheng. 171-178 [doi]
- Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation MethodologySimon Tjoa, Stefan Jakoubi, Gerald Quirchmayr. 179-186 [doi]
- Defining Secure Business Processes with Respect to Multiple ObjectivesThomas Neubauer, Johannes Heurix. 187-194 [doi]
- Analysis and Component-based Realization of Security RequirementsDenis Hatebur, Maritta Heisel, Holger Schmidt. 195-203 [doi]
- A Framework for Detecting Anomalies in VoIP NetworksYacine Bouzida, Christophe Mangin. 204-211 [doi]
- Rapid Detection of Constant-Packet-Rate FlowsKuan-Ta Chen, Jing-Kai Lou. 212-220 [doi]
- Performance Analysis of Anonymous Communication Channels Provided by TorAndriy Panchenko, Lexi Pimenidis, Johannes Renner. 221-228 [doi]
- Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule SetsSergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca. 229-236 [doi]
- Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field CaseWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham. 237-244 [doi]
- A Distributed Defense Framework for Flooding-Based DDoS AttacksYonghua You, Mohammad Zulkernine, Anwar Haque. 245-252 [doi]
- Pure MPLS TechnologyLiwen He, Paul Botham. 253-259 [doi]
- Symmetric Active/Active Replication for Dependent ServicesChristian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He. 260-267 [doi]
- Statically Checking Confidentiality of Shared Memory Programs with Dynamic LabelsMarcus Völp. 268-275 [doi]
- A Cause-Based Approach to Preventing Software VulnerabilitiesDavid Byers, Nahid Shahmehri. 276-283 [doi]
- Integrating a Security Plug-in with the OpenUP/Basic Development ProcessShanai Ardi, Nahid Shahmehri. 284-291 [doi]
- A Novel Testbed for Detection of Malicious Software FunctionalityJostein Jensen. 292-301 [doi]
- Type and Effect Annotations for Safe Memory Access in CSyrine Tlili, Mourad Debbabi. 302-309 [doi]
- Adaptabilty of a GP Based IDS on Wireless NetworksAdetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. 310-318 [doi]
- An Intrusion-Tolerant Mechanism for Intrusion Detection SystemsLiwei Kuang, Mohammad Zulkernine. 319-326 [doi]
- Fuzzy Private Matching (Extended Abstract)Lukasz Chmielewski, Jaap-Henk Hoepman. 327-334 [doi]
- Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global KnowledgeJens-Uwe Bußer, Steffen Fries, Martin Otto, Peter Hartmann. 335-343 [doi]
- Trust Modelling in E-Commerce through Fuzzy Cognitive MapsChristian Schläger, Günther Pernul. 344-351 [doi]
- Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and DefenderZonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho. 352-359 [doi]
- CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization TechnologiesJosé María de Fuentes, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda. 363-368 [doi]
- Extending Mixed Serialisation Graphs to Replicated EnvironmentsJosep M. Bernabé-Gisbert, Francesc D. Muñoz-Escoí. 369-375 [doi]
- Towards Secure E-Commerce Based on Virtualization and Attestation TechniquesFrederic Stumpf, Claudia Eckert, Shane Balfe. 376-382 [doi]
- Fuzzy Belief-Based SupervisionAlexandre Vorobiev, Rudolph E. Seviora. 383-389 [doi]
- Ensuring Progress in Amnesiac Replicated SystemsRubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí. 390-396 [doi]
- Enhancing Face Recognition with Location InformationR. J. Hulsebosch, P. W. G. Ebben. 397-403 [doi]
- A Lazy Monitoring Approach for Heartbeat-Style Failure DetectorsBenjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer. 404-409 [doi]
- Defending On-Line Web Application Security with User-Behavior SurveillanceYu Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen. 410-415 [doi]
- A Pattern-Driven Security Process for SOA ApplicationsNelly A. Delessy, Eduardo B. Fernández. 416-421 [doi]
- Towards a Dependable Architecture for Highly Available Internet ServicesPablo Neira Ayuso, Laurent Lefèvre, Denis Barbaron, Rafael M. Gasca. 422-427 [doi]
