Abstract is missing.
- An Approach to Access Control under UncertaintyFarzad Salim, Jason Reid, Ed Dawson, Uwe Dulleck. 1-8 [doi]
- Support Access to Distributed EPRs with Three Levels of Identity Privacy PreservationRima Addas, Ning Zhang. 9-16 [doi]
- Smatch Model: Extending RBAC Sessions in Virtualization EnvironmentNora Cuppens-Boulahia, Frédéric Cuppens, Marie Nuadi. 17-26 [doi]
- AW-RBAC: Access Control in Adaptive Workflow SystemsMaria Leitner, Stefanie Rinderle-Ma, Jürgen Mangler. 27-34 [doi]
- The Role Mining Process Model - Underlining the Need for a Comprehensive Research PerspectiveLudwig Fuchs, Stefan Meier. 35-42 [doi]
- Biometric Authentication as a Service for Enterprise Identity Management Deployment: A Data Protection PerspectiveChristian Senk, Florian Dotzler. 43-50 [doi]
- An Obfuscation-Based Approach against Injection AttacksFabrizio Baiardi, Daniele Sgandurra. 51-58 [doi]
- Using CVSS in Attack GraphsLaurent Gallon, Jean-Jacques Bascou. 59-66 [doi]
- Selecting Software Packages for Secure Database InstallationsAfonso Araújo Neto, Marco Vieira. 67-74 [doi]
- Probabilistic Fault-tolerance of Distributed Services: A Paradigm for Dependable ApplicationsKaliappa Ravindran. 75-82 [doi]
- Proactive Failure Management by Integrated Unsupervised and Semi-Supervised Learning for Dependable Cloud SystemsQiang Guan, Ziming Zhang, Song Fu. 83-90 [doi]
- A Novel Phase Coding Technique for Steganography in Auditive MediaMarcus Nutzinger, Juergen Wurzer. 91-98 [doi]
- ESPOON: Enforcing Encrypted Security Policies in Outsourced EnvironmentsMuhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo. 99-108 [doi]
- A Robust Anti-tamper Protection SchemeHing-Chung Tsang, Moon-Chuen Lee, Chi-Man Pun. 109-118 [doi]
- Formalization of Receipt-Freeness in the Context of Electronic VotingKatharina Bräunlich, Rüdiger Grimm. 119-126 [doi]
- Introducing Verifiability in the POLYAS Remote Electronic Voting SystemMaina M. Olembo, Patrick Schmidt, Melanie Volkamer. 127-134 [doi]
- Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square RootsYves Igor Jerschow, Martin Mauve. 135-142 [doi]
- Declassification Policy Management in Dynamic Information SystemsJulien A. Thomas, Nora Cuppens-Boulahia, Frédéric Cuppens. 143-152 [doi]
- ASPF: Adaptive anti-SPIT Policy-based FrameworkYannis Soupionis, Dimitris Gritzalis. 153-160 [doi]
- Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward NetsErmeson C. Andrade, Fumio Machida, Dong Seong Kim, Kishor S. Trivedi. 161-168 [doi]
- Early Detection of Security Misconfiguration Vulnerabilities in Web ApplicationsBirhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam. 169-174 [doi]
- Implicit Buffer Overflow Protection Using Memory SegregationBrent G. Roth, Eugene H. Spafford. 175-182 [doi]
- Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine FeasibilityMatthew Simon, Jill Slay. 183-188 [doi]
- Accurate Adware Detection Using Opcode Sequence ExtractionRaja Khurram Shahzad, Niklas Lavesson, Henric Johnson. 189-195 [doi]
- Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital EvidenceGrant Osborne, Jill Slay. 196-201 [doi]
- Security SLAs for Federated Cloud ServicesKarin Bernsmed, Martin Gilje Jaatun, Per Håkon Meland, Astrid Undheim. 202-209 [doi]
- Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash EventSajal Bhatia, George M. Mohay, Alan Tickle, Ejaz Ahmed. 210-217 [doi]
- Observer-based Testing of Distributed Protocols Designed for Harsh EnvironmentsKaliappa Ravindran, Gwangyu Ding. 218-223 [doi]
- Trustworthiness Benchmarking of Web Applications Using Static Code AnalysisAfonso Araújo Neto, Marco Vieira. 224-229 [doi]
