Abstract is missing.
- A Pluggable Domain Management Approach for Building Practical Distributed CoalitionsYasuharu Katsuno, Yuji Watanabe, Michiharu Kudo, Eiji Okamoto. 1-8 [doi]
- Retaining Data Control to the Client in Infrastructure CloudsMarco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa, David Huemer. 9-16 [doi]
- Workflows in Dynamic and Restricted DelegationMehran Ahsant, Jim Basney. 17-24 [doi]
- The Accountability Problem of Flooding Attacks in Service-Oriented ArchitecturesMeiko Jensen, Jörg Schwenk. 25-32 [doi]
- Web Service Trust: Towards a Dynamic Assessment FrameworkGeorge Spanoudakis, Stephane LoPresti. 33-40 [doi]
- Security Requirements Specification in Service-Oriented Business Process ManagementMichael Menzel, Ivonne Thomas, Christoph Meinel. 41-48 [doi]
- Quantitative Analysis of Secure Information Flow via Probabilistic SemanticsChunyan Mu, David Clark. 49-57 [doi]
- Deploying Security Policy in Intra and Inter Workflow Management SystemsSamiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens. 58-65 [doi]
- An Empirically Derived Loss Taxonomy Based on Publicly Known Security IncidentsFrank Innerhofer-Oberperfler, Ruth Breu. 66-73 [doi]
- Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent MonitoringJunghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jiang. 74-81 [doi]
- Server-Side Prediction of Source IP Addresses Using Density EstimationMarkus Goldstein, Matthias Reif, Armin Stahl, Thomas M. Breuel. 82-89 [doi]
- Detecting Stepping-Stone Connection Using Association Rule MiningYing-Wei Kuo, Shou-Hsuan Stephen Huang. 90-97 [doi]
- Formal Analyses of Usage Control PoliciesAlexander Pretschner, Judith Rüesch, Christian Schaefer, Thomas Walter. 98-105 [doi]
- A First Step towards Characterizing Stealthy BotnetsJustin Leonard, Shouhuai Xu, Ravi S. Sandhu. 106-113 [doi]
- Intrusion Process Modeling for Security QuantificationJaafar Almasizadeh, Mohammad Abdollahi Azgomi. 114-121 [doi]
- Different Approaches to In-House Identity Management - Justification of an AssumptionLudwig Fuchs, C. Broser, Günther Pernul. 122-129 [doi]
- An LPN-Problem-Based Lightweight Authentication Protocol for Wireless CommunicationsYa-Fen Chang, Yen-Cheng Lai. 130-134 [doi]
- Revealing the Calling History of SIP VoIP Systems by Timing AttacksGe Zhang, Simone Fischer-Hübner, Leonardo A. Martucci, Sven Ehlert. 135-142 [doi]
- The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime DataBenjamin Turnbull, Robert Taylor, Barry Blundell. 143-149 [doi]
- A Robust Image Watermarking Using Two Level DCT and Wavelet Packets DenoisingAmirhossein Taherinia, Mansour Jamzad. 150-157 [doi]
- On Equilibrium Distribution Properties in Software Reliability ModelingXiao Xiao, Tadashi Dohi. 158-165 [doi]
- An Analysis of Fault Effects and Propagations in AVR Microcontroller ATmega103(L)Alireza Rohani, Hamid R. Zarandi. 166-172 [doi]
- Blue Gene/L Log Analysis and Time to Interrupt EstimationNarate Taerat, Nichamon Naksinehaboon, Clayton Chandler, James Elliott, Chokchai Leangsuksun, George Ostrouchov, Stephen L. Scott, Christian Engelmann. 173-180 [doi]
- A New Approach for Implementing the MPL Method toward Higher SPA ResistanceMasami Izumi, Kazuo Sakiyama, Kazuo Ohta. 181-186 [doi]
- On Privacy Preserving Convex HullSandeep Hans, Sarat C. Addepalli, Anuj Gupta, Kannan Srinathan. 187-192 [doi]