- Assessing the Reliability and Cost of Web and Grid OrchestrationsAlan Stewart, Maurice Clint, Terry Harmer, Peter Kilpatrick, Ronald H. Perrott, Joaquim Gabarró. 428-433 [doi]
- Application-Oriented Trust in Distributed ComputingRiccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi. 434-439 [doi]
- BlueTrust in a Real WorldBradley Markides, Marijke Coetzee. 440-445 [doi]
- Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal ObstaclesAnanda Swarup Das, Jitu Kumar Keshri, Kannan Srinathan, Vaibhav Srivastava. 446-451 [doi]
- Privacy Protected ELF for Private Computing on Public PlatformsThomas H. Morris, V. S. S. Nair. 452-457 [doi]
- haplog: A Hash-Only and Privacy-Preserved Secure Logging MechanismChih-Yin Lin. 458-460 [doi]
- An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200Xiaolei Li, Jin Tian, Tingdi Zhao. 461-466 [doi]
- A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall CaseRyma Abbassi, Sihem Guemara El Fatmi. 467-472 [doi]
- SPIT Detection and Prevention Method in VoIP EnvironmentHe Guang-Yu, Wen Ying-You, Zhao Hong. 473-478 [doi]
- A New Approach to Analysis of Interval AvailabilityEzzat Kirmani, Cynthia S. Hood. 479-483 [doi]
- SFMD: A Secure Data Forwarding and Malicious Routers Detecting ProtocolXiang-he Yang, Huaping Hu, Xin Chen. 484-490 [doi]
- Fault Effects in FlexRay-Based Networks with Hybrid TopologyMehdi Dehbashi, Vahid Lari, Seyed Ghassem Miremadi, Mohammad Shokrollah-Shirazi. 491-496 [doi]
- Secure Wireless Sensor NetworksXun Yi, Mike Faulkner, Eiji Okamoto. 497-502 [doi]
- SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor NetworksAbdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa. 503-508 [doi]
- The Impact of Flooding Attacks on Network-based ServicesMeiko Jensen, Nils Gruschka, Norbert Luttenberger. 509-513 [doi]
- Managing Priorities in Atomic Multicast ProtocolsEmili Miedes, Francesc D. Muñoz-Escoí. 514-519 [doi]
- Beacon Frame Spoofing Attack Detection in IEEE 802.11 NetworksAsier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez. 520-525 [doi]
- An End-to-End Security Solution for SCTPStefan Lindskog, Anna Brunstrom. 526-531 [doi]
- An Identity-Based Group Key Agreement Protocol from PairingHongji Wang, Gang Yao, Qingshan Jiang. 532-537 [doi]
- An Authenticated 3-Round Identity-Based Group Key Agreement ProtocolGang Yao, Hongji Wang, Qingshan Jiang. 538-543 [doi]
- High Capacity Steganographic Method Based Upon JPEGAdel Almohammad, Robert M. Hierons, Gheorghita Ghinea. 544-549 [doi]
- Cluster-based Group Key Agreement for Wireless Ad hoc NetworksElisavet Konstantinou. 550-557 [doi]
- A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of WordsChen Zhi-li, Huang Liu-sheng, Yu Zhen-shan, Li Ling-jun, Yang Wei. 558-563 [doi]
- RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable NetworksBo Zhang, Kai Han, Binoy Ravindran, E. Douglas Jensen. 564-571 [doi]
- A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment ApplicationsJan Willemson, Arne Ansper. 572-577 [doi]
- A Security Model and its Application to a Distributed Decision Support System for HealthcareLiang Xiao 0002, Javier Vicente, Carlos Sáez, Andrew Peet, Alex Gibb, Paul H. Lewis, Srinandan Dasmahapatra, Madalina Croitoru, Horacio González-Vélez, Magí Lluch i Ariet, David Dupplaw. 578-585 [doi]
- Run-time Information Flow Monitoring based on Dynamic Dependence GraphsSalvador Cavadini, Diego Cheda. 586-591 [doi]
- Automated Process Classi?cation Framework using SELinux Security ContextPravin Shinde, Priyanka Sharma, Srinivas Guntupalli. 592-596 [doi]
- Using Composition Policies to Manage Authentication and Authorization Patterns and ServicesJudith E. Y. Rossebø, Rolv Bræk. 597-603 [doi]
