Abstract is missing.
- ARES and Workshops Committees [doi]
- Message from the Organizing Committee [doi]
- Risk Management and Risk Assessment at ENISA: Issues and ChallengesLouis Marinos. 2-3 [doi]
- Model Driven SecurityDavid A. Basin. 4 [doi]
- Trust Based Risk Management for Distributed System Security - A New ApproachChing Lin, Vijay Varadharajan. 6-13 [doi]
- RATING: Rigorous Assessment of Trust in Identity ManagementRajarajan Sampath, Deepak Goel. 14-23 [doi]
- Provably Secure Anonymous Access Control for Heterogeneous TrustsKilho Shin, Hiroshi Yasuda. 24-33 [doi]
- A Secure Event Agreement (SEA) protocol for peer-to-peer gamesAmy Beth Corman, Scott Douglas, Peter Schachte, Vanessa Teague. 34-41 [doi]
- Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay NetworksYoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido, S. Misbah Deen. 42-49 [doi]
- Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical SignaturesAlexander Zangerl. 50-57 [doi]
- Censorship-Resistant and Anonymous P2P FilesharingRegine Endsuleit, Thilo Mie. 58-65 [doi]
- A Dependable Device Discovery Approach for Pervasive Computing MiddlewareSheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri. 66-73 [doi]
- Single sign-on framework for AAA operations within commercial mobile networksSaber Zrelli, Yoichi Shinoda. 74-81 [doi]
- A Selector Method for Providing Mobile Location Estimation Services within a Radio Cellular NetworkJunYang Zhou, Joseph Kee-Yin Ng. 82-89 [doi]
- Guidelines for Biometric Recognition in Wireless System for Payment ConfirmationLeon Grabensek, Sasa Divjak. 90-99 [doi]
- An Extended Verifiable Secret Redistribution Protocol for Archival SystemsV. H. Gupta, K. Gopinath. 100-107 [doi]
- Analysis of Current VPN TechnologiesThomas Berger. 108-115 [doi]
- Integration of Quantum Cryptography in 802.11 NetworksThi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie. 116-123 [doi]
- Availability Constraints for Avionic Data BusesAlban Gabillon, Laurent Gallon. 124-131 [doi]
- Securing DNS Services through System Self Cleansing and Hardware EnhancementsYih Huang, David Arsenault, Arun Sood. 132-139 [doi]
- Personalized Security for E-ServicesGeorge Yee. 140-147 [doi]
- Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous NetworksJuan Vera del Campo, Josep Pegueroles, Miguel Soriano. 148-155 [doi]
- Towards a Stochastic Model for Integrated Security and Dependability EvaluationKarin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog. 156-165 [doi]
- A Novel Artificial-Immune-Based Approach for System-Level Fault DiagnosisMourad Elhadef, Shantanu Das, Amiya Nayak. 166-173 [doi]
- Sandboxing in myKlaimRené Rydhof Hansen, Christian W. Probst, Flemming Nielson. 174-181 [doi]
- Evaluation of Network Robustness for Given Defense Resource Allocation StrategiesY.-S. Lin, P.-H. Tsang, C.-H. Chen, C.-L. Tseng, Y.-L. Lin. 182-189 [doi]
- Proxy Oblivious Transfer ProtocolGang Yao, Dengguo Feng. 190-197 [doi]
- Providing Response Identity and Authentication in IP TelephonyFeng Cao, Cullen Jennings. 198-205 [doi]
- Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service CompositionJudith E. Y. Rossebø, Rolv Bræk. 206-215 [doi]
- An Optimal Round Two-Party Password-Authenticated Key Agreement ProtocolMaurizio Adriano Strangio. 216-223 [doi]
- A Method for the Identification of Inaccuracies in Pupil SegmentationHugo Proença, Luís A. Alexandre. 224-228 [doi]
- Availability Enforcement by Obligations and Aspects IdentificationFrédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard. 229-239 [doi]
