


default search action
6. ARES 2011: Vienna, Austria
- Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0979-1

- Farzad Salim, Jason Reid, Ed Dawson

, Uwe Dulleck
:
An Approach to Access Control under Uncertainty. 1-8 - Rima Addas, Ning Zhang

:
Support Access to Distributed EPRs with Three Levels of Identity Privacy Preservation. 9-16 - Nora Cuppens-Boulahia, Frédéric Cuppens, Marie Nuadi:

Smatch Model: Extending RBAC Sessions in Virtualization Environment. 17-26 - Maria Leitner

, Stefanie Rinderle-Ma
, Jürgen Mangler:
AW-RBAC: Access Control in Adaptive Workflow Systems. 27-34 - Ludwig Fuchs, Stefan Meier:

The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective. 35-42 - Christian Senk, Florian Dotzler:

Biometric Authentication as a Service for Enterprise Identity Management Deployment: A Data Protection Perspective. 43-50 - Fabrizio Baiardi

, Daniele Sgandurra:
An Obfuscation-Based Approach against Injection Attacks. 51-58 - Laurent Gallon, Jean-Jacques Bascou:

Using CVSS in Attack Graphs. 59-66 - Afonso Araújo Neto, Marco Vieira

:
Selecting Software Packages for Secure Database Installations. 67-74 - Kaliappa Ravindran:

Probabilistic Fault-tolerance of Distributed Services: A Paradigm for Dependable Applications. 75-82 - Qiang Guan, Ziming Zhang, Song Fu

:
Proactive Failure Management by Integrated Unsupervised and Semi-Supervised Learning for Dependable Cloud Systems. 83-90 - Marcus Nutzinger, Juergen Wurzer:

A Novel Phase Coding Technique for Steganography in Auditive Media. 91-98 - Muhammad Rizwan Asghar

, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. 99-108 - Hing-Chung Tsang, Moon-Chuen Lee, Chi-Man Pun

:
A Robust Anti-tamper Protection Scheme. 109-118 - Katharina Bräunlich, Rüdiger Grimm:

Formalization of Receipt-Freeness in the Context of Electronic Voting. 119-126 - Maina M. Olembo, Patrick Schmidt, Melanie Volkamer:

Introducing Verifiability in the POLYAS Remote Electronic Voting System. 127-134 - Yves Igor Jerschow, Martin Mauve:

Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots. 135-142 - Julien A. Thomas, Nora Cuppens-Boulahia, Frédéric Cuppens:

Declassification Policy Management in Dynamic Information Systems. 143-152 - Yannis Soupionis, Dimitris Gritzalis:

ASPF: Adaptive anti-SPIT Policy-based Framework. 153-160 - Ermeson C. Andrade

, Fumio Machida, Dong Seong Kim
, Kishor S. Trivedi:
Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets. 161-168 - Birhanu Eshete

, Adolfo Villafiorita
, Komminist Weldemariam:
Early Detection of Security Misconfiguration Vulnerabilities in Web Applications. 169-174 - Brent G. Roth, Eugene H. Spafford

:
Implicit Buffer Overflow Protection Using Memory Segregation. 175-182 - Matthew Simon, Jill Slay

:
Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility. 183-188 - Raja Khurram Shahzad

, Niklas Lavesson
, Henric Johnson:
Accurate Adware Detection Using Opcode Sequence Extraction. 189-195 - Grant Osborne, Jill Slay

:
Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence. 196-201 - Karin Bernsmed, Martin Gilje Jaatun

, Per Håkon Meland, Astrid Undheim:
Security SLAs for Federated Cloud Services. 202-209 - Sajal Bhatia, George M. Mohay, Alan Tickle, Ejaz Ahmed:

Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event. 210-217 - Kaliappa Ravindran, Gwangyu Ding:

Observer-based Testing of Distributed Protocols Designed for Harsh Environments. 218-223 - Afonso Araújo Neto, Marco Vieira

:
Trustworthiness Benchmarking of Web Applications Using Static Code Analysis. 224-229 - Ricardo Neisse, Alexander Pretschner, Valentina Di Giacomo