- Routing Protocol Security Using Symmetric Key Based TechniquesBezawada Bruhadeshwar, Kishore Kothapalli, M. Poornima, M. Divya. 193-200 [doi]
- Prioritisation and Selection of Software Security ActivitiesDavid Byers, Nahid Shahmehri. 201-207 [doi]
- BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based VulnerabilityPing Chen, Yi Wang, Zhi-Xin, Bing Mao, Li Xie. 208-215 [doi]
- Enhancing Automated Detection of Vulnerabilities in Java ComponentsPierre Parrend. 216-223 [doi]
- Automated Support for Security Requirements Engineering in Software Product Line Domain EngineeringDaniel Mellado, Jesús RodrÃguez, Eduardo Fernández-Medina, Mario Piattini. 224-231 [doi]
- Identifying and Resolving Least Privilege Violations in Software ArchitecturesKoen Buyens, Bart De Win, Wouter Joosen. 232-239 [doi]
- A Test Framework for Assessing Effectiveness of the Data Privacy Policy s Implementation into Relational DatabasesGerardo Canfora, Corrado Aaron Visaggio, Vito Paradiso. 240-247 [doi]
- Improving Reliability for Multi-home Inbound Traffic: MHLB/I Packet-Level Inter-domain Load-BalancingHiroshi Fujinoki. 248-256 [doi]
- Proactive Resource Management for Failure Resilient High Performance Computing ClustersSong Fu, Cheng-Zhong Xu. 257-264 [doi]
- A Perceptron Neural Network for Asymmetric Comparison-Based System-Level Fault DiagnosisMourad Elhadef. 265-272 [doi]
- Perfect Failure Detection in the Partitioned Synchronous Distributed System ModelRaimundo José de Araújo Macêdo, Sérgio Gorender. 273-280 [doi]
- Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting ProtocolsMehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula. 281-288 [doi]
- Measuring Voter-Controlled PrivacyHugo L. Jonker, Sjouke Mauw, Jun Pang. 289-298 [doi]
- Generating User-Understandable Privacy PreferencesJan Kolter, Günther Pernul. 299-306 [doi]
- An Automatic Privacy Policy Agreement Checker for E-servicesGeorge O. M. Yee. 307-315 [doi]
- A Micro-FT-UART for Safety-Critical SoC-Based ApplicationsMohammad-Hamed Razmkhah, Seyed Ghassem Miremadi, Alireza Ejlali. 316-321 [doi]
- MixVM - An Approach to Service Isolation and Data Protection in Mobile Context-Sensitive ApplicationsThomas Butter, Markus Aleksy. 322-328 [doi]
- On the Security of Untrusted MemoryJörn-Marc Schmidt, Stefan Tillich. 329-334 [doi]
- Detecting Image Tampering Using Feature FusionPin Zhang, Xiangwei Kong. 335-340 [doi]
- SecMiLiA: An Approach in the Agent ProtectionAntonio Muñoz, Antonio Maña, Daniel Serrano. 341-348 [doi]
- Traffic Controller: A Practical Approach to Block Network Covert Timing ChannelYi Wang, Ping Chen, Yi Ge, Bing Mao, Li Xie. 349-354 [doi]
- Capturing Information Flow with Concatenated Dynamic Taint AnalysisHyung Chan Kim, Angelos D. Keromytis, Michael Covington, Ravi Sahita. 355-362 [doi]
- Risk-Driven Architectural DecompositionThomas Heyman, Riccardo Scandariato, Wouter Joosen. 363-368 [doi]
- Reducing the Cost of Session Key EstablishmentBezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya. 369-373 [doi]
- Accuracy: The Fundamental Requirement for Voting SystemsTim Storer, Russell Lock. 374-379 [doi]
- Reusable Security Requirements for Healthcare ApplicationsJostein Jensen, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, Herbjørn Andresen. 380-385 [doi]
- P2F: A User-Centric Privacy Protection FrameworkMaryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas. 386-391 [doi]
- Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001Wolfgang Boehmer. 392-399 [doi]
- Methodology for Experimental ICT Industrial and Critical Infrastructure Security TestsMarcelo Masera, Igor Nai Fovino. 400-405 [doi]
- Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo MethodOmar Khadeer Hussain, Tharam S. Dillon. 406-411 [doi]
- Building a Responsibility Model Including Accountability, Capability and CommitmentChristophe Feltus, Michaël Petit. 412-419 [doi]
- AVISPA in the Validation of Ambient Intelligence ScenariosAntonio Muñoz, Antonio Maña, Daniel Serrano. 420-426 [doi]
- Security Evaluation of an Intrusion Tolerant System with MRSPNsRyutaro Fujimoto, Hiroyuki Okamura, Tadashi Dohi. 427-432 [doi]
- Algebraic Properties in Alice and Bob NotationSebastian Mödersheim. 433-440 [doi]
- Scrubbing in Storage Virtualization Platform for Long-Term Backup ApplicationAo Ma, Yang Yin, Wenwu Na, Xiaoxuan Meng, Qingzhong Bu, Lu Xu. 441-447 [doi]
- Fault Tolerant and Low Energy Write-Back Heterogeneous Set Associative Cache for DSM TechnologiesMehrtash Manoochehri, Alireza Ejlali, Seyed Ghassem Miremadi. 448-453 [doi]
- Generating AMF Configurations from Software Vendor Constraints and User RequirementsAli Kanso, Maria Toeroe, Abdelwahab Hamou-Lhadj, Ferhat Khendek. 454-461 [doi]
- Using XACML for Embedded and Fine-Grained Access Control PolicyGeorge Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, Lisa M. Marvel. 462-468 [doi]
- A-COLD: Access Control of Web OLAP over Multi-data WarehouseSomchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt. 469-474 [doi]
- Package-Role Based Authorization Control Model for Wireless Network ServicesHuy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson. 475-480 [doi]
- Security Credential Mapping in GridsMehran Ahsant, Esteban Talavera Gonzalez, Jim Basney. 481-486 [doi]
- A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute StatisticsKeita Emura, Atsuko Miyaji, Kazumasa Omote. 487-492 [doi]
- Security in Quantum Networks as an Optimization ProblemStefan Rass, Peter Schartner. 493-498 [doi]
- Finding Preimages of Multiple Passwords Secured with VSHKimmo Halunen, Pauli Rikula, Juha Röning. 499-503 [doi]
- Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off AttackNurdan Buz Saran, Ali Doganaksoy. 504-509 [doi]
- Generalized Robust Combiners for Oblivious TransferGanugula Umadevi, Sarat C. Addepalli, Kannan Srinathan. 510-515 [doi]
- Including Security Rules Support in an MDA Approach for Secure DWsCarlos Blanco, Ignacio GarcÃa RodrÃguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. 516-521 [doi]
- A System of Privacy Preserving Distributed Spatial Data Warehouse Using Relation DecompositionMarcin Gorawski, Szymon Panfil. 522-527 [doi]
- Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWsCarlos Blanco, Ignacio GarcÃa RodrÃguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. 528-533 [doi]
- Identity-Based Hybrid SigncryptionFagen Li, Masaaki Shirase, Tsuyoshi Takagi. 534-539 [doi]
- Towards Intrusion Detection for Encrypted NetworksVik Tor Goh, Jacob Zimmermann, Mark Looi. 540-545 [doi]
- A Mobile Ambients-Based Approach for Network Attack Modelling and SimulationVirginia N. L. Franqueira, Pascal van Eck, Roel Wieringa, Raul H. C. Lopes. 546-553 [doi]
- Statistical Failure Analysis of a Web Server SystemToshiya Fujii, Tadashi Dohi. 554-559 [doi]