- Providing Fault Tolerance in Wireless Backhaul Network Design with Path RestorationNaruemon Wattanapongsakorn, Chalermpol Charnsripinyo, Pakorn Leesutthipornchai. 604-609 [doi]
- Histogram Matrix: Log File Visualization for Anomaly DetectionAdrian Frei, Marc Rennhard. 610-617 [doi]
- Context-based Profiling for Anomaly Intrusion Detection with DiagnosisSalem Benferhat, Karim Tabia. 618-623 [doi]
- A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion DetectionUlf Larson, Erland Jonsson, Stefan Lindskog. 624-629 [doi]
- IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSIYouhui Zhang, Hongyi Wang, Yu Gu, Dongsheng Wang. 630-635 [doi]
- Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized SchemeMarianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani. 636-641 [doi]
- NFC Devices: Security and PrivacyGerald Madlmayr, Josef Langer, Christian Kantner, Josef Scharinger. 642-647 [doi]
- Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessorNima Mehdizadeh, Mohammad Shokrolah-Shirazi, Seyed Ghassem Miremadi. 648-652 [doi]
- Increasing the Performability of Computer Clusters Using RADIC IIGuna Santos, Angelo Duarte, Dolores Rexachs, Emilio Luque. 653-658 [doi]
- A Framework for Proactive Fault ToleranceGeoffroy Vallée, Kulathep Charoenpornwattana, Christian Engelmann, Anand Tikotekar, Chokchai Leangsuksun, Thomas Naughton, Stephen L. Scott. 659-664 [doi]
- Anti-DDoS Virtualized Operating SystemSanjam Garg, Huzur Saran. 667-674 [doi]
- A Case for High Availability in a Virtualized Environment (HAVEN)Erin Farr, Richard Harper, Lisa Spainhower, Jimi Xenidis. 675-682 [doi]
- A Federated Physical and Logical Access Control Enforcement ModelStéphane Onno. 683-692 [doi]
- Fostering the Uptake of Secure Multiparty Computation in E-CommerceOctavian Catrina, Florian Kerschbaum. 693-700 [doi]
- Efficient Certificate Path Validation and Its Application in Mobile Payment ProtocolsRafael Martínez-Peláez, Cristina Satizábal, Francisco Rico-Novella, Jordi Forné. 701-708 [doi]
- Avoiding Policy-based Deadlocks in Business ProcessesMathias Kohler, Andreas Schaad. 709-716 [doi]
- A Secure High-Speed Identification Scheme for RFID Using Bloom FiltersYasunobu Nohara, Sozo Inoue, Hiroto Yasuura. 717-722 [doi]
- New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve CryptosystemYouan Xiao. 723-726 [doi]
- Privacy-preserving Protocols for Finding the Convex HullsQi Wang, Yonglong Luo, Liusheng Huang. 727-732 [doi]
- A Secure RFID Protocol based on Insubvertible Encryption Using Guardian ProxyKyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi. 733-740 [doi]
- Cryptographic Properties of Second-Order Memory Elementary Cellular AutomataAscensión Hernández Encinas, Ángel Martín del Rey, J. L. Pérez Iglesias, Gerardo Rodríguez Sánchez, Araceli Queiruga Dios. 741-745 [doi]
- New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer GroupShengke Zeng, Mingxing He, Weidong Luo. 746-751 [doi]
- Intensive Programme on Information and Communication SecurityChristian Schläger, Ludwig Fuchs, Günther Pernul. 752-757 [doi]
- Applications for IT-Risk Management – Requirements and Practical EvaluationHeinz Lothar Grob, Gereon Strauch, Christian Buddendick. 758-764 [doi]
- Security Analysis of Role-based Separation of Duty with WorkflowsRattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse. 765-770 [doi]
- Detecting Suspicious Relational Database QueriesStefan Böttcher, Rita Hartel, Matthias Kirschner. 771-778 [doi]
- Assessing the Value of Enterprise Identity Management (EIdM) – Towards a Generic Evaluation ApproachDenis Royer. 779-786 [doi]
- An Ontological Approach to Secure MANET ManagementMark E. Orwat, Timothy E. Levin, Cynthia E. Irvine. 787-794 [doi]
- Reliability Analysis using Graphical Duration ModelsRoland Donat, Laurent Bouillaut, Patrice Aknin, Philippe Leray. 795-800 [doi]