- A Trustworthy Usage Control Enforcement FrameworkRicardo Neisse, Alexander Pretschner, Valentina Di Giacomo. 230-235 [doi]
- An Attribute Based Framework for Risk-Adaptive Access Control ModelsSavith Kandala, Ravi S. Sandhu, Venkata Bhamidipati. 236-241 [doi]
- ACON: Activity-Centric Access Control for Social ComputingJaehong Park, Ravi S. Sandhu, Yuan Cheng. 242-247 [doi]
- Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right ManagementCédric Bonhomme, Christophe Feltus, Michaël Petit. 248-253 [doi]
- A Hypervisor-Based Bus System for Usage ControlCornelius Moucha, Enrico Lovat, Alexander Pretschner. 254-259 [doi]
- An Approach to Model-based Development of Secure and Reliable SystemsEduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Michael VanHilst. 260-265 [doi]
- Techniques for Automating Policy Specification for Application-oriented Access ControlsZ. Cliffe Schreuders, Christian Payne, Tanya McGill. 266-271 [doi]
- Model-Based Security Verification and Testing for Smart-cardsElizabeta Fourneret, Martín Ochoa, Fabrice Bouquet, Julien Botella, Jan Jürjens, Parvaneh Yousefi. 272-279 [doi]
- Information Security Automation: How Far Can We Go?Raydel Montesino, Stefan Fenz. 280-285 [doi]
- An Epistemic Logic Based Framework for Reasoning about Information HidingI. Goriac. 286-293 [doi]
- Bulletin Boards in Voting Systems: Modelling and Measuring PrivacyHugo Jonker, Jun Pang. 294-300 [doi]
- System State Discovery Via Information Content Clustering of System LogsAdetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. 301-306 [doi]
- File Block Classification by Support Vector MachineLuigi Sportiello, Stefano Zanero. 307-312 [doi]
- Security and Privacy in Companies: State-of-the-art and Qualitative AnalysisBarbara Krumay, Marie Caroline Oetzel. 313-320 [doi]
- Hidden Price of User Authentication: Cost Analysis and Stakeholder MotivationLudwig Meyer, Martin Auer, Markus D. Klemen, Stefan Biffl. 321-326 [doi]
- Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud ComputingKristian Beckers, Holger Schmidt, Jan-Christoph Küster, Stephan Faßbender. 327-333 [doi]
- Responsibility-driven Design and Development of Process-aware Security PoliciesMaria Leitner, Stefanie Rinderle-Ma, Juergen Mangler. 334-341 [doi]
- Fast Implementation of the Advanced Encryption Standard Using Atmega1281Kasumi Toriumi, Yoshio Kakizaki, Keiichi Iwamura. 342-346 [doi]
- Optimization of Privacy Preserving Mechanisms in Homogeneous Collaborative Association Rules MiningMarcin Gorawski, Zacheusz Siedlecki. 347-352 [doi]
- CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IPStefan Hofbauer, Gerald Quirchmayr, Christopher C. Wills. 353-358 [doi]
- Crowds Based on Secret-SharingStefan Rass, Raphael Wigoutschnigg, Peter Schartner. 359-364 [doi]
- A Gate Level Analysis of Transient Faults Effects on Dual-Core Chip-Multi ProcessorsMoslem Didehban, Ario Sadafi, Sajjad Salehi, Mohammad Bagher Chami. 365-370 [doi]
- Secure Broadcast with One-Time Signatures in Controller Area NetworksBogdan Groza, Pal-Stefan Murvay. 371-376 [doi]
- Performance Evaluation of ID-based Group Key Agreement ProtocolsElisavet Konstantinou, Eleni Klaoudatou, Pavlos Kamparmpakis. 377-384 [doi]
- Preliminary Thoughts on Cost-based Investment Decisions in IT: A Problem AnalysisRalf Gitzel, Christian Cuske, Carsten Munch. 385-389 [doi]
- On the Context-aware, Personalized Delivery of Process Information: Viewpoints, Problems, and RequirementsMarkus Hipp, Bela Mutschler, Manfred Reichert. 390-397 [doi]
- Study of Countermeasures for Content Leaks by Video RecordingMasaki Fujikawa, Junki Akimoto, Fumihiko Oda, Kengo Moriyasu, Shingo Fuchi, Yoshikazu Takeda. 398-403 [doi]