:
A Trustworthy Usage Control Enforcement Framework. 230-235 - Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipati:

An Attribute Based Framework for Risk-Adaptive Access Control Models. 236-241 - Jaehong Park, Ravi S. Sandhu, Yuan Cheng

:
ACON: Activity-Centric Access Control for Social Computing. 242-247 - Cédric Bonhomme

, Christophe Feltus
, Michaël Petit:
Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management. 248-253 - Cornelius Moucha, Enrico Lovat, Alexander Pretschner:

A Hypervisor-Based Bus System for Usage Control. 254-259 - Eduardo B. Fernández

, Hironori Washizaki
, Nobukazu Yoshioka
, Michael VanHilst:
An Approach to Model-based Development of Secure and Reliable Systems. 260-265 - Z. Cliffe Schreuders, Christian Payne, Tanya Jane McGill:

Techniques for Automating Policy Specification for Application-oriented Access Controls. 266-271 - Elizabeta Fourneret, Martín Ochoa, Fabrice Bouquet

, Julien Botella, Jan Jürjens, Parvaneh Yousefi:
Model-Based Security Verification and Testing for Smart-cards. 272-279 - Raydel Montesino

, Stefan Fenz
:
Information Security Automation: How Far Can We Go? 280-285 - I. Goriac:

An Epistemic Logic Based Framework for Reasoning about Information Hiding. 286-293 - Hugo Jonker, Jun Pang:

Bulletin Boards in Voting Systems: Modelling and Measuring Privacy. 294-300 - Adetokunbo Makanju, Nur Zincir-Heywood

, Evangelos E. Milios
:
System State Discovery Via Information Content Clustering of System Logs. 301-306 - Luigi Sportiello, Stefano Zanero

:
File Block Classification by Support Vector Machine. 307-312 - Barbara Krumay

, Marie Caroline Oetzel:
Security and Privacy in Companies: State-of-the-art and Qualitative Analysis. 313-320 - Ludwig Meyer, Martin Auer, Markus D. Klemen, Stefan Biffl:

Hidden Price of User Authentication: Cost Analysis and Stakeholder Motivation. 321-326 - Kristian Beckers, Holger Schmidt, Jan-Christoph Küster, Stephan Faßbender:

Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing. 327-333 - Maria Leitner

, Stefanie Rinderle-Ma, Juergen Mangler:
Responsibility-driven Design and Development of Process-aware Security Policies. 334-341 - Kasumi Toriumi, Yoshio Kakizaki

, Keiichi Iwamura:
Fast Implementation of the Advanced Encryption Standard Using Atmega1281. 342-346 - Marcin Gorawski, Zacheusz Siedlecki:

Optimization of Privacy Preserving Mechanisms in Homogeneous Collaborative Association Rules Mining. 347-352 - Stefan Hofbauer

, Gerald Quirchmayr, Christopher C. Wills
:
CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IP. 353-358 - Stefan Rass

, Raphael Wigoutschnigg, Peter Schartner:
Crowds Based on Secret-Sharing. 359-364 - Moslem Didehban, Ario Sadafi, Sajjad Salehi, Mohammad Bagher Chami:

A Gate Level Analysis of Transient Faults Effects on Dual-Core Chip-Multi Processors. 365-370 - Bogdan Groza, Pal-Stefan Murvay

:
Secure Broadcast with One-Time Signatures in Controller Area Networks. 371-376 - Elisavet Konstantinou, Eleni Klaoudatou, Pavlos Kamparmpakis:

Performance Evaluation of ID-based Group Key Agreement Protocols. 377-384 - Ralf Gitzel, Christian Cuske, Carsten Munch:

Preliminary Thoughts on Cost-based Investment Decisions in IT: A Problem Analysis. 385-389 - Markus Hipp, Bela Mutschler, Manfred Reichert:

On the Context-aware, Personalized Delivery of Process Information: Viewpoints, Problems, and Requirements. 390-397 - Masaki Fujikawa, Junki Akimoto, Fumihiko Oda, Kengo Moriyasu, Shingo Fuchi, Yoshikazu Takeda:

Study of Countermeasures for Content Leaks by Video Recording. 398-403 - Benjamin Blau, Tobias Hildenbrand:

Product Line Engineering in Large-Scale Lean and Agile Software Product Development Environments - Towards a Hybrid Approach to Decentral Control and Managed Reuse. 404-408 - Asad M. Ali:

Seamless Fusion of Secure Software and Trusted USB Token for Protecting Enterprise & Government Data. 409-414 - Minh Lê, Max Walter:

Considering Dependent Components in the Terminal Pair Reliability Problem. 415-422 - Kaliappa Ravindran:

Cyber-Physical Systems Based Modeling of Dependability of Complex Network Systems. 423-428 - Nidhal Mahmud

, Martin Walker
, Yiannis Papadopoulos
:
Compositional Synthesis of Temporal Fault Trees from State Machines. 429-435 - Max Walter:

Stepwise Refinement of Complex Dependability Models Using LARES+. 436-441 - Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:

Privacy Frost: A User-Oriented Data Anonymization Tool. 442-447 - Hidetoshi Yukimaru, Yoshio Kakizaki

, Keiichi Iwamura:
Key Management Scheme Applicable to Various Topologies of Sensor Networks. 448-453 - Yongjian Li, Jun Pang:

An Inductive Approach to Provable Anonymity. 454-459 - Jacqui Chetty, Marijke Coetzee

:
Information Security for Service Oriented Computing: Ally or Antagonist. 460-465 - Geoffroy Gueguen:

Van Wijngaarden Grammars and Metamorphism. 466-472 - Mete Akgün, M. Ufuk Çaglayan:

PUF Based Scalable Private RFID Authentication. 473-478 - Steffen Bartsch:

Practitioners' Perspectives on Security in Agile Development. 479-484 - Juan C. Granda, Pelayo Nuño

, Daniel F. García
, Francisco J. Suárez
:
Security Issues in a Synchronous e-Training Platform. 485-492 - Marius Cristea, Bogdan Groza, Mihai Iacob:

Some Security Issues in SCALANCE Wireless Industrial Networks. 493-498 - Ryôichi Sasaki, Kazushige Takakusaki, Masaru Ohkawara, Hiroshi Yajima, Hidetaka Masuda, Tetsuro Kobayashi

:
Development and Trial Application of Prototype Program for "Social-MRC": Social Consensus Formation Support System Concerning IT Risk Countermeasures. 499-506 - Péter Kárpáti, Andreas L. Opdahl

, Guttorm Sindre
:
Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations. 507-514 - Pablo Bravo, Daniel F. García

:
Proactive Detection of Kernel-Mode Rootkits. 515-520 - Albin Zuccato, Nils Daniels, Cheevarat Jampathom:

Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security. 521-526 - Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka

:
Effective Security Impact Analysis with Patterns for Software Enhancement. 527-534 - Tristan Lavarack, Marijke Coetzee

:
Web Services Security Policy Assertion Trade-offs. 535-540 - John P. Watt, Richard O. Sinnott

, George Inman, David W. Chadwick
:
Federated Authentication and Authorisation in the Social Science Domain. 541-548 - Takashi Uemura, Shota Takagi, Yusuke Kosuda, Ryôichi Sasaki:

A Proposed Web Access Control System Request Policy Framework for Cooperation of DNS and a Web Browser. 549-554 - Mikaël Ates, Serge Ravet, Abakar Mohamat Ahmat, Jacques Fayolle:

An Identity-Centric Internet: Identity in the Cloud, Identity as a Service and Other Delights. 555-560 - Marianne A. Azer

:
Wormhole Attacks Mitigation in Ad Hoc Networks. 561-568 - Ghenima Bourkache, Mohamed Mezghiche, Karim Tamine:

A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network. 569-572 - Eckehard Hermann:

A Security Policy Model for Agent Based Service-Oriented Architectures. 13-25 - Masoumeh Safkhani

, Nasour Bagheri
, Majid Naderi, Yiyuan Luo, Qi Chai:
Tag Impersonation Attack on Two RFID Mutual Authentication Protocols. 581-584 - Alexander V. Lyubimov, Dmitry V. Cheremushkin, Natalia Andreeva, Sergey Shustikov:

Information Security Integral Engineering Technique and its Application in ISMS Design. 585-590 - Farzad Salim, Uwe Dulleck

, Jason Reid, Ed Dawson
:
Optimal Budget Allocation in Budget-based Access Control. 591-596 - Masaki Fujikawa, Masakatsu Nishigaki

:
A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies. 597-602 - Reza Rawassizadeh, Johannes Heurix, Soheil Khosravipour, A Min Tjoa

:
LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information. 603-608 - Åsmund Ahlmann Nyre, Karin Bernsmed, Solvar Bo, Stian Pedersen:

A Server-side Approach to Privacy Policy Matching. 609-614 - Zhendong Ma, Jürgen Mangler, Christian Wagner, Thomas Bleier:

Enhance Data Privacy in Service Compositions through a Privacy Proxy. 615-620 - Inger Anne Tøndel, Åsmund Ahlmann Nyre, Karin Bernsmed:

Learning Privacy Preferences. 621-626 - Martin Kost, Johann Christoph Freytag, Frank Kargl, Antonio Kung:

Privacy Verification Using Ontologies. 627-632 - Iosif Androulidakis

, Gorazd Kandus:
A Survey on Saving Personal Data in the Mobile Phone. 633-638 - Kai Kittel, Stefan Sackmann:

Gaining Flexibility and Compliance in Rescue Processes with BPM. 639-644 - Sebastian Schrittwieser, Peter Kieseberg

, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara:
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters. 645-649 - Gerard Garlick:

Improving Resilience with Community Cloud Computing. 650-655 - Tomoko Kajiyama:

A Visualization Method for Helping Children Assess the Risk of Websites. 656-660 - Konrad Meier, Dennis Wehrle, Klaus Rechert, Dirk von Suchodoletz

:
Testbed for Mobile Telephony Networks. 661-666 - Anne Baumgrass:

Deriving Current State RBAC Models from Event Logs. 667-672 - Bernhard Hoisl, Stefan Sobernig:

Integrity and Confidentiality Annotations for Service Interfaces in SoaML Models. 673-679 - Sigrid Schefer:

Consistency Checks for Duties in Extended UML2 Activity Models. 680-685 - Maria Leitner

:
Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges. 686-691 - Rafael Accorsi, Claus Wonnemann, Sebastian Dochow:

SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems. 692-697 - Christian Jung

, Manuel Rudolph, Reinhard Schwarz:
Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base. 698-703 - Jostein Jensen, Martin Gilje Jaatun

:
Security in Model Driven Development: A Survey. 704-709 - Péter Kárpáti, Guttorm Sindre

, Andreas L. Opdahl
:
Characterising and Analysing Security Requirements Modelling Initiatives. 710-715 - Shamal Faily, Ivan Flechais:

User-Centered Information Security Policy Development in a Post-Stuxnet World. 716-721 - Andrea S. Atzeni, Cesare Cameroni

, Shamal Faily, John Lyle, Ivan Flechais:
Here's Johnny: A Methodology for Developing Attacker Personas. 722-727 - Amaury Gauthier, Clement Mazin, Julien Iguchi-Cartigny, Jean-Louis Lanet:

Enhancing Fuzzing Technique for OKL4 Syscalls Testing. 728-733 - Nafees Qamar, Yves Ledru, Akram Idani

:
Evaluating RBAC Supported Techniques and their Validation and Verification. 734-739 - Suliman A. Alsuhibany

:
Optimising CAPTCHA Generation. 740-745 - Matteo Avalle, Alfredo Pironti, Riccardo Sisto

, Davide Pozza
:
The Java SPI Framework for Security Protocol Implementation. 746-751 - Rainer Poisel, Simon Tjoa

:
Roadmap to Approaches for Carving of Fragmented Multimedia Files. 752-757 - Gerald Schrenk, Rainer Poisel:

A Discussion of Visualization Techniques for the Analysis of Digital Evidence. 758-763 - Richard E. Overill, Jantje A. M. Silomon:

A Complexity Based Forensic Analysis of the Trojan Horse Defence. 764-768

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