- From Omega to ?P in the Crash-Recovery Failure Model with Unknown MembershipMikel Larrea, Cristian Martín. 801-806 [doi]
- Policy-based Group Organizational Structure Management using an Ontological ApproachMario Anzures-García, Luz A. Sánchez-Gálvez. 807-812 [doi]
- A Systematic Review and Comparison of Security OntologiesCarlos Blanco, Joaquín Lasheras, Rafael Valencia-García, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini. 813-820 [doi]
- Context Ontology for Secure InteroperabilityCéline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli. 821-827 [doi]
- On the Security of VSH in Password SchemesKimmo Halunen, Pauli Rikula, Juha Röning. 828-833 [doi]
- Sustaining Web Services High-Availability Using CommunitiesZakaria Maamar, Quan Z. Sheng, Djamal Benslimane. 834-841 [doi]
- Distributed Information Retrieval Service for Ubiquitous ServicesTakeshi Tsuchiya, Marc Lihan, Hirokazu Yoshinaga, Kei ichi Koyanagi. 842-850 [doi]
- A Lightweight Security Analyzer inside GCCDavide Pozza, Riccardo Sisto. 851-858 [doi]
- Dynamic Maintenance of Software Systems at RuntimeHabib Seifzadeh, Mostafa Kermani, Mohsen Sadighi. 859-865 [doi]
- Software Security; A Vulnerability Activity RevisitMohammad Ali Hadavi, Hossein Shirazi, Hasan Mokhtari Sangchi, Vahid Saber Hamishagi. 866-872 [doi]
- Making Multi-Dimensional Trust Decisions on Inter-Enterprise CollaborationsSini Ruohomaa, Lea Kutvonen. 873-880 [doi]
- A Survey on Trust and Reputation Schemes in Ad Hoc NetworksMarianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani. 881-886 [doi]
- Privacy-Preserving Recommendation Systems for Consumer Healthcare ServicesStefan Katzenbeisser, Milan Petkovic. 889-895 [doi]
- Detecting Bots Based on Keylogging ActivitiesYousof Al-Hammadi, Uwe Aickelin. 896-902 [doi]
- A Comprehensive Approach for Context-dependent Privacy ManagementElke Franz, Christin Groba, Thomas Springer, Mike Bergmann. 903-910 [doi]
- Traceable Quantitative Risk Assessment Applied to Investment Decision for Local BackupsSteffen Weiss, Martin Wahl, Michael Tielemann, Klaus Meyer-Wegener. 911-920 [doi]
- Quantitative Assessment of Enterprise Security SystemRuth Breu, Frank Innerhofer-Oberperfler, Artsiom Yautsiukhin. 921-928 [doi]
- Clustering Oriented Architectures in Medical Sensor EnvironmentsEleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis. 929-934 [doi]
- An Initial Model and a Discussion of Access Control in Patient Controlled Health RecordsLillian Røstad. 935-942 [doi]
- Secure Team-Based EPR Access Acquisition in Wireless NetworksSigurd Eskeland, Vladimir A. Oleshchuk. 943-949 [doi]
- VEA-bility Security Metric: A Network Security Analysis ToolMelanie Tupper, A. Nur Zincir-Heywood. 950-957 [doi]
- Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing EnvironmentsStefan G. Weber, Andreas Heinemann, Max Mühlhäuser. 958-964 [doi]
- GOST-28147 Encryption Implementation on Graphics Processing UnitsVictor Korobitsin, Sergey Ilyin. 967-974 [doi]
- Intelligent Video Surveillance Networks: Data Protection ChallengesFanny Coudert, Jos Dumortier. 975-981 [doi]
- Intrusion Detection with Data Correlation Relation GraphAmin Hassanzadeh, Babak Sadeghian. 982-989 [doi]
- A Critique of k-Anonymity and Some of Its EnhancementsJosep Domingo-Ferrer, Vicenç Torra. 990-993 [doi]
- Cluster-Specific Information Loss Measures in Data Privacy: A ReviewVicenç Torra, Susana Ladra. 994-999 [doi]
- Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant AlgorithmsCristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella. 1000-1007 [doi]
- Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions ApproachBoustia Narhimene, Mokhtari Aicha. 1008-1012 [doi]
- Using Non-adaptive Group Testing to Construct Spy Agent RoutesGeorgios Kalogridis, Chris J. Mitchell. 1013-1019 [doi]