- Product Line Engineering in Large-Scale Lean and Agile Software Product Development Environments - Towards a Hybrid Approach to Decentral Control and Managed ReuseBenjamin Blau, Tobias Hildenbrand. 404-408 [doi]
- Seamless Fusion of Secure Software and Trusted USB Token for Protecting Enterprise & Government DataAsad M. Ali. 409-414 [doi]
- Considering Dependent Components in the Terminal Pair Reliability ProblemMinh Lê, Max Walter. 415-422 [doi]
- Cyber-Physical Systems Based Modeling of Dependability of Complex Network SystemsKaliappa Ravindran. 423-428 [doi]
- Compositional Synthesis of Temporal Fault Trees from State MachinesNidhal Mahmud, Martin Walker, Yiannis Papadopoulos. 429-435 [doi]
- Stepwise Refinement of Complex Dependability Models Using LARES+Max Walter. 436-441 [doi]
- Privacy Frost: A User-Oriented Data Anonymization ToolShinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka. 442-447 [doi]
- Key Management Scheme Applicable to Various Topologies of Sensor NetworksHidetoshi Yukimaru, Yoshio Kakizaki, Keiichi Iwamura. 448-453 [doi]
- An Inductive Approach to Provable AnonymityYongjian Li, Jun Pang. 454-459 [doi]
- Information Security for Service Oriented Computing: Ally or AntagonistJacqui Chetty, Marijke Coetzee. 460-465 [doi]
- Van Wijngaarden Grammars and MetamorphismGeoffroy Gueguen. 466-472 [doi]
- PUF Based Scalable Private RFID AuthenticationMete Akgün, M. Ufuk Çaglayan. 473-478 [doi]
- Practitioners' Perspectives on Security in Agile DevelopmentSteffen Bartsch. 479-484 [doi]
- Security Issues in a Synchronous e-Training PlatformJuan C. Granda, Pelayo Nuño, Daniel F. García, Francisco J. Suárez. 485-492 [doi]
- Some Security Issues in SCALANCE Wireless Industrial NetworksMarius Cristea, Bogdan Groza, Mihai Iacob. 493-498 [doi]
- Development and Trial Application of Prototype Program for "Social-MRC": Social Consensus Formation Support System Concerning IT Risk CountermeasuresRyôichi Sasaki, Kazushige Takakusaki, Masaru Ohkawara, Hiroshi Yajima, Hidetaka Masuda, Tetsuro Kobayashi. 499-506 [doi]
- Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and MitigationsPéter Kárpáti, Andreas L. Opdahl, Guttorm Sindre. 507-514 [doi]
- Proactive Detection of Kernel-Mode RootkitsPablo Bravo, Daniel F. García. 515-520 [doi]
- Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle SecurityAlbin Zuccato, Nils Daniels, Cheevarat Jampathom. 521-526 [doi]
- Effective Security Impact Analysis with Patterns for Software EnhancementTakao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka. 527-534 [doi]
- Web Services Security Policy Assertion Trade-offsTristan Lavarack, Marijke Coetzee. 535-540 [doi]
- Federated Authentication and Authorisation in the Social Science DomainJohn P. Watt, Richard O. Sinnott, George Inman, David W. Chadwick. 541-548 [doi]
- A Proposed Web Access Control System Request Policy Framework for Cooperation of DNS and a Web BrowserTakashi Uemura, Shota Takagi, Yusuke Kosuda, Ryoichi Sasaki. 549-554 [doi]
- An Identity-Centric Internet: Identity in the Cloud, Identity as a Service and Other DelightsMikaël Ates, Serge Ravet, Abakar Mohamat Ahmat, Jacques Fayolle. 555-560 [doi]
- Wormhole Attacks Mitigation in Ad Hoc NetworksMarianne A. Azer. 561-568 [doi]
- A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc NetworkGhenima Bourkache, Mohamed Mezghiche, Karim Tamine. 569-572 [doi]
- Tag Impersonation Attack on Two RFID Mutual Authentication ProtocolsMasoumeh Safkhani, Nasour Bagheri, Majid Naderi, Yiyuan Luo, Qi Chai. 581-584 [doi]
- Information Security Integral Engineering Technique and its Application in ISMS DesignAlexander V. Lyubimov, Dmitry V. Cheremushkin, Natalia Andreeva, Sergey Shustikov. 585-590 [doi]