- An integral IT continuity framework for undisrupted business operationsR. W. Helms, S. Van Oorschot, J. Herweijer, M. Plas. 240-244 [doi]
- Highly Adaptable Dynamic Quorum Schemes for Managing Replicated DataChristian Storm, Oliver E. Theel, Carl von Ossietzky. 245-253 [doi]
- High Availability support for the design of stateful networking equipmentsPablo Neira Ayuso, Laurent Lefèvre, Rafael M. Gasca. 254-261 [doi]
- A Hybrid Network Intrusion Detection Technique Using Random ForestsJiong Zhang, Mohammad Zulkernine. 262-269 [doi]
- Identifying Intrusions in Computer Networks with Principal Component AnalysisWei Wang, Roberto Battiti. 270-279 [doi]
- Systematic Error Detection for RFID ReliabilitySozo Inoue, Hiroto Yasuura, Daisuke Hagiwara. 280-286 [doi]
- Feasibility of Multi-Protocol AttacksCas J. F. Cremers. 287-294 [doi]
- Diversity to Enhance Autonomic Computing Self-ProtectionMichael Jarrett, Rudolph E. Seviora. 295-299 [doi]
- Reliability Forecasting in Complex Hardware/Software SystemsJavier Cano, David Rios. 300-304 [doi]
- Availability Modeling and Analysis on High Performance Cluster Computing SystemsHertong Song, Chokchai Leangsuksun, Raja Nassar. 305-313 [doi]
- Schedulability Driven Security Optimization in Real-time SystemsMan Lin, Laurence Tianruo Yang. 314-320 [doi]
- Ensuring Privacy for E-Health ServicesGeorge Yee, Larry Korba, Ronggong Song. 321-328 [doi]
- The Security Issue of Federated Data Warehouses in the Area of Evidence-Based MedicineNevena Stolba, Marko Banek, A. Min Tjoa. 329-339 [doi]
- Secrecy forever? Analysis of Anonymity in Internet-based Voting ProtocolsMelanie Volkamer, Robert Krimmer. 340-347 [doi]
- A Practical Framework for Dynamically Immunizing Software Security VulnerabilitiesZhiqiang Lin, Bing Mao, Li Xie. 348-357 [doi]
- A Study of Security Architectural PatternsDavid G. Rosado, Eduardo Fernández-Medina, Mario Piattini, Carlos Gutiérrez. 358-365 [doi]
- Workshop-based Multiobjective Security Safeguard SelectionThomas Neubauer, Christian Stummer, Edgar Weippl. 366-373 [doi]
- Towards a Security Architecture for Vehicular Ad Hoc NetworksKlaus Plößl, Thomas Nowey, Christian Mletzko. 374-381 [doi]
- Improving Security Management through Passive Network ObservationYohann Thomas, Hervé Debar, Benjamin Morin. 382-389 [doi]
- Digital Signatures for Modifiable CollectionsSerge Abiteboul, Bogdan Cautis, Amos Fiat, Tova Milo. 390-399 [doi]
- A System Architecture for Enhanced Availability of Tightly Coupled Distributed SystemsJohannes Osrael, Lorenz Froihofer, Karl M. Göschka, Stefan Beyer, Pablo Galdámez, Francesc D. Muñoz-Escoí. 400-407 [doi]
- DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object SystemsStefan Beyer, Alexander Sanchez, Francesc D. Muñoz-Escoí, Pablo Galdámez. 408-415 [doi]
- Defense trees for economic evaluation of security investmentsStefano Bistarelli, Fabio Fioravanti, Pamela Peretti. 416-423 [doi]
- Proposed Framework for Achieving Interoperable Services Between European Public AdministrationsAmir Hayat, Thomas Rossler, Muhammad Alam. 424-431 [doi]
- Gait Recognition Using Acceleration from MEMSDavrondzhon Gafurov, Kirsi Helkala, Torkjel Søndrol. 432-439 [doi]
- Making Web Services DependableLouise E. Moser, P. M. Melliar-Smith, Wenbing Zhao. 440-448 [doi]
- A Simple Component Connection Approach for Fault Tree Conversion to Binary Decision DiagramR. Remenyte, J. D. Andrews. 449-457 [doi]
- Secure Business Process Management: A RoadmapThomas Neubauer, Markus D. Klemen, Stefan Biffl. 457-464 [doi]