- A Bayesian Approach for on-Line Max AuditingGerardo Canfora, Bice Cavallo. 1020-1027 [doi]
- Detection of Malcodes by Packet ClassificationIrfan Ahmed, Kyung-suk Lhee. 1028-1035 [doi]
- Performance of a Strategy Based Packets Forwarding in Ad Hoc NetworksMarcin Seredynski, Pascal Bouvry, Mieczyslaw A. Klopotek. 1036-1043 [doi]
- Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email PrivacySaeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair. 1044-1051 [doi]
- AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between NodesCarlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit, Karim Tamine. 1052-1059 [doi]
- A Post-processing Method to Lessen k-Anonymity DissimilaritiesAgusti Solanas, Gloria Pujol, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz. 1060-1066 [doi]
- Improving Techniques for Proving Undecidability of Checking Cryptographic ProtocolsZhiyao Liang, Rakesh M. Verma. 1067-1074 [doi]
- A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature SetDuffy Angevine, A. Nur Zincir-Heywood. 1075-1079 [doi]
- Partial Disclosure of Searchable Encrypted Data with Support for Boolean QueriesYasuhiro Ohtaki. 1083-1090 [doi]
- Secure and Privacy-Friendly Logging for eGovernment ServicesKarel Wouters, Koen Simoens, Danny Lathouwers, Bart Preneel. 1091-1096 [doi]
- The REM Framework for Security EvaluationFlora Amato, Valentina Casola, Antonino Mazzeo, Valeria Vittorini. 1097-1103 [doi]
- Static Validation of Licence Conformance PoliciesRené Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst. 1104-1111 [doi]
- Towards Practical Security Monitors of UML Policies for Mobile ApplicationsFabio Massacci, Katsiaryna Naliuka. 1112-1119 [doi]
- Synthesis of Local Controller Programs for Enforcing Global Security PropertiesFabio Martinelli, Ilaria Matteucci. 1120-1127 [doi]
- Weighted Datalog and Levels of TrustStefano Bistarelli, Fabio Martinelli, Francesco Santini. 1128-1134 [doi]
- Negotiation of Usage Control Policies - Simply the Best?Alexander Pretschner, Thomas Walter. 1135-1136 [doi]
- Security Requirement Engineering at a Telecom ProviderAlbin Zuccato, Viktor Endersz, Nils Daniels. 1139-1147 [doi]
- Identifying Security Aspects in Early Development StagesTakao Okubo, Hidehiko Tanaka. 1148-1155 [doi]
- Using Security Patterns to Combine Security MetricsThomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen. 1156-1163 [doi]
- Secure Software Design in PracticePer Håkon Meland, Jostein Jensen. 1164-1171 [doi]
- Covering Your Assets in Software EngineeringMartin Gilje Jaatun, Inger Anne Tøndel. 1172-1179 [doi]
- A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection FeaturesShangping Ren, Kevin A. Kwiat. 1180-1187 [doi]
- Towards Incorporating Discrete-Event Systems in Secure Software DevelopmentSarah-Jane Whittaker, Mohammad Zulkernine, Karen Rudie. 1188-1195 [doi]
- How to Open a File and Not Get HackedJames A. Kupsch, Barton P. Miller. 1196-1203 [doi]
- Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of RulesHolger Peine. 1204-1209 [doi]
- Adaptive Data Integrity through Dynamically Redundant Data StructuresVincenzo De Florio, Chris Blondia. 1213-1218 [doi]
- ISEDS: An Information Security Engineering Database System Based on ISO StandardsDaisuke Horie, Shoichi Morimoto, Noor Azimah, Yuichi Goto, Jingde Cheng. 1219-1225 [doi]
- Privacy Aspects of eHealthDaniel Slamanig, Christian Stingl. 1226-1233 [doi]
- Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor NetworksKaliappa Nadar Ravindran, Jiang Wu, Kevin A. Kwiat, Ali Sabbir. 1234-1239 [doi]
- Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven ApproachYudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone. 1240-1247 [doi]
- Implementing Multidimensional Security into OLAP ToolsCarlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. 1248-1253 [doi]