- Optimal Budget Allocation in Budget-based Access ControlFarzad Salim, Uwe Dulleck, Jason Reid, Ed Dawson. 591-596 [doi]
- A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication TechnologiesMasaki Fujikawa, Masakatsu Nishigaki. 597-602 [doi]
- LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal InformationReza Rawassizadeh, Johannes Heurix, Soheil Khosravipour, A. Min Tjoa. 603-608 [doi]
- A Server-side Approach to Privacy Policy MatchingÅsmund Ahlmann Nyre, Karin Bernsmed, Solvar Bo, Stian Pedersen. 609-614 [doi]
- Enhance Data Privacy in Service Compositions through a Privacy ProxyZhendong Ma, Jurgen Manglery, Christian Wagner, Thomas Bleier. 615-620 [doi]
- Learning Privacy PreferencesInger Anne Tøndel, Åsmund Ahlmann Nyre, Karin Bernsmed. 621-626 [doi]
- Privacy Verification Using OntologiesMartin Kost, Johann Christoph Freytag, Frank Kargl, Antonio Kung. 627-632 [doi]
- A Survey on Saving Personal Data in the Mobile PhoneIosif Androulidakis, Gorazd Kandus. 633-638 [doi]
- Gaining Flexibility and Compliance in Rescue Processes with BPMKai Kittel, Stefan Sackmann. 639-644 [doi]
- Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of DisastersSebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara. 645-649 [doi]
- Improving Resilience with Community Cloud ComputingGerard Garlick. 650-655 [doi]
- A Visualization Method for Helping Children Assess the Risk of WebsitesTomoko Kajiyama. 656-660 [doi]
- Testbed for Mobile Telephony NetworksKonrad Meier, Dennis Wehrle, Klaus Rechert, Dirk von Suchodoletz. 661-666 [doi]
- Deriving Current State RBAC Models from Event LogsAnne Baumgrass. 667-672 [doi]
- Integrity and Confidentiality Annotations for Service Interfaces in SoaML ModelsBernhard Hoisl, Stefan Sobernig. 673-679 [doi]
- Consistency Checks for Duties in Extended UML2 Activity ModelsSigrid Schefer. 680-685 [doi]
- Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and ChallengesMaria Leitner. 686-691 [doi]
- SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information SystemsRafael Accorsi, Claus Wonnemann, Sebastian Dochow. 692-697 [doi]
- Security Evaluation of Service-oriented Systems with an Extensible Knowledge BaseChristian Jung, Manuel Rudolph, Reinhard Schwarz. 698-703 [doi]
- Security in Model Driven Development: A SurveyJostein Jensen, Martin Gilje Jaatun. 704-709 [doi]
- Characterising and Analysing Security Requirements Modelling InitiativesPéter Kárpáti, Guttorm Sindre, Andreas L. Opdahl. 710-715 [doi]
- User-Centered Information Security Policy Development in a Post-Stuxnet WorldShamal Faily, Ivan Flechais. 716-721 [doi]
- Here's Johnny: A Methodology for Developing Attacker PersonasAndrea S. Atzeni, Cesare Cameroni, Shamal Faily, John Lyle, Ivan Flechais. 722-727 [doi]
- Enhancing Fuzzing Technique for OKL4 Syscalls TestingAmaury Gauthier, Clement Mazin, Julien Iguchi-Cartigny, Jean-Louis Lanet. 728-733 [doi]
- Evaluating RBAC Supported Techniques and their Validation and VerificationNafees Qamar, Yves Ledru, Akram Idani. 734-739 [doi]
- Optimising CAPTCHA GenerationSuliman A. Alsuhibany. 740-745 [doi]
- The Java SPI Framework for Security Protocol ImplementationMatteo Avalle, Alfredo Pironti, Riccardo Sisto, Davide Pozza. 746-751 [doi]
- Roadmap to Approaches for Carving of Fragmented Multimedia FilesRainer Poisel, Simon Tjoa. 752-757 [doi]
- A Discussion of Visualization Techniques for the Analysis of Digital EvidenceGerald Schrenk, Rainer Poisel. 758-763 [doi]
- A Complexity Based Forensic Analysis of the Trojan Horse DefenceRichard E. Overill, Jantje A. M. Silomon. 764-768 [doi]