- Supporting Attribute-based Access Control with OntologiesTorsten Priebe, Wolfgang Dobmeier, Nora Kamprath. 465-472 [doi]
- Diagnosis of Complex Systems Using Ant Colony Decision Petri NetsCalin Ciufudean, Adrian Graur, Constantin Filote, Cornel Turcu, Valentin Popa. 473-481 [doi]
- A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter?Marc Conrad, Tim French, Wei Huang, Carsten Maple. 482-487 [doi]
- Secure 3G User Authentication in Adhoc Serving NetworksArjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard Barolli. 488-495 [doi]
- Security Analysis for IP-based Government Emergency Telephony ServiceFeng Cao, Saadat Malik. 496-501 [doi]
- Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS)Muhammad Sher, Thomas Magedanz, Walter T. Penzhorn. 502-509 [doi]
- Privacy threats and issues in mobile RFIDHyangjin Lee, Jeeyeon Kim. 510-514 [doi]
- A Framework of Survivability Model for Wireless Sensor NetworkDong Seong Kim, Khaja Mohammad Shazzad, Jong Sou Park. 515-522 [doi]
- Mitigating Denial of Service Threats in GSM NetworksValer Bocan, Vladimir Cretu. 523-528 [doi]
- Achieving Availability and Reliability in Wireless Sensor Networks ApplicationsAmirhosein Taherkordi, Majid Alkaee Taleghan, Mohsen Sharifi. 529-535 [doi]
- Secure Enhanced Wireless Transfer ProtocolJin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang. 536-543 [doi]
- Quality of Password Management PolicyCarlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini. 544-550 [doi]
- A Proposal of An Anonymous Authentication Method For Flat-rate ServiceYoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji. 551-557 [doi]
- Recovery Mechanism of Online Certification Chain in Grid ComputingMingChu Li, Hongyan Yao, Jianbo Ma. 558-562 [doi]
- PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical ModelCristina Satizábal, Rafael Páez, Jordi Forné. 563-570 [doi]
- Recovery Mechanism of Cooperative Process Chain in GridMingChu Li, Hongyan Yao. 571-576 [doi]
- Run-Time Detection of Covert ChannelsNaoyuki Nagatou, Takuo Watanabe. 577-584 [doi]
- Practical Approach of a Secure Management System based on ISO/IEC 17799Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini. 585-592 [doi]
- Testing Complex Business Process SolutionsGerd Saurer, Alexander Schatten. 593-600 [doi]
- Deontic Relevant Logic as the Logical Basis for Specifying, Verifying, and Reasoning about Information Security and Information AssuranceJingde Cheng, Junichi Miura. 601-608 [doi]
- Resource Management Continuity With Constraint Inheritance RelationZude Li, Guoqiang Zhan, Xiaojun Ye. 609-616 [doi]
- On the Reliability of Web Clusters with Partial Replication of ContentsJosé Daniel García, Jesús Carretero, Javier Fernández, Félix García, David E. Singh, Alejandro Calderón. 617-624 [doi]
- Reliability Modeling Strategy of an Industrial SystemS. M. Rizwan, K. P. Ramachandran. 625-630 [doi]
- Persistent Computing Systems as Continuously Available, Reliable, and Secure SystemsJingde Cheng. 631-638 [doi]
- Active/Active Replication for Highly Available HPC System ServicesChristian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin (Ben) He. 639-645 [doi]
- Towards an Integrated Conceptual Model of Security and DependabilityErland Jonsson. 646-653 [doi]
- A Comparison of the Common Criteria with Proposals of Information Systems Security RequirementsDaniel Mellado, Eduardo Fernández-Medina, Mario Piattini. 654-661 [doi]
- Secure and Reliable Java-Based Middleware - Challenges and SolutionsWalter Binder. 662-669 [doi]
