Abstract is missing.
- Laribus: Privacy-Preserving Detection of Fake SSL Certificates with a Social P2P Notary NetworkAndrea Micheloni, Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath. 1-10 [doi]
- Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance MechanismsThanh-Trung Pham, Xavier Défago. 11-20 [doi]
- A Statistical Approach for Fingerprinting Probing ActivitiesElias Bou-Harb, Mourad Debbabi, Chadi Assi. 21-30 [doi]
- Federated Identity Management and Usage Control - Obstacles to Industry AdoptionJostein Jensen, Åsmund Ahlmann Nyre. 31-41 [doi]
- Reputation-Controlled Business Process WorkflowsBenjamin Aziz, Geoff Hamilton. 42-51 [doi]
- Conflict Management in Obligation with Deadline PoliciesNada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam. 52-61 [doi]
- Validating Security Design Patterns Application Using Model TestingTakanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Yoshiaki Fukazawa. 62-71 [doi]
- Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL ServerJason L. Wright, Jason W. Larsen, Miles McQueen. 72-81 [doi]
- Isolation of Malicious External Inputs in a Security Focused Adaptive Execution EnvironmentAaron Paulos, Partha Pal, Richard E. Schantz, Brett Benyo, David Johnson, Mike Hibler, Eric Eide. 82-91 [doi]
- PyTrigger: A System to Trigger & Extract User-Activated Malware BehaviorDan Fleck, Arnur G. Tokhtabayev, Alex Alarif, Angelos Stavrou, Tomas Nykodym. 92-101 [doi]
- Run-Time Risk Management in Adaptive ICT SystemsMike Surridge, Bassem I. Nasser, Xiayou Chen, Ajay Chakravarthy, Panos Melas. 102-110 [doi]
- A Problem-Based Threat Analysis in Compliance with Common CriteriaKristian Beckers, Denis Hatebur, Maritta Heisel. 111-120 [doi]
- Detecting Insider Threats: A Trust-Aware FrameworkFederica Paci, M. Carmen Fernández Gago, Francisco Moyano. 121-130 [doi]
- Revisiting Circuit Clogging Attacks on TorEric Chan-Tin, Jiyoung Shin, Jiangmin Yu. 131-140 [doi]
- Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User ControlChristian Richthammer, Michael Netter, Moritz Riesner, Günther Pernul. 141-150 [doi]
- Measuring Anonymity with Plausibilistic EntropyI. Goriac. 151-160 [doi]
- ARMORED: CPU-Bound Encryption for Android-Driven ARM DevicesJohannes Götzfried, Tilo Müller. 161-168 [doi]
- Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design StepsThomas Korak, Thomas Plos, Andreas Zankl. 169-177 [doi]
- High Availability for IPsec VPN Platforms: ClusterIP EvaluationDaniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent. 178-187 [doi]
- Scope of Security Properties of Sanitizable Signatures RevisitedHermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin. 188-197 [doi]
- Pretty Understandable Democracy - A Secure and Understandable Internet Voting SchemeJurlind Budurushi, Stephan Neumann, Maina M. Olembo, Melanie Volkamer. 198-207 [doi]
- The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure SystemsEckehard Hermann, Rüdiger Grimm. 208-217 [doi]
- Privacy Panel: Usable and Quantifiable Mobile PrivacyDebmalya Biswas, Imad Aad, Gian Paolo Perrucci. 218-223 [doi]
- A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIPZisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis. 224-229 [doi]
- On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter SystemsMario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt. 230-235 [doi]
- Limiting MitM to MitE Covert-ChannelsAmir Herzberg, Haya Shulman. 236-241 [doi]
- Detection of Hidden Fraudulent URLs within Trusted Sites Using Lexical FeaturesEnrico Sorio, Alberto Bartoli, Eric Medvet. 242-247 [doi]
- The Big Four - What We Did Wrong in Advanced Persistent Threat Detection?Nikos Virvilis, Dimitris Gritzalis. 248-254 [doi]