- A Policy Framework for Data Management in Services MarketplacesJun Li, Bryan Stephenson, Sharad Singhal. 560-565 [doi]
- Modeling Misuse PatternsEduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki. 566-571 [doi]
- Novel Algorithms for Subgroup Detection in Terrorist NetworksNasrullah Memon, Abdul Rasool Qureshi, Uffe Kock Wiil, David L. Hicks. 572-577 [doi]
- QR-TAN: Secure Mobile Transaction AuthenticationGuenther Starnberger, Lorenz Froihofer, Karl M. Göschka. 578-583 [doi]
- An Authentication Watermark Algorithm for JPEG imagesXiaowei Shi, Fenlin Liu, Daofu Gong, Jing Jing. 584-588 [doi]
- A New Watermarking Attack Using Long-Range Correlation Image RestorationAmirhossein Taherinia, Mehran Fotouhi, Mansour Jamzad. 589-594 [doi]
- The Case for a Simpler Security Model in Grid ComputingFrederik Orellana, Christian Ulrik Søttrup, Anders Wäänänen, Daniel Kalici, Michael Grønager. 595-599 [doi]
- Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting RobotsSarat C. Addepalli, Piyush Bansal, Kannan Srinathan, K. Madhava Krishna. 600-605 [doi]
- Position Paper: Secure Infrastructure for Scientific Data Life Cycle ManagementMarco Descher, Thomas Feilhauer, T. Ludescher, Philip Masser, B. Wenzel, Peter Brezany, Ibrahim Elsayed, Alexander Wöhrer, A Min Tjoa, David Huemer. 606-611 [doi]
- A Robust Image Watermarking Method in Wavelet Domain Using Genetic AlgorithmS. Hamid Amiri, Mansour Jamzad. 612-617 [doi]
- An Efficient Measurement of Object Oriented Design VulnerabilityAlka Agrawal, Shalini Chandra, Raees Ahmad Khan. 618-623 [doi]
- FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408Kenichi Yajima, Shoichi Morimoto, Daisuke Horie, Noor Sheila Azreen, Yuichi Goto, Jingde Cheng. 624-629 [doi]
- Using Hybrid Trust Model for Handling Inaccurate ResourceBagher Rahimpour Cami, Mohammad Reza Matash Brujerdi. 630-634 [doi]
- A High Speed and Low Cost Error Correction Technique for the Carry Select AdderAlireza Namazi, Seyed Ghassem Miremadi, Alireza Ejlali. 635-640 [doi]
- An Improvement of REM: A Replication Oriented Event-Based MiddlewareYoucheng Chen, Mohammad Reza Selim, Yuichi Goto, Jingde Cheng. 641-646 [doi]
- Advanced Flooding Attack on a SIP ServerXianglin Deng, Malcolm Shore. 647-651 [doi]
- State of Cybersecurity and the Roadmap to Secure Cyber Community in CambodiaSopheak Cheang, Sinawong Sang. 652-657 [doi]
- An Inclusive Information Society Needs a Global Approach of Information SecuritySolange Ghernaouti-Helie. 658-662 [doi]
- Measuring Peer-to-Peer Botnets Using Control Flow StabilityBinbin Wang, Zhitang Li, Hao Tu, Jie Ma. 663-669 [doi]
- Regulatory Compliance and Information Security AssuranceIgli Tashi. 670-674 [doi]
- Trusting User Defined Context in MANETs: Experience from the MIDAS ApproachVegar Westerlund, Thomas Pronstad, Inger Anne Tøndel, Leendert W. M. Wienhofen. 681-686 [doi]
- Deconvolving Protected SignalsMohaned Kafi, Sylvain Guilley, S. Marcello, David Naccache. 687-694 [doi]
- Vulnerability Analysis and Attacks on NFC-Enabled Mobile PhonesCollin Mulliner. 695-700 [doi]
- Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure ElementVincent Alimi, Marc Pasquet. 701-705 [doi]
- A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID SystemsGeorge Poulopoulos, Konstantinos Markantonakis, Keith Mayes. 706-711 [doi]
- A New Approach for the Construction of Fault Trees from System SimulinkG. Latif-Shabgahi, F. Tajarrod. 712-717 [doi]
