Abstract is missing.
- A Security Decision-Reaction Architecture for Heterogeneous Distributed NetworkChristophe Feltus, Djamel Khadraoui, Jocelyn Aubert. 1-8 [doi]
- Dual-Level Attack Detection and Characterization for Networks under DDoSAnjali Sardana, Ramesh Chandra Joshi. 9-16 [doi]
- Improving Effectiveness of Intrusion Detection by Correlation Feature SelectionHai Nguyen, Katrin Franke, Slobodan Petrovic. 17-24 [doi]
- Analytical Approach to Attack Graph Analysis for Network SecurityPhongphun Kijsanayothin, Rattikorn Hewett. 25-32 [doi]
- Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet LossGregory Epiphaniou, Carsten Maple, Paul Sant, Matthew Reeve. 33-40 [doi]
- A Computer Architecture with Hardwarebased Malware DetectionKlaus Hildebrandt, Igor Podebrad, Bernd Klauer. 41-45 [doi]
- Solving the Transitive Access Problem for the Services Oriented ArchitectureAlan H. Karp, Jun Li. 46-53 [doi]
- Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based CryptographyByoungcheon Lee. 54-61 [doi]
- Secure Bindings of SAML Assertions to TLS SessionsFlorian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek. 62-69 [doi]
- From Contextual Permission to Dynamic Pre-obligation: An Integrated ApproachYehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia. 70-78 [doi]
- 2-clickAuthAnna Vapen, David Byers, Nahid Shahmehri. 79-86 [doi]
- Architecture-Aware Adaptive Deployment of Contextual Security PoliciesStere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Laurent Toutain. 87-95 [doi]
- Using Smart Cards for Tamper-Proof Timestamps on Untrusted ClientsGuenther Starnberger, Lorenz Froihofer, Karl M. Göschka. 96-103 [doi]
- A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database SystemsAlex Hai Wang, Su Yan, Peng Liu. 104-111 [doi]
- FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor NetworksFatima-Zohra Benhamida, Yacine Challal. 112-118 [doi]
- An Adaptive Redundancy Oriented Method to Tolerate Soft Errors in SRAM-Based FPGAs Using Unused ResourcesSomayeh Bahramnejad, Hamid R. Zarandi. 119-124 [doi]
- Analysis of Transient Faults on a MIPS-Based Dual-Core ProcessorIman Faraji, Moslem Didehban, Hamid R. Zarandi. 125-130 [doi]
- Visualizing Past Personal Data DisclosuresJan Kolter, Michael Netter, Günther Pernul. 131-139 [doi]
- Strategies for Reducing Risks of Inconsistencies in Access Control PoliciesBernard Stepien, Stan Matwin, Amy P. Felty. 140-147 [doi]
- Multi-dimensional Uncertainty Analysis in Secure and Dependable DomainYudistira Asnar, Paolo Giorgini. 148-155 [doi]
- Information Flow in Disaster Management SystemsAchim D. Brucker, Dieter Hutter. 156-163 [doi]
- Formal Specification and Analysis of an E-voting SystemKomminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita. 164-171 [doi]
- Towards a Privacy-Enhanced Social Networking SiteEsma Aïmeur, Sébastien Gambs, Ai Ho. 172-179 [doi]
- A Formal Approach Towards Risk-Aware Service Level Analysis and PlanningStefan Jakoubi, Simon Tjoa, Sigrun Goluch, Gerhard Kitzler. 180-187 [doi]
- Threat- and Risk-Analysis During Early Security Requirements EngineeringHolger Schmidt. 188-195 [doi]
- An Analysis of Information Security Awareness within Home and Work EnvironmentsShuhaili Talib, Nathan L. Clarke, Steven Furnell. 196-203 [doi]
- Trust Based Multi Path DSR ProtocolPoonam Gera, Kumkum Garg, Manoj Misra. 204-209 [doi]
- Enhanced Chaotic Stream Cipher for WSNsRui Miguel Soares Silva, Rui Gustavo Nunes Pereira Crespo, Mário Serafim dos Santos Nunes. 210-215 [doi]
- Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code AlgorithmsA. A. Adekunle, S. R. Woodhead. 216-221 [doi]
- A Semantic Security Architecture for Web ServicesStefan Durbeck, Christoph Fritsch, Günther Pernul, Rolf Schillinger. 222-227 [doi]
- FedWare: Middleware Services to Cope with Information Consistency in Federated Identity ManagementThorsten Höllrigl, Jochen Dinger, Hannes Hartenstein. 228-235 [doi]
- Owner-Based Role-Based Access Control OB-RBACMohsen Saffarian, Babak Sadighi. 236-241 [doi]
- Program Obfuscation by Strong CryptographyZeljko Vrba, PÃ¥l Halvorsen, Carsten Griwodz. 242-247 [doi]
- Pitfalls in Formal Reasoning about Security ProtocolsNina Moebius, Kurt Stenzel, Wolfgang Reif. 248-253 [doi]
- Secure Group Communication Using Fractional Public KeysSigurd Eskeland, Vladimir A. Oleshchuk. 254-257 [doi]
- Extending the Gordon and Loeb Model for Information Security InvestmentJan Willemson. 258-261 [doi]
- Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical InfrastructuresJocelyn Aubert, Thomas Schaberreiter, Christophe Incoul, Djamel Khadraoui, Benjamin Gâteau. 262-267 [doi]
- Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management ApproachSimon Tjoa, Stefan Jakoubi, Sigrun Goluch, Gerhard Kitzler. 268-274 [doi]
- Security and Usability: Analysis and EvaluationRonald Kainda, Ivan Flechais, A. W. Roscoe. 275-282 [doi]
- Recovery of Skype Application Activity Data from Physical MemoryMatthew Simon, Jill Slay. 283-288 [doi]
- Rejuvenating High Available Virtualized SystemsArash Rezaei, Mohsen Sharifi. 289-294 [doi]
- Detection of Spyware by Mining Executable FilesRaja Khurram Shahzad, Syed Imran Haider, Niklas Lavesson. 295-302 [doi]
- A Probabilistic Approach for On-Line Sum-AuditingGerardo Canfora, Bice Cavallo. 303-308 [doi]
- Towards an Ontology-Based Solution for Managing License Agreement Using Semantic DesktopMansoor Ahmed, Amin Anjomshoaa, Muhammad Asfand-e-yar, A. Min Tjoa, Abid Khan. 309-314 [doi]
- Optimising IDS Sensor PlacementHao Chen, John A. Clark, Siraj A. Shaikh, Howard Chivers, Philip Nobles. 315-320 [doi]
- Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion DetectionNeminath Hubballi, Santosh Biswas, Sukumar Nandi. 321-326 [doi]
- Improving Network Intrusion Detection by Means of Domain-Aware Genetic ProgrammingJorge Blasco AlÃs, AgustÃn Orfila, Arturo Ribagorda. 327-332 [doi]
- On the Simulation of a Software Reputation SystemMartin Boldt, Anton Borg, Bengt Carlsson. 333-340 [doi]
- Model-Driven Application-Level Encryption for the Privacy of E-health DataYun Ding, Karsten Klein. 341-346 [doi]
- Communal Reputation and Individual Trust (CRIT) in Wireless Sensor NetworksTanveer Zia, Md Zahidul Islam. 347-352 [doi]
- A Multi-stage Methodology for Ensuring Appropriate Security Culture and GovernanceSolange Ghernaouti-Helie, Igli Tashi, David Simms. 353-360 [doi]
- Development of ICT Infrastructure for Local Socio-Economic System in JapanHiroshi Nagano. 361-369 [doi]
- A National Strategy for an Effective Cybersecurity Approach and CultureSolange Ghernaouti-Helie. 370-373 [doi]
- Choosing Authentication Techniques in E-procurement System in SerbiaMilos Milovanovic, Marija Bogicevic, Miroslav Lazovic, Dejan B. Simic, Dusan Starcevic. 374-379 [doi]
- A Continuous Authentication System Based on User Behavior AnalysisInes Brosso, Alessandro La Neve, Graça Bressan, Wilson Vicente Ruggiero. 380-385 [doi]
- Identifying Security Relevant Warnings from Static Code Analysis Tools through Code TaintingDejan Baca. 386-390 [doi]
