Abstract is missing.
- Enhancing Trusted Platform Modules with Hardware-Based Virtualization TechniquesFrederic Stumpf, Claudia Eckert. 1-9 [doi]
- A Secure Task Delegation Model for WorkflowsKhaled Gaaloul, Andreas Schaad, Ulrich Flegel, François Charoy. 10-15 [doi]
- Formal Modeling of Authentication in SIP RegistrationAnders Moen Hagalisletto, Lars Strand. 16-21 [doi]
- Controlling Access to Location-Based Services in Vehicular Mobile Pervasive EnvironmentsSameerchand Pudaruth, Nevin V. Jungum, Soulakshmee D. Ghurbhurrun, Leckraj Nagowah. 22-27 [doi]
- A New Approach for Secure and Portable OSH. Rezaei Ghaleh, M. A. Doustari. 28-33 [doi]
- Distack -- A Framework for Anomaly-Based Large-Scale Attack DetectionThomas Gamer, Christoph P. Mayer, Martina Zitterbart. 34-40 [doi]
- Team--Based MAC Policy over Security--Enhanced LinuxJérémy Briffaut, Jean-François Lalande, Waleed W. Smari. 41-46 [doi]
- Prototyping a New Identity Authentication Framework for IP TelephonyShu-Lin Chen, Stanley Chow, Christophe Gustave, Dmitri Vinokurov. 47-52 [doi]
- Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule SetsSergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, A. J. Varela-Vaca. 53-61 [doi]
- Security Patterns for Capturing Encryption-Based Access Control to Sensor DataÁngel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube. 62-67 [doi]
- Security Policy Management for Peer Group MeetingsFuwen Liu, Hartmut König. 68-73 [doi]
- FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole AttacksSandhya Khurana, Neelima Gupta. 74-79 [doi]
- Proving Trust LocallyAnders Moen Hagalisletto. 80-87 [doi]
- A Security Framework for Input ValidationRafael Bosse Brinhosa, Carlos Becker Westphall, Carla Merkle Westphall. 88-92 [doi]
- Defending E-Banking Services: Antiphishing ApproachAntonio San Martino, Xavier Perramon. 93-98 [doi]
- Preventing Insider Information Leakage for EnterprisesImad M. Abbadi, Muntaha Alawneh. 99-106 [doi]
- Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network TrafficPedro R. M. Inácio, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro. 107-113 [doi]
- Scalable Detection of SIP Fuzzing AttacksEric Y. Chen, Mitsutaka Itoh. 114-119 [doi]
- Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil AttackSarosh Hashmi, John Brooke. 120-126 [doi]
- The Automatic Discovery, Identification and Measurement of BotnetsIan Castle, Eimear Buckley. 127-132 [doi]
- A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin PolicyMasaru Takesue. 133-138 [doi]
- Email Worm Mitigation by Controlling the Name Server Response RateNikolaos Chatzis, Enric Pujol. 139-145 [doi]
- Anti-counterfeiting with a Random PatternCheun Ngen Chong, Dan Jiang, Jiagang Zhang, Long Guo. 146-153 [doi]
- Efficient Anomaly Detection System for Mobile HandsetsYuka Ikebe, Takehiro Nakayama, Masaji Katagiri, Satoshi Kawasaki, Hirotake Abe, Takahiro Shinagawa, Kazuhiko Kato. 154-160 [doi]
- Providing Secure Access to Unsecure Web ServicesV. F. Pais, V. Stancalie. 161-164 [doi]
- Towards Decentralised Security Policies for e-Health CollaborationsOluwafemi Ajayi, Richard O. Sinnott, Anthony Stell. 165-172 [doi]
- Rating Agencies Interoperation for Peer-to-Peer Online TransactionsMihaela Ion, Hristo Koshutanski, Volker Hoyer, Luigi Telesca. 173-178 [doi]
- Optimal Trust Network Analysis with Subjective LogicAudun Jøsang, Touhid Bhuiyan. 179-184 [doi]
- From Monitoring Templates to Security Monitoring and Threat DetectionNuno Amálio, George Spanoudakis. 185-192 [doi]
- A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc NetworksIoannis G. Askoxylakis, Damien Sauveron, Constantinos Markantonakis, Theodore Tryfonas, Apostolos Traganitis. 193-202 [doi]
- Family of Parameterized Hash AlgorithmsPrzemyslaw Rodwald, Janusz Stoklosa. 203-208 [doi]
- Public Key Cryptography: A Dynamical Systems PerspectiveRoland Schmitz. 209-212 [doi]
- A Related-Key Attack on TREYFERAleksandar Kircanski, Amr M. Youssef. 213-217 [doi]
- Security and Adoption of Internet PaymentJean-Michel Sahut. 218-223 [doi]
- Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001Wolfgang Boehmer. 224-231 [doi]
- Generic and Complete Three-Level Identity Management ModelMarcin Dabrowski, Piotr Pacyna. 232-237 [doi]
- A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual CryptographyAyesha Altaf, Rabia Sirhindi, Attiq Ahmed. 238-242 [doi]
- A New Anti-phishing Method in OpenIDHwanJin Lee, Inkyung Jeun, Kilsoo Chun, Junghwan Song. 243-247 [doi]
- Toward the Engineering of Security of Information Systems (ESIS): UML and the IS ConfidentialityWilson Goudalo, Dominique Seret. 248-256 [doi]
- Designing an Undergraduate Software Security CourseCynthia Y. Lester, Frank Jamerson. 257-262 [doi]
- High-Speed Private Information Retrieval Computation on GPUCarlos Aguilar Melchor, Benoît Crespin, Philippe Gaborit, Vincent Jolivet, Pierre Rousseau. 263-272 [doi]
- Vulnerability Dependencies in Antivirus SoftwareKreetta Askola, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, Juha Röning. 273-278 [doi]
- Security Governance for Enterprise VoIP CommunicationRainer Falk, Steffen Fries. 279-286 [doi]
- ToLeRating UR-STDJan Feyereisl, Uwe Aickelin. 287-293 [doi]
- Collaborative Approach to Automatic Classification of Heterogeneous Information SecurityFatiha Benali, Stéphane Ubéda, Véronique Legrand. 294-299 [doi]
- Infusing Information Assurance into an Undergraduate CS CurriculumCynthia Y. Lester, Hira N. Narang, Chung-Han Chen. 300-305 [doi]
- On the Portability of Trained Machine Learning Classifiers for Early Application IdentificationGiacomo Verticale. 306-310 [doi]
- Activity- and Inactivity-BasedApproaches to Analyze an Assisted Living EnvironmentMartin Floeck, Lothar Litz. 311-316 [doi]
- Analysis of Computer Infection Risk Factors Based on Customer Network UsageYannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant. 317-325 [doi]
- Design-Time Learning for Operational Planning ImprovementDaniel J. Martinez, Juan M. Marin, Jorge Bernal, Manuel Gil Pérez, Antonio Fernandez Gómez-Skarmeta. 326-331 [doi]
- Molecular Approach Paves the Way towards High Resilience for Large Mission-Critical Information SystemsAndré Cotton, Maurice Israël, Julien Borgel. 332-337 [doi]
- Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information SystemsMaurice Israël, Julien Borgel, André Cotton. 338-343 [doi]
- Generation of Diagnostic Plans for Large ICT SystemsMarco Domenico Aime, Andrea S. Atzeni. 344-349 [doi]
- Dependability Analysis of Information Systems with Hierarchical Reconfiguration of ServicesDariusz Caban, Wojciech Zamojski. 350-355 [doi]
- Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and SimulationKatarzyna Michalska, Tomasz Walkowiak. 356-361 [doi]
- Towards the Definition of a Web Service Based Management FrameworkJuan Manuel Marín Pérez, Jorge Bernal Bernabe, Daniel J. Martínez-Manzano, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta. 362-367 [doi]
- Dependability and Security Metrics in Controlling InfrastructureImre Kocsis, György Csertán, Péter László Pásztor, András Pataricza. 368-374 [doi]
- Advanced Rule-Based Techniques in Mission Critical SystemsMaite Avelino, Francisco de la Torre. 375-380 [doi]
- Fast Algorithms for Local Inconsistency Detection in Firewall ACL UpdatesSergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, A. J. Varela-Vaca. 381-390 [doi]
- Event-Driven Architecture for Intrusion Detection Systems Based on PatternsJesús J. Martinez Molina, Miguel A. Hernández Ruíz, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. 391-396 [doi]
- Agent Based Approach to Events Monitoring in Complex Information SystemsMarek Woda, Tomasz Walkowiak. 397-402 [doi]
- A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC ProtocolsXiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu. 403-411 [doi]
- On System Security Metrics and the Definition ApproachesArtur Hecker. 412-419 [doi]
- Policy-Driven System Configuration for DependabilityMarco Domenico Aime, Paolo Carlo Pomi, Marco Vallini. 420-425 [doi]
- A Dependability Case Approach to the Assessment of IP NetworksIlkka Norros, Pirkko Kuusela, Pekka Savola. 426-432 [doi]