- Detecting Key Players in 11-M Terrorist Network: A Case StudyNasrullah Memon, David L. Hicks. 1254-1259 [doi]
- Privacy Preserving Support Vector Machines in Wireless Sensor NetworksDong Seong Kim, Muhammad Anwarul Azim, Jong Sou Park. 1260-1265 [doi]
- An Image Encryption System by Cellular Automata with MemoryFarhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri. 1266-1271 [doi]
- Insider-secure Signcryption KEM/Tag-KEM Schemes without Random OraclesChik-How Tan. 1275-1281 [doi]
- Internet Observation with ISDAS: How Long Does a Worm Perform Scanning?Tomohiro Kobori, Hiroaki Kikuchi, Masato Terada. 1282-1286 [doi]
- Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of VotesTsukasa Endo, Isao Echizen, Hiroshi Yoshiura. 1287-1293 [doi]
- Enocoro-80: A Hardware Oriented Stream CipherDai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko. 1294-1300 [doi]
- Cryptanalysis and Improvement of an ‘Improved Remote Authentication Scheme with Smart Card’Marko Hölbl, Tatjana Welzer. 1301-1305 [doi]
- Effective Monitoring of a Survivable Distributed Networked Information SystemPaul Rubel, Michael Atighetchi, Partha Pratim Pal, Martin W. Fong, Richard O Brien. 1306-1312 [doi]
- Design of an FDB based Intra-domain Packet Traceback SystemHiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi. 1313-1318 [doi]
- An Independent Evaluation of Web Timing Attack and its CountermeasureYoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi. 1319-1324 [doi]
- Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving NetworksArjan Durresi, Mimoza Durresi, Leonard Barolli. 1325-1331 [doi]
- Privacy-Preserving Distributed Set IntersectionQingsong Ye, Huaxiong Wang, Christophe Tartary. 1332-1339 [doi]
- Examination of Forwarding Obstruction Attacks in Structured Overlay NetworksYo Mashimo, Shintaro Ueda, Yasutaka Shinzaki, Hiroshi Shigeno. 1340-1345 [doi]
- A Novel Approach for Multiplication over GF(2m) in Polynomial Basis RepresentationAbdulah Abdulah Zadeh. 1346-1351 [doi]
- Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network ForensicsBenjamin Turnbull, Jill Slay. 1355-1360 [doi]
- Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic AnalysisJoshua Broadway, Benjamin Turnbull, Jill Slay. 1361-1368 [doi]
- Recovery of Encryption Keys from Memory Using a Linear ScanChristopher Hargreaves, Howard Chivers. 1369-1376 [doi]
- Proposal for Efficient Searching and Presentation in Digital ForensicsJooyoung Lee. 1377-1381 [doi]
- Secure Steganography in Compressed Video BitstreamsBin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun. 1382-1387 [doi]
- Considerations Towards a Cyber Crime Profiling SystemKweku K. Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff. 1388-1393 [doi]
- Alignment of Misuse Cases with Security Risk ManagementRaimundas Matulevicius, Nicolas Mayer, Patrick Heymans. 1397-1404 [doi]
- Information Stream Based Model for Organizing SecurityBernhard Thalheim, Sabah S. Al-Fedaghi, Khaled Al-Saqabi. 1405-1412 [doi]
- Security Requirements Variability for Software Product LinesDaniel Mellado, Eduardo Fernández-Medina, Mario Piattini. 1413-1420 [doi]
- Transforming Security Requirements into ArchitectureKoen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen. 1421-1428 [doi]
- Modelling Security Properties in a Grid-based Operating System with Anti-GoalsAlvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang. 1429-1436 [doi]
- Annotating Regulations Using Cerno: An Application to Italian Documents - Extended AbstractNicola Zeni, Nadzeya Kiyavitskaya, James R. Cordy, Luisa Mich, John Mylopoulos. 1437-1442 [doi]
- Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security RequirementsRiham Hassan, Shawn A. Bohner, Sherif El-Kassas, Mohamed Eltoweissy. 1443-1450 [doi]
- Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract)Orhan Cetinkaya. 1451-1456 [doi]