- Reselling Digital ContentLaila El Aimani, Yona Raekow. 391-396 [doi]
- A New DRM Architecture with Strong EnforcementSascha Müller, Stefan Katzenbeisser. 397-403 [doi]
- A Secure and Scalable Grid-Based Content Management SystemBenjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo, Silvio Causetti. 404-409 [doi]
- A Design Pattern for Event-Based Processing of Security-Enriched SOAP MessagesNils Gruschka, Meiko Jensen, Luigi Lo Iacono. 410-415 [doi]
- Challenging IS and ISM Standardization for Business BenefitsJuhani Anttila, Jorma Kajava. 416-421 [doi]
- Managing the Asset Risk of SMEsLuÃs Enrique Sanchez, Carlos Ruiz, Eduardo Fernández-Medina, Mario Piattini. 422-429 [doi]
- A Generic Metamodel for IT SecurityAndré Miede, Nedislav Nedyalkov, Christian Gottron, André König, Nicolas Repp, Ralf Steinmetz. 430-437 [doi]
- Combining Misuse Cases with Attack Trees and Security Activity ModelsInger Anne Tøndel, Jostein Jensen, Lillian Røstad. 438-445 [doi]
- External Insider Threat: A Real Security Challenge in Enterprise Value WebsVirginia N. L. Franqueira, André van Cleeff, Pascal van Eck, Roel Wieringa. 446-453 [doi]
- Secure Monitoring of Service Level AgreementsK. P. Clark, Martijn Warnier, Frances M. T. Brazier, Thomas B. Quillinan. 454-461 [doi]
- Fighting Phishing with Trusted EmailJordan Crain, Lukasz Opyrchal, Atul Prakash. 462-467 [doi]
- Application and Economic Implications of an Automated Requirement-Oriented and Standard-Based Compliance Monitoring and Reporting PrototypeMatthias Kehlenbeck, Thorben Sandner, Michael H. Breitner. 468-474 [doi]
- A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of ConceptLucie Langer, Axel Schmidt, Johannes Buchmann, Melanie Volkamer. 475-480 [doi]
- Secured Key Distribution Scheme for Cryptographic Key Management SystemKyawt Kyawt Khaing, Khin Mi Mi Aung. 481-486 [doi]
- One Size Fits None: The Importance of Detector ParameterizationNatasha Bodorik, A. Nur Zincir-Heywood. 487-494 [doi]
- Supporting Authorization Policy Modification in Agile Development of Web ApplicationsSteffen Bartsch. 495-500 [doi]
- The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software DevelopmentRichard Sasson, Martin Gilje Jaatun, Jostein Jensen. 501-506 [doi]
- Katana: A Hot Patching Framework for ELF ExecutablesAshwin Ramaswamy, Sergey Bratus, Sean W. Smith, Michael E. Locasto. 507-512 [doi]
- Investigating the Limitations of Java Annotations for Input ValidationFederico Mancini, Dag Hovland, Khalid A. Mughal. 513-518 [doi]
- Classification of Buffer Overflow Vulnerability MonitorsHossain Shahriar, Mohammad Zulkernine. 519-524 [doi]
- Configuration Fuzzing for Software Vulnerability DetectionHuning Dai, Christian Murphy, Gail E. Kaiser. 525-530 [doi]
- Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial ProjectChristian Jung, Frank Elberzhager, Alessandra Bagnato, Fabio Raiteri. 531-536 [doi]
- Security Modeling and Tool Support AdvantagesEgil Trygve Baadshaug, Gencer Erdogan, Per HÃ¥kon Meland. 537-542 [doi]
- Analysing and Visualising Security and Usability in IRISShamal Faily, Ivan Flechais. 543-548 [doi]
- Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery MechanismZiyad Al-Salloum, Stephen D. Wolthusen. 549-554 [doi]
- Model-Driven Security Patterns Application Based on Dependences among PatternsYuki Shiroma, Hironori Washizaki, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka. 555-559 [doi]
- Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating ThreatsMichael Netter, Eduardo B. Fernández, Günther Pernul. 560-564 [doi]
