Abstract is missing.
- Analyses of Two End-User Software Vulnerability Exposure MetricsJason L. Wright, Miles McQueen, Lawrence Wellman. 1-10 [doi]
- An Adaptive Risk Control and Security Management for Embedded Real-Time SystemYue Ma, Wei Jiang, Nan Sang, Ziguo Zhong. 11-17 [doi]
- Using Linear Support Vector Machines to Solve the Asymmetric Comparison-Based Fault Diagnosis ProblemMourad Elhadef. 18-27 [doi]
- Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted ApproachStanislaus Stelle, Mark Manulis, Matthias Hollick. 28-37 [doi]
- On Measuring the Parasitic Backscatter of Sensor-Enabled UHF RFID TagsThomas Plos, Christian Maierhofer. 38-46 [doi]
- Veto-based Malware DetectionRaja Khurram Shahzad, Niklas Lavesson. 47-54 [doi]
- Efficient Generic Construction of Forward-Secure Identity-Based SignatureNoura Al Ebri, Joonsang Baek, Abdulhadi Shoufan, Quang Hieu Vu. 55-64 [doi]
- From Computationally-proved Protocol Specifications to ImplementationsDavid Cadé, Bruno Blanchet. 65-74 [doi]
- Oblivious and Fair Server-Aided Two-Party ComputationAmir Herzberg, Haya Shulman. 75-84 [doi]
- A Group Signature Based Electronic Toll Pricing SystemXihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang. 85-93 [doi]
- Anonymous Communication by Branch-and-BoundStefan Rass, Peter Schartner, Raphael Wigoutschnigg, Christian Kollmitzer. 94-102 [doi]
- An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking SitesMoritz Riesner, Michael Netter, Günther Pernul. 103-112 [doi]
- An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration GuidesAnne Baumgrass, Mark Strembeck. 113-122 [doi]
- Towards Automated Assistance for Mined Roles Analysis in Role Mining ApplicationsSafaa Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro. 123-132 [doi]
- A Coordination-Driven Authorization Framework for Space ContainersStefan Craß, Tobias Dönz, Gerson Joskowicz, eva Kühn. 133-142 [doi]
- RIM: A Method to Defend from JIT Spraying AttackRui Wu, Ping Chen, Bing Mao, Li Xie. 143-148 [doi]
- Building a Flexible Service Architecture for User Controlled Hybrid CloudsAnja Strunk, Marc Mosch, Stephan Groß, Yvonne Thoß, Alexander Schill. 149-154 [doi]
- Towards a Holistic Information Security Governance Framework for SOAMarijke Coetzee. 155-160 [doi]
- An Algorithm for Compression of XACML Access Control Policy Sets by Recursive SubsumptionBernard Stepien, Stan Matwin, Amy P. Felty. 161-167 [doi]
- E-mail Classification Using Social Network InformationAnton Borg, Niklas Lavesson. 168-173 [doi]
- Two-Pronged Phish SnaggingRakesh Verma, Narasimha Shashidhar, Nabil Hossain. 174-179 [doi]
- Civitas and the Real World: Problems and Solutions from a Practical Point of ViewStephan Neumann, Melanie Volkamer. 180-185 [doi]
- Understanding the Development Trends of Electronic Voting SystemsAli Fawzi Najm Al-Shammari, Adolfo Villafiorita, Komminist Weldemariam. 186-195 [doi]
- Secure Mobile Data Collection Systems for Low-Budget SettingsFederico Mancini, Samson Gejibo, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr. 196-205 [doi]
- Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration ContextJean Michel Combes, Ghada Arfaoui, Maryline Laurent. 206-211 [doi]
- Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based EncryptionMuhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone. 212-217 [doi]
- Boosting Logical Attack Graph for Efficient Security ControlZonghua Zhang, Shuzhen Wang. 218-223 [doi]
- High Level Model of Control Flow Attacks for Smart Card Functional SecurityPascal Berthomé, Karine Heydemann, X. Kauffmann-Tourkestansky, Jean-François Lalande. 224-229 [doi]
