default search action
6. ARES 2011: Vienna, Austria
- Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0979-1
- Farzad Salim, Jason Reid, Ed Dawson, Uwe Dulleck:
An Approach to Access Control under Uncertainty. 1-8 - Rima Addas, Ning Zhang:
Support Access to Distributed EPRs with Three Levels of Identity Privacy Preservation. 9-16 - Nora Cuppens-Boulahia, Frédéric Cuppens, Marie Nuadi:
Smatch Model: Extending RBAC Sessions in Virtualization Environment. 17-26 - Maria Leitner, Stefanie Rinderle-Ma, Jürgen Mangler:
AW-RBAC: Access Control in Adaptive Workflow Systems. 27-34 - Ludwig Fuchs, Stefan Meier:
The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective. 35-42 - Christian Senk, Florian Dotzler:
Biometric Authentication as a Service for Enterprise Identity Management Deployment: A Data Protection Perspective. 43-50 - Fabrizio Baiardi, Daniele Sgandurra:
An Obfuscation-Based Approach against Injection Attacks. 51-58 - Laurent Gallon, Jean-Jacques Bascou:
Using CVSS in Attack Graphs. 59-66 - Afonso Araújo Neto, Marco Vieira:
Selecting Software Packages for Secure Database Installations. 67-74 - Kaliappa Ravindran:
Probabilistic Fault-tolerance of Distributed Services: A Paradigm for Dependable Applications. 75-82 - Qiang Guan, Ziming Zhang, Song Fu:
Proactive Failure Management by Integrated Unsupervised and Semi-Supervised Learning for Dependable Cloud Systems. 83-90 - Marcus Nutzinger, Juergen Wurzer:
A Novel Phase Coding Technique for Steganography in Auditive Media. 91-98 - Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. 99-108 - Hing-Chung Tsang, Moon-Chuen Lee, Chi-Man Pun:
A Robust Anti-tamper Protection Scheme. 109-118 - Katharina Bräunlich, Rüdiger Grimm:
Formalization of Receipt-Freeness in the Context of Electronic Voting. 119-126 - Maina M. Olembo, Patrick Schmidt, Melanie Volkamer:
Introducing Verifiability in the POLYAS Remote Electronic Voting System. 127-134 - Yves Igor Jerschow, Martin Mauve:
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots. 135-142 - Julien A. Thomas, Nora Cuppens-Boulahia, Frédéric Cuppens:
Declassification Policy Management in Dynamic Information Systems. 143-152 - Yannis Soupionis, Dimitris Gritzalis:
ASPF: Adaptive anti-SPIT Policy-based Framework. 153-160 - Ermeson C. Andrade, Fumio Machida, Dong Seong Kim, Kishor S. Trivedi:
Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets. 161-168 - Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam:
Early Detection of Security Misconfiguration Vulnerabilities in Web Applications. 169-174 - Brent G. Roth, Eugene H. Spafford:
Implicit Buffer Overflow Protection Using Memory Segregation. 175-182 - Matthew Simon, Jill Slay:
Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility. 183-188 - Raja Khurram Shahzad, Niklas Lavesson, Henric Johnson:
Accurate Adware Detection Using Opcode Sequence Extraction. 189-195 - Grant Osborne, Jill Slay:
Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence. 196-201 - Karin Bernsmed, Martin Gilje Jaatun, Per Håkon Meland, Astrid Undheim:
Security SLAs for Federated Cloud Services. 202-209 - Sajal Bhatia, George M. Mohay, Alan Tickle, Ejaz Ahmed:
Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event. 210-217 - Kaliappa Ravindran, Gwangyu Ding:
Observer-based Testing of Distributed Protocols Designed for Harsh Environments. 218-223 - Afonso Araújo Neto, Marco Vieira:
Trustworthiness Benchmarking of Web Applications Using Static Code Analysis. 224-229 - Ricardo Neisse, Alexander Pretschner, Valentina Di Giacomo:
A Trustworthy Usage Control Enforcement Framework. 230-235 - Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipati:
An Attribute Based Framework for Risk-Adaptive Access Control Models. 236-241 - Jaehong Park, Ravi S. Sandhu, Yuan Cheng:
ACON: Activity-Centric Access Control for Social Computing. 242-247 - Cédric Bonhomme, Christophe Feltus, Michaël Petit:
Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management. 248-253 - Cornelius Moucha, Enrico Lovat, Alexander Pretschner:
A Hypervisor-Based Bus System for Usage Control. 254-259 - Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Michael VanHilst:
An Approach to Model-based Development of Secure and Reliable Systems. 260-265 - Z. Cliffe Schreuders, Christian Payne, Tanya Jane McGill:
Techniques for Automating Policy Specification for Application-oriented Access Controls. 266-271 - Elizabeta Fourneret, Martín Ochoa, Fabrice Bouquet, Julien Botella, Jan Jürjens, Parvaneh Yousefi:
Model-Based Security Verification and Testing for Smart-cards. 272-279 - Raydel Montesino, Stefan Fenz:
Information Security Automation: How Far Can We Go? 280-285 - I. Goriac:
An Epistemic Logic Based Framework for Reasoning about Information Hiding. 286-293 - Hugo Jonker, Jun Pang:
Bulletin Boards in Voting Systems: Modelling and Measuring Privacy. 294-300 - Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
System State Discovery Via Information Content Clustering of System Logs. 301-306 - Luigi Sportiello, Stefano Zanero:
File Block Classification by Support Vector Machine. 307-312 - Barbara Krumay, Marie Caroline Oetzel:
Security and Privacy in Companies: State-of-the-art and Qualitative Analysis. 313-320 - Ludwig Meyer, Martin Auer, Markus D. Klemen, Stefan Biffl:
Hidden Price of User Authentication: Cost Analysis and Stakeholder Motivation. 321-326 - Kristian Beckers, Holger Schmidt, Jan-Christoph Küster, Stephan Faßbender:
Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing. 327-333 - Maria Leitner, Stefanie Rinderle-Ma, Juergen Mangler:
Responsibility-driven Design and Development of Process-aware Security Policies. 334-341 - Kasumi Toriumi, Yoshio Kakizaki, Keiichi Iwamura:
Fast Implementation of the Advanced Encryption Standard Using Atmega1281. 342-346 - Marcin Gorawski, Zacheusz Siedlecki:
Optimization of Privacy Preserving Mechanisms in Homogeneous Collaborative Association Rules Mining. 347-352 - Stefan Hofbauer, Gerald Quirchmayr, Christopher C. Wills:
CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IP. 353-358 - Stefan Rass, Raphael Wigoutschnigg, Peter Schartner:
Crowds Based on Secret-Sharing. 359-364 - Moslem Didehban, Ario Sadafi, Sajjad Salehi, Mohammad Bagher Chami:
A Gate Level Analysis of Transient Faults Effects on Dual-Core Chip-Multi Processors. 365-370 - Bogdan Groza, Pal-Stefan Murvay:
Secure