- SHPF: Enhancing HTTP(S) Session Security with Browser FingerprintingThomas Unger, Martin Mulazzani, Dominik Fruhwirt, Markus Huber, Sebastian Schrittwieser, Edgar Weippl. 255-261 [doi]
- An Analysis and Evaluation of Security Aspects in the Business Process Model and NotationMaria Leitner, Michelle Miller 0002, Stefanie Rinderle-Ma. 262-267 [doi]
- Resource Pool Oriented Trust Management for Cloud InfrastructureGansen Zhao, Haiyu Wang, Chunming Rong, Yong Tang. 268-273 [doi]
- Towards Web-Based Biometric Systems Using Personal Browsing InterestsLukasz Olejnik, Claude Castelluccia. 274-280 [doi]
- A Novel Proximity Based Trust Model for Opportunistic NetworksMai H. El-Sherief, Marianne A. Azer. 281-284 [doi]
- The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity ManagementDavid W. Chadwick, George Inman. 285-290 [doi]
- The Transitivity-of-Trust Problem in Android Application InteractionSteffen Bartsch, Bernhard J. Berger, Michaela Bunke, Karsten Sohr. 291-296 [doi]
- Secure Profile Provisioning Architecture for Embedded UICCJaemin Park, Kiyoung Baek, Cheoloh Kang. 297-303 [doi]
- Ultra-lightweight Mutual Authentication Protocols: Weaknesses and CountermeasuresZeeshan Bilal, Keith Martin. 304-309 [doi]
- A Reputation-Based Clustering Mechanism for MANET Routing SecurityAida Ben Chehida, Ryma Abassi, Sihem Guemara El Fatmi. 310-315 [doi]
- Organizational Security Architecture for Critical InfrastructureJonathan Blangenois, Guy Guemkam, Christophe Feltus, Djamel Khadraoui. 316-323 [doi]
- An Approach Based on Model-Driven Engineering to Define Security Policies Using OrBACDenisse Muñante, Laurent Gallon, Philippe Aniorté. 324-332 [doi]
- IT Service Continuity: Achieving Embeddedness through PlanningMarko Niemimaa, Jonna Järveläinen. 333-340 [doi]
- Enhancing Security Testing via Automated Replication of IT-Asset TopologiesHenk Birkholz, Ingo Sieverdingbeck, Nicolai Kuntze, Carsten Rudolph. 341-349 [doi]
- Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application DevelopmentSeiji Munetoh, Nobukazu Yoshioka. 350-359 [doi]
- A Genetic Algorithm Approach for the Most Likely Attack Path ProblemMohammed A. Alhomidi, Martin J. Reed. 360-366 [doi]
- A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java ApplicationsYehia Elrakaiby, Yves Le Traon. 367-374 [doi]
- iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner?Aswami Ariffin, Christian D'Orazio, Kim-Kwang Raymond Choo, Jill Slay. 375-382 [doi]
- Shared Crowds: A Token-Ring Approach to Hide the ReceiverRaphael Wigoutschnigg, Peter Schartner, Stefan Rass. 383-389 [doi]
- On the Practicability of Cold Boot AttacksMichael Gruhn, Tilo Müller. 390-397 [doi]
- DNSSEC: Interoperability Challenges and Transition MechanismsAmir Herzberg, Haya Shulman. 398-405 [doi]
- A Generation Method of Cryptographic Keys for Enterprise Communication SystemsAleksandar Hudic, Elise Revell, Dimitris E. Simos. 406-411 [doi]
- Dynamic Certification of Cloud ServicesIryna Windhorst, Ali Sunyaev. 412-417 [doi]
- Secure Engineering and Modelling of a Metering Devices SystemJose Fran. Ruiz, Marcos Arjona, Antonio Mana, Niklas Carstens. 418-427 [doi]
- The Use and Usefulness of Threats in Goal-Oriented ModellingPer Håkon Meland, Erlend Andreas Gjære, Stéphane Paul. 428-436 [doi]
- Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri NetsSuliman A. Alsuhibany, Aad P. A. van Moorsel. 437-445 [doi]
- Software Vulnerability Detection Using Backward Trace Analysis and Symbolic ExecutionHongzhe Li, Taebeom Kim, Munkhbayar Bat-Erdene, Heejo Lee. 446-454 [doi]
- Automated Synthesis and Ranking of Secure BPMN OrchestratorsVincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, J. A. Martin, Ernesto Pimentel. 455-464 [doi]