- Security Requirement with a UML 2.0 ProfileAlfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. 670-677 [doi]
- Representing levels of abstraction to facilitate the Secure Multidimensional ModelingRodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo. 678-684 [doi]
- Modeling permissions in a (U/X)ML worldMuhammad Alam, Ruth Breu, Michael Hafner. 685-692 [doi]
- Application of the Digraph Method in System Fault DiagnosticsE. M. Kelly, L. M. Bartlett. 693-700 [doi]
- No Risk is Unsafe: Simulated Results on Dependability of Complementary CurrenciesKenji Saito, Eiichi Morino, Jun Murai. 701-708 [doi]
- A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerceChristian Schläger, Thomas Nowey, José A. Montenegro. 709-716 [doi]
- Achieving Fairness and Timeliness in a Previous Electronic Contract Signing ProtocolMagdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger. 717-722 [doi]
- Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDFThomas Neubauer, Edgar Weippl, Stefan Biffl. 723-731 [doi]
- Efficient Link Failure Detection and Localization using P2P-Overlay NetworksBarbara Emmert, Andreas Binzenhöfer. 732-739 [doi]
- Replication Strategies for Reliable Decentralised StorageMatthew Leslie, Jim Davies, Todd Huffman. 740-747 [doi]
- Multipath Key Exchange on P2P NetworksYuuki Takano, Naoki Isozaki, Yoichi Shinoda. 748-755 [doi]
- Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-RegistrationJochen Dinger, Hannes Hartenstein. 756-763 [doi]
- Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer SystemsKenji Saito, Eiichi Morino, Jun Murai. 764-771 [doi]
- Ecosystem of Naming Systems: Discussions on a Framework to Induce Smart Space Naming Systems DevelopmentYusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Tomohiro Ishihara, Yojiro Uo. 772-778 [doi]
- Deriving Ratings Through Social Network StructuresHameeda Alshabib, Omer F. Rana, Ali Shaikh Ali. 779-787 [doi]
- Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability UncertaintyChristophe Simon, Philippe Weber. 788-793 [doi]
- Multi-Agent Causal Models for Dependability AnalysisSam Maes, Philippe Leray. 794-798 [doi]
- Computing Multiple Diagnoses in Large Devices Using Bayesian NetworksVeronique Delcroix, Mohamed-Amine Maalej, Sylvain Piechowiak. 799-803 [doi]
- Automatically Translating Dynamic Fault Trees into Dynamic Bayesian Networks by Means of a Software ToolStefania Montani, Luigi Portinale, Andrea Bobbio, Daniele Codetta Raiteri. 804-809 [doi]
- Modeling the Reliability of Search and Rescue Operations within the UK Through Bayesian Belief NetworksAshley Russell, John Quigley, Robert Van der Meer. 810-816 [doi]
- Modeling Dependable Systems using Hybrid Bayesian NetworksMartin Neil, Manesh Tailor, Norman E. Fenton, David Marquez, Peter Hearty. 817-823 [doi]
- An Architecture for Service Discovery Based on Capability MatchingJaka Mocnik, Piotr Karwaczynski. 824-831 [doi]
- A Declarative Control Language for Dependable XML Message QueuesAlexander Böhm 0002, Carl-Christian Kanne, Guido Moerkotte. 832-839 [doi]
- Timed Modelling and Analysis in Web Service CompositionsRaman Kazhamiakin, Paritosh K. Pandya, Marco Pistore. 840-846 [doi]
- Web Service Discovery, Replication, and Synchronization in Ad-Hoc NetworksLukasz Juszczyk, Jaroslaw Lazowski, Schahram Dustdar. 847-854 [doi]
- Evaluating Certification Protocols in the Partial Database State MachineA. Sousa, Alfrânio Correia Jr., Francisco Moura, José Pereira, Rui Carlos Oliveira. 855-863 [doi]