- Federated Identity Management ChallengesJostein Jensen. 230-235 [doi]
- An Empirical Study on Design Diversity of Functionally Equivalent Web ServicesAmanda Sávio Nascimento, Fernando Castor, Cecília M. F. Rubira, Rachel Burrows. 236-241 [doi]
- Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and DocumentationKristian Beckers, Stephan Faßbender, Maritta Heisel, Holger Schmidt. 242-248 [doi]
- A Personalized Whitelist Approach for Phishing Webpage DetectionAmine Belabed, Esma Aïmeur, Amine Chikh. 249-254 [doi]
- Model-Based Digit Analysis for Fraud Detection Overcomes Limitations of Benford AnalysisChristian Winter, Markus Schneider 0002, York Yannikos. 255-261 [doi]
- Antidotes for DNS Poisoning by Off-Path AdversariesAmir Herzberg, Haya Shulman. 262-267 [doi]
- Classic Replication Techniques on the CloudItziar Arrieta-Salinas, José Enrique Armendáriz-Iñigo, Joan Navarro. 268-273 [doi]
- An Economic Model for Maximizing Profit of a Cloud Service ProviderThanadech Thanakornworakij, Raja Nassar, Chokchai Leangsuksun, Mihaela Paun. 274-279 [doi]
- Security Concept and Implementation for a Cloud Based E-science InfrastructureThomas Ludescher, Thomas Feilhauer, Peter Brezany. 280-285 [doi]
- Organizational Risk Assessment Based on Attacks RepetitionMarianne Azer, Ahmed Shaker, Sherif Nagy, Ahmed Raafat, Mohamad M. Abuzaid. 286-290 [doi]
- A Critical Survey of Security Indicator ApproachesManuel Rudolph, Reinhard Schwarz. 291-300 [doi]
- Fault Tolerance and Power Consumption Analysis on Chip-Multi Processors ArchitecturesHossein Khezripour, Saadat Pourmozaffari. 301-306 [doi]
- A Privacy preserving Approach to Call Detail Records Analysis in VoIP SystemsStefan Hofbauer, Kristian Beckers, Gerald Quirchmayr. 307-316 [doi]
- Design and Implementation of a CBR-based Privacy AgentKarin Bernsmed, Inger Anne Tøndel, Åsmund Ahlmann Nyre. 317-326 [doi]
- Disabilities and Authentication Methods: Usability and SecurityKirsi Helkala. 327-334 [doi]
- Privacy Policy Preferences Enforced by SPARQL Query RewritingSaid Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci. 335-342 [doi]
- Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud InfrastructuresCanh Ngo, Peter Membrey, Yuri Demchenko, Cees de Laat. 343-349 [doi]
- Trusted Virtual Infrastructure Bootstrapping for On Demand ServicesPeter Membrey, Keith C. C. Chan, Canh Ngo, Yuri Demchenko, Cees de Laat. 350-357 [doi]
- Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of DisclosureHoang-Quoc Nguyen-Son, Quoc-Binh Nguyen, Minh-Triet Tran, Dinh Thuc Nguyen, Hiroshi Yoshiura, Isao Echizen. 358-364 [doi]
- E2E: An Optimized IPsec Architecture for Secure and Fast OffloadDaniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui, Maryline Laurent. 365-374 [doi]
- Location Anonymity Based on Fake Queries in Continuous Location-Based ServicesLin Yao, Chi Lin, Guangya Liu, Fangyu Deng, Guowei Wu. 375-382 [doi]
- Janitor, Certificate and Jury (JCJ) Trust Scheme for Wireless Ad-hoc NetworksMohamad M. Abuzaid, Marianne A. Azer. 383-387 [doi]
- Repackaging Android Applications for Auditing Access to Private DataPascal Berthomé, Thomas Fécherolle, Nicolas Guilloteau, Jean-François Lalande. 388-396 [doi]
- On the Weak State in GGHN-like CiphersAleksandar Kircanski, Amr M. Youssef. 397-401 [doi]
- A Scan-Based Side Channel Attack on the NTRUEncrypt CryptosystemAbdel Alim Kamal, Amr M. Youssef. 402-409 [doi]
- Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session AttacksAnca Jurcut, Tom Coffey, Reiner Dojen. 410-416 [doi]
- BPVrfy: Hybrid Cryptographic Scheme Based - Federate Identity Attributes Verification Model for Business ProcessesNan Guo, Tian-han Gao, Bin Zhang 0001. 417-424 [doi]