- Structured Pattern-Based Security Requirements Elicitation for CloudsKristian Beckers, Maritta Heisel, Isabelle Côté, Ludger Goeke, Selim Guler. 465-474 [doi]
- A Comprehensive Literature Review of File CarvingRainer Poisel, Simon Tjoa. 475-484 [doi]
- FASTDD: An Open Source Forensic Imaging ToolPaolo Bertasi, Nicola Zago. 485-492 [doi]
- Artificial Aging of Mobile Devices Using a Simulated GSM/GPRS NetworkRolf Stobe, Hans Höfken, Marko Schuba, Michael Breuer. 493-497 [doi]
- Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool TestingYork Yannikos, Christian Winter. 498-505 [doi]
- Social Issues of Big Data and Cloud: Privacy, Confidentiality, and Public UtilityKoichiro Hayashi. 506-511 [doi]
- Estimating the Value of Personal Information with SNS UtilityMemiko Otsuki, Noboru Sonehara. 512-516 [doi]
- Anonymizing Face Images by Using Similarity-Based MetricTomoya Muraki, Shintaro Oishi, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura. 517-524 [doi]
- ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy SwitchingHiroshi Maruyama, Kiyoshi Watanabe, Sachiko Yoshihama, Naohiko Uramoto, Yoichiro Takehora, Kazuhiro Minami. 525-529 [doi]
- Using Twitter's Mentions for Efficient Emergency Message PropagationKelly Y. Itakura, Noboru Sonehara. 530-537 [doi]
- Towards a Risk Based Assessment of QoS Degradation for Critical InfrastructureMoussa Ouedraogo, Manel Khodja, Djamel Khadraoui. 538-545 [doi]
- A Reference Model of Information Assurance & SecurityYulia Cherdantseva, Jeremy Hilton. 546-555 [doi]
- An Ontology for Malware AnalysisDavid A. Mundie, David M. Mcintire. 556-558 [doi]
- A Usability Evaluation of the NESSoS Common Body of KnowledgeKristian Beckers, Maritta Heisel. 559-568 [doi]
- A Bootstrapping Approach for Developing a Cyber-security Ontology Using Textbook Index TermsArwa Wali, Soon Ae Chun, James Geller. 569-576 [doi]
- Towards an Ontology for Cloud Security ObligationsKarin Bernsmed, Astrid Undheim, Per Håkon Meland, Martin Gilje Jaatun. 577-581 [doi]
- On Selecting Critical Security ControlsJakub Breier, Ladislav Hudec. 582-588 [doi]
- Taxonomy for Port Security SystemsTove Gustavi, Pontus Svenson. 592-598 [doi]
- Probabilistic Contract Compliance for Mobile ApplicationsGianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra. 599-606 [doi]
- A Classifier of Malicious Android ApplicationsGerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio. 607-614 [doi]
- Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data SetKen Mano, Kazuhiro Minami, Hiroshi Maruyama. 615-624 [doi]
- A Scalable SIEM Correlation Engine and Its Application to the Olympic Games IT InfrastructureValerio Vianello, Vincenzo Gulisano, Ricardo Jiménez-Peris, Marta Patiño-Martínez, Rubén Torres, Rodrigo Diaz, Elsa Prieto. 625-629 [doi]
- Reconsidering Intrusion Monitoring Requirements in Shared Cloud PlatformsKahina Lazri, Sylvie Laniepce, Jalel Ben-Othman. 630-637 [doi]
- The Ontology of Metrics for Security Evaluation and Decision Support in SIEM SystemsIgor Kotenko, Olga Polubelova, Igor Saenko, Elena Doynikova. 638-645 [doi]
- Addressing Security Issues of Electronic Health Record Systems through Enhanced SIEM TechnologyCesario Di Sarno, Valerio Formicola, Mario Sicuranza, Giovanni Paragliola. 646-653 [doi]
- Experiences and Challenges in Enhancing Security Information and Event Management Capability Using Unsupervised Anomaly DetectionStefan Asanger, Andrew Hutchison. 654-661 [doi]
- Fraud Detection in Mobile Payments Utilizing Process Behavior AnalysisRoland Rieke, Maria Zhdanova, Jürgen Repp, Romain Giot, Chrystel Gaber. 662-669 [doi]
- GVScan: Scanning Networks for Global VulnerabilitiesFabrizio Baiardi, Fabio Corò, Federico Tonelli, Luca Guidi. 670-677 [doi]