- A Secure E-Exam Management SystemJordi Castellà-Roca, Jordi Herrera-Joancomartí, Aleix Dorca-Josa. 864-871 [doi]
- Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical AspectsElke Franz, Katrin Borcea-Pfitzmann. 872-878 [doi]
- Access Control in a Privacy-Aware eLearning EnvironmentElke Franz, Hagen Wahrig, Alexander Boettcher, Katrin Borcea-Pfitzmann. 879-886 [doi]
- Adding Security to a Multiagent Learning PlatformCarine Webber, Maria de Fátima Webber do Prado Lima, Marcos E. Casa, Alexandre M. Ribeiro. 887-894 [doi]
- Unlocking Repositories: Federated Security Solution for Attribute and Policy Based Access to Repositories via Web ServicesMarek Hatala, Ty Mey Eap, Ashok Shah. 895-903 [doi]
- Offline Internet Banking Fraud DetectionVasilis Aggelis. 904-905 [doi]
- Practical Approaches for Analysis, Visualization and Destabilizing Terrorist NetworksNasrullah Memon, Henrik Legind Larsen. 906-913 [doi]
- Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse MetamodelEmilio Soler, Rodolfo Villarroel, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. 914-921 [doi]
- A 2:::d:::-Tree-Based Blocking Method for Microaggregating Very Large Data SetsAgusti Solanas, Antoni Martínez-Ballesté, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz. 922-928 [doi]
- Using A Bayesian Averaging Model for Estimating the Reliability of Decisions in Multimodal BiometricsCarsten Maple, Vitaly Schetinin. 929-935 [doi]
- On Efficiency and Data Privacy Level of Association Rules Mining Algorithms within Parallel Spatial Data WarehouseMarcin Gorawski, Karol Stachurski. 936-943 [doi]
- Dependability in Data Mining: A Perspective from the Cost of Making DecisionsH. Michael Chung. 944-949 [doi]
- Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES ProjectRichard O. Sinnott, Micha Bayer, A. J. Stell, Jos Koetsier. 950-957 [doi]
- The Usability and Practicality of Biometric Authentication in the WorkplaceCarsten Maple, Peter Norrington. 958-964 [doi]
- Building an Encrypted File System on the EGEE grid: Application to Protein Sequence AnalysisChristophe Blanchet, Rémi Mollon, Gilbert Deléage. 965-973 [doi]
- The knowledge pressure on Risk and Security managers is increasingChrister Magnusson, Heidi Ola, Camilla Silversjo Holmqvist. 974-979 [doi]
- Validation of IT-Security Measurement ToolsRuedi Baer, Martin Dietrich. 980-981 [doi]
- Risk Management approach on identity theft in biometric systems contextSabine Delaître. 982 [doi]
- E-voting: Dependability Requirements and Design for DependabilityJeremy Bryans, Bev Littlewood, Peter Y. A. Ryan, Lorenzo Strigini. 988-995 [doi]
- Defining Criteria for Rating an Entity s Trustworthiness Based on Its Certificate PolicyOmar Batarfi, Lindsay Marshall. 996-1003 [doi]
- A Component Based Software Architecture for E-Government ApplicationsDaniel Beer, Raphael Kunis, Gudula Rünger. 1004-1011 [doi]
- Designing mutual-aid model for RAQ (Rarely Asked Question) in e-Government: Practical use of anonymityAkiko Orita. 1012-1016 [doi]
- Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to addressRob Peters, Pim Jorg, Marco Meesters, Marcel Hoogwout, Edwin Stuart. 1017-1024 [doi]
- Choosing the Right Wireless LAN Security Protocol for the Home and Business UserCarsten Maple, Helen Jacobs, Matthew Reeve. 1025-1032 [doi]
- An ontology for secure e-government applicationsMaria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas. 1033-1037 [doi]
- Building governments in e-government: settlement of trusted e-oligarchySemir Daskapan. 1038-1044 [doi]