- Estimating ToE Risk Level Using CVSSSiv Hilde Houmb, Virginia N. L. Franqueira. 718-725 [doi]
- Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft s Security Management GuideAmril Syalim, Yoshiaki Hori, Kouichi Sakurai. 726-731 [doi]
- Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business EnvironmentsJuhani Anttila, Jorma Kajava. 732-737 [doi]
- Standards-Based Cyber ExercisesRonald C. Dodge, Brian Hay, Kara L. Nance. 738-743 [doi]
- Patterns to Support the Development of Privacy PoliciesLuanna Lopes Lobato, Eduardo B. Fernández, Sergio Donizetti Zorzo. 744-749 [doi]
- Multidimensional Management of Information Security - A Metrics Based Approach Merging Business and Information Security TopicsSebastian Sowa, Roland Gabriel. 750-755 [doi]
- A Security Management Assurance Model to Holistically Assess the Information Security PostureIgli Tashi, Solange Ghernaouti-Helie. 756-761 [doi]
- Methodology to Align Business and IT Policies: Use Case from an IT CompanyChristophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau, André Adelsbach, Marc Camy. 762-767 [doi]
- On the Higher Order Nonlinearities of Boolean Functions and S-boxesClaude Carlet. 768 [doi]
- A Certificate Revocable Anonymous Authentication Scheme with Designated VerifierKeita Emura, Atsuko Miyaji, Kazumasa Omote. 769-773 [doi]
- A Standard MIDI File Steganography Based on Fluctuation of DurationKotaro Yamamoto, Munetoshi Iwakiri. 774-779 [doi]
- A Signature Scheme Associated with Universal Re-signcryptionKohei Tatara, Kouichi Sakurai. 780-785 [doi]
- Real-Time Audio Watermarking with Wavetable Alternation in Digital InstrumentKotaro Yamamoto, Munetoshi Iwakiri. 786-791 [doi]
- A Reconfigurable-Permutation Algorithm for M_S-BoxHiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, Yoshio Yoshioka. 792-797 [doi]
- Protecting Global and Static Variables from Buffer Overflow AttacksYves Younan, Frank Piessens, Wouter Joosen. 798-803 [doi]
- Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter?Dejan Baca, Kai Petersen, Bengt Carlsson, Lars Lundberg. 804-810 [doi]
- hACMEgame: A Tool for Teaching Software SecurityØyvind Nerbråten, Lillian Røstad. 811-816 [doi]
- Towards Evaluation of Security Assurance during the Software Development LifecycleIlkka Uusitalo, Kaarina Karppinen, Pasi Ahonen, Heimo Pentikäinen. 817-822 [doi]
- An Architectural Foundation for Security Model Sharing and ReusePer Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri, Inger Anne Tøndel. 823-828 [doi]
- A Knowledge Management Approach to Support a Secure Software DevelopmentFrancisco José Barreto Nunes, Arnaldo Dias Belchior, Adriano Bessa Albuquerque. 829-834 [doi]
- A Practical Framework for the Dataflow Pointcut in AspectJAmine Boukhtouta, Dima Alhadidi, Mourad Debbabi. 835-840 [doi]
- SecureMDD: A Model-Driven Development Method for Secure Smart Card ApplicationsNina Moebius, Kurt Stenzel, Holger Grandy, Wolfgang Reif. 841-846 [doi]
- Linking Privacy Solutions to Developer GoalsKim Wuyts, Riccardo Scandariato, Bart De Decker, Wouter Joosen. 847-852 [doi]
- Software Inspections Using Guided Checklists to Ensure Security GoalsFrank Elberzhager, Alexander Klaus, Marek Jawurek. 853-858 [doi]
- Managing Rights and Value of Digital MediaFilippo Chiariglione, Giacomo Cosenza, Sergio Matone. 859-864 [doi]