- Integrating ISO/IEC 27001 and other Managerial Discipline Standards with Processes of Management in OrganizationsJuhani Anttila, Kari Jussila, Jorma Kajava, Ilkka Kamaja. 425-436 [doi]
- Towards an Open Standard Vote Verification Framework in Electronic Voting SystemsAli Fawzi Najm Al-Shammari, Adolfo Villafiorita, Komminist Weldemariam. 437-444 [doi]
- Sensitivity Analysis of Loss of Corporate Efficiency and Productivity Associated with Enterprise DRM TechnologyWen Zeng, Kaiyu Liu. 445-453 [doi]
- A Multi-objective Decision Support Framework for Simulation-Based Security Control SelectionElmar Kiesling, Christine Strauss, Christian Stummer. 454-462 [doi]
- An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing ExampleKristian Beckers, Stephan Faßbender, Holger Schmidt. 463-472 [doi]
- A Private Information Detector for Controlling Circulation of Private Information through Social NetworksMidori Hirose, Akira Utsumi, Isao Echizen, Hiroshi Yoshiura. 473-478 [doi]
- Return-Oriented Programming Attack on the Xen HypervisorBaozeng Ding, Yanjun Wu, Yeping He, Shuo Tian, Bei Guan, Guowei Wu. 479-484 [doi]
- Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and PerformanceKristian Beckers, Stephan Faßbender. 485-494 [doi]
- Evaluation of an Improved Visualization System for Helping Children Identify Risky WebsitesTomoko Kajiyama, Isao Echizen. 495-498 [doi]
- A Common Body of Knowledge for Engineering Secure Software and ServicesWidura Schwittek, Holger Schmidt, Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel. 499-506 [doi]
- Building an Incident Management Body of KnowledgeDavid A. Mundie, Robin Ruefle. 507-513 [doi]
- Challenges of Web-Based Information Security Knowledge SharingDaniel Feledi, Stefan Fenz. 514-521 [doi]
- Using Ontologies for Adaptive Information Security TrainingLee V. Mangold. 522-524 [doi]
- An Ontology for Run-Time Verification of Security Certificates for SOAStefania D'Agostini, Valentina Di Giacomo, Claudia Pandolfo, Domenico Presenza. 525-533 [doi]
- IO: An Interconnected Asset Ontology in Support of Risk Management ProcessesHenk Birkholz, Ingo Sieverdingbeck, Karsten Sohr, Carsten Bormann. 534-541 [doi]
- Representing Threats in BPMN 2.0Per Håkon Meland, Erlend Andreas Gjære. 542-550 [doi]
- Type Classification against Fault Enabled Mutant in Java Based Smart CardJean Dubreuil, Guillaume Bouffard, Jean-Louis Lanet, Julien Cartigny. 551-556 [doi]
- Towards Concurrent Data Sampling Using GPU CoprocessingMark M. Seeger, Stephen D. Wolthusen. 557-563 [doi]
- A Taxonomy of Time and State AttacksHoria V. Corcalciuc. 564-573 [doi]
- Comparing Privacy Requirements Engineering ApproachesKristian Beckers. 574-581 [doi]
- A Comparative Study of Software Security Pattern ClassificationsAleem Khalid Alvi, Mohammad Zulkernine. 582-589 [doi]
- Uncertainty Bounds for Digital Forensic Evidence and HypothesesRichard E. Overill, Jantje A. M. Silomon. 590-595 [doi]
- Using Attack Graphs in Forensic ExaminationsChangwei Liu, Anoop Singhal, Duminda Wijesekera. 596-603 [doi]
- A Statistical Approach for Identifying Videos of Child Pornography at Crime ScenesMateus de Castro Polastro, Pedro Monteiro da Silva Eleuterio. 604-612 [doi]
- Synthetic Data Creation for Forensic Tool Testing: Improving Performance of the 3LSPG FrameworkYork Yannikos, Christian Winter, Markus Schneider 0002. 613-619 [doi]
- Simplifying RAM Forensics: A GUI and Extensions for the Volatility FrameworkSteffen Logen, Hans Höfken, Marko Schuba. 620-624 [doi]
- InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo LogsPeter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar Weippl. 625-633 [doi]