- Counteract DNS Attacks on SIP Proxies Using Bloom FiltersGe Zhang, Simone Fischer-Hübner. 678-684 [doi]
- A Grammatical Inference Approach to Language-Based Anomaly Detection in XMLHarald Lampesberger. 685-693 [doi]
- Universal Peer-to-Peer Network Investigation FrameworkMark Scanlon, M. Tahar Kechadi. 694-700 [doi]
- Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert ChannelsJean-François Lalande, Steffen Wendzel. 701-710 [doi]
- ANANAS - A Framework for Analyzing Android ApplicationsThomas Eder, Michael Rodler, Dieter Vymazal, Markus Zeilinger. 711-719 [doi]
- Cuteforce Analyzer: A Distributed Bruteforce Attack on PDF Encryption with GPUs and FPGAsBianca Danczul, Jürgen Fuß, Stefan Gradinger, Bernhard Greslehner, Wolfgang Kastl, Florian Wex. 720-725 [doi]
- Collaboratively Exchanging Warning Messages between Peers While under AttackMirko Haustein, Herbert Sighart, Dennis Titze, Peter Schoo. 726-731 [doi]
- Some General Properties of Multi-state Physical ModelsPaolo Rocchi, Gurami Tsitsiashvili. 732-736 [doi]
- Assessing Water Cooling System Performance: Lz-Transform MethodIlia Frenkel, Lev Khvatskin, Svetlana Daichman, Anatoly Lisnianski. 737-742 [doi]
- Genetic Algorithm and Data Mining Techniques for Design Selection in DatabasesChristos Koukouvinos, Christina Parpoula, Dimitris E. Simos. 743-746 [doi]
- Statistical Inference for Multi-state Systems: The Weibull CaseA. Makrides, A. Karagrigoriou. 747-752 [doi]
- Evaluation of Airport Security Training Programs: Perspectives and IssuesWoohyun Shim, Fabio Massacci, Martina de Gramatica, Alessandra Tedeschi, Alessandro Pollini. 753-758 [doi]
- ARGUS 3D: Security Enhancements through Innovative Radar TechnologiesRoberta Cardinali, Enrico Anniballi, Carlo Bongioanni, Antonio Macera, Fabiola Colone, Pierfrancesco Lombardo. 759-765 [doi]
- Enhancing CHASSIS: A Method for Combining Safety and SecurityChristian Raspotnig, Vikash Katta, Péter Kárpáti, Andreas L. Opdahl. 766-773 [doi]
- Security Blind Spots in the ATM Safety CultureHoward Chivers, John Hird. 774-779 [doi]
- Requirements Management in a Combined Process for Safety and Security AssessmentsVikash Katta, Christian Raspotnig, Péter Kárpáti, Tor Stålhane. 780-786 [doi]
- Towards Harmonising the Legislative, Regulatory, and Standards-Based Framework for ATM Security: Developing a Software Support ToolRainer Koelle, Walter Strijland, Stefan Roels. 787-793 [doi]
- Sink or SWIM: Information Security Requirements in the SkyMartin Gilje Jaatun, Tor Erlend Fægri. 794-801 [doi]
- Collaborative Security Management: Developing Ideas in Security Management for Air Traffic ControlMartin Hawley, Paul Howard, Rainer Koelle, Peter Saxton. 802-806 [doi]
- Applying the SecRAM Methodology in a CLOUD-Based ATM EnvironmentAntonio Marotta, Gabriella Carrozza, Luigi Battaglia, Patrizia Montefusco, Vittorio Manetti. 807-813 [doi]
- Beyond Traceability: Compared Approaches to Consistent Security Risk AssessmentsFranco Bergomi, Stéphane Paul, Bjørnar Solhaug, Raphael Vignon-Davillier. 814-820 [doi]
- The Scourge of Internet Personal Data CollectionEsma Aïmeur, Manuel Lafond. 821-828 [doi]
- User Interface Harmonization for IT Security Management: User-Centered Design in the PoSecCo ProjectBeatriz Gallego-Nicasio Crespo. 829-835 [doi]
- Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA ProjectsAndrzej Dziech, Jaroslaw Bialas, Andrzej Glowacz, Pawel Korus, Mikolaj Leszczuk, Andrzej Matiolalski, Remigiusz Baran. 836-843 [doi]
- TRESCCA - Trustworthy Embedded Systems for Secure Cloud ComputingGunnar Schomaker, Andreas Herrholz, Guillaume Duc, Renaud Pacalet, Salvatore Raho, Miltos D. Grammatikakis, Marcello Coppola, Ignacio Garcia Vega. 844-845 [doi]