- A Criteria-Based Evaluation Framework for Authentication Schemes in IMSCharlott Eliasson, Markus Fiedler, Ivar Jørstad. 865-869 [doi]
- The User-Centric Vision Matches Credentials ExchangesMikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon. 870-876 [doi]
- Patient-Administered Access Control: A Usability StudyLillian Røstad, Ole Andreas Alsos. 877-881 [doi]
- An Experimental System for Studying the Tradeoff between Usability and SecurityNoam Ben-Asher, Joachim Meyer, Sebastian Möller, Roman Englert. 882-887 [doi]
- Rank Swapping for Partial Orders and Continuous VariablesVicenç Torra. 888-893 [doi]
- An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key ExchangeMarko Hölbl, Tatjana Welzer. 894-898 [doi]
- Security Analysis for P2P Routing ProtocolsTatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai. 899-904 [doi]
- Secrecy Capacity of Wireless LANRyuzou Nishi, Yoshiaki Hori, Kouichi Sakurai. 905-910 [doi]
- Privacy-Preserving Collaborative Filtering SchemesHiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada. 911-916 [doi]
- A Framework for Understanding BotnetsJustin Leonard, Shouhuai Xu, Ravi S. Sandhu. 917-922 [doi]
- Enterprise-Oriented Digital Rights Management Mechanism: eDRMChia-Chen Lin, Shih-Chi Wu, Po-Hsuan Chiang, Chang-Chi Chen. 923-928 [doi]
- Utility and Risk of JPEG-Based Continuous Microdata Protection MethodsJavier Jiménez, Vicenç Torra. 929-934 [doi]
- Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear PairingsYuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu. 935-940 [doi]
- Yet Another Sanitizable Signature from Bilinear MapsTetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka. 941-946 [doi]
- Generation of Prototypes for Masking Sequences of EventsAïda Valls, Cristina Gómez-Alonso, Vicenç Torra. 947-952 [doi]
- Enhancing Control of Service Compositions in Service-Oriented ArchitecturesChristian Schneider, Frederic Stumpf, Claudia Eckert. 953-959 [doi]
- Truly Anonymous Paper Submission and Review SchemeChun-I Fan, Ming-Te Chen, Lung-Hsien Chen. 960-965 [doi]
- An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value HeadersGenta Iha, Hiroshi Doi. 966-971 [doi]
- Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network PacketsKohei Tatara, Yoshiaki Hori, Kouichi Sakurai. 972-977 [doi]
- Automated Instruction-Set Randomization for Web Applications in Diversified Redundant SystemsFrédéric Majorczyk, Jonathan-Christofer Demay. 978-983 [doi]
- An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute InformationYoshio Kakizaki, Yoshiaki Yoshida, Hidekazu Tsuji. 984-989 [doi]
- Making Use of Human Visual Capability to Improve Information SecurityMasakatsu Nishigaki, Takumi Yamamoto. 990-994 [doi]
- Enhancement of Forensic Computing Investigations through Memory Forensic TechniquesMatthew Simon, Jill Slay. 995-1000 [doi]
- Improving Performance in Digital Forensics: A Case Using Pattern Matching BoardJooyoung Lee, Sungkyung Un, Dowon Hong. 1001-1005 [doi]
- Computer Forensics in Japan: A Preliminary StudyJigang Liu, Tetsutaro Uehara. 1006-1011 [doi]
- Enhancing Computer Forensics Investigation through Visualisation and Data ExploitationGrant Osborne, Benjamin Turnbull. 1012-1017 [doi]
- A Post-Mortem Incident Modeling MethodShanai Ardi, Nahid Shahmehri. 1018-1023 [doi]
- Investigating the Implications of Virtual Machine Introspection for Digital ForensicsKara L. Nance, Brian Hay, Matt Bishop. 1024-1029 [doi]