- Measuring the Level of Security Introduced by Security PatternsEduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Michael VanHilst. 565-568 [doi]
- Patterns for Secure Boot and Secure Storage in Computer SystemsHans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy. 569-573 [doi]
- A Consideration of the Reliability of Registration and Attribute ExchangeYoshio Kakizaki, Keiichi Iwamura. 574-579 [doi]
- Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based ServicesMinh-Triet Tran, Isao Echizen, Anh Duc Duong. 580-585 [doi]
- Multiple Designated Verifiers Signatures ReconsideredMebae Ushida, Tetsuya Izu, Masahiko Takenaka, Kazuo Ohta. 586-590 [doi]
- LSM-Based Secure System Monitoring Using Kernel Protection SchemesTakamasa Isohara, Keisuke Takemori, Yutaka Miyake, Ning Qu, Adrian Perrig. 591-596 [doi]
- Formalization of Viruses and Malware Through Process AlgebrasGrégoire Jacob, Eric Filiol, Hervé Debar. 597-602 [doi]
- Heuristics for Detecting Botnet Coordinated AttacksKazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, Masashi Fujiwara. 603-607 [doi]
- An Improvement of Robustness Against Physical Attacks and Equipment Independence in Information Hiding Based on the Artificial Fiber PatternKitahiro Kaneda, Yuki Fujii, Keiichi Iwamura, Seiichiro Hangai. 608-612 [doi]
- Large Scale Demonstration Experiments Towards Acheiving Practical Traceback on the InternetKen Wakasa, Hiroaki Hazeyama, Toshifumi Kai, Akira Hashiguchi, Masaya Yamagata, Masahiko Fujinaga, Ryunosuke Ohshima, Takashi Shintani. 613-618 [doi]
- Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy ChannelsAtsushi Waseda, Masahide Sasaki, Masahiro Takeoka, Mikio Fujiwara, Morio Toyoshima, Hidema Tanaka. 619-624 [doi]
- Experimental Results on Cheon s AlgorithmTetsuya Izu, Masahiko Takenaka, Masaya Yasuda. 625-628 [doi]
- The Explore, Investigate and Correlate (EIC) Conceptual Framework for Digital Forensics Information VisualisationGrant Osborne, Benjamin Turnbull, Jill Slay. 629-634 [doi]
- A Model for Computer ProfilingAndrew Marrington, George M. Mohay, Hasmukh Morarji, Andrew Clark. 635-640 [doi]
- Using Normalized Compression Distance for Classifying File FragmentsStefan Axelsson. 641-646 [doi]
- A Multi-component View of Digital ForensicsTalania Grobler, C. P. Louwrens, Sebastiaan H. von Solms. 647-652 [doi]
- Blind Steganalysis: A Countermeasure for Binary Image SteganographyChiew Kang Leng, Josef Pieprzyk. 653-658 [doi]
- Log Analysis Towards an Automated Forensic Diagnosis SystemJorge HerrerÃas Guerrero, Roberto Gómez Cárdenas. 659-664 [doi]
- A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic ToolsYinghua Guo, Jill Slay. 665-670 [doi]
- A Complexity Based Model for Quantifying Forensic Evidential ProbabilitiesRichard E. Overill, Jantje A. M. Silomon, Kam-Pui Chow. 671-676 [doi]
- A Framework to Guide the Implementation of Proactive Digital Forensics in OrganisationsTalania Grobler, C. P. Louwrens, Sebastiaan H. von Solms. 677-682 [doi]
- Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels SteganographyChiew Kang Leng, Josef Pieprzyk. 683-688 [doi]
- Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI)Jason Howarth, Irfan Altas, Barney Dalgarno. 689-695 [doi]
- A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation ResultsMaximilian Bielecki, Gerald Quirchmayr. 696-701 [doi]
- A Novel Image Hiding Scheme Using Content Aware Seam Carving MethodZahra Toony, Mansour Jamzad. 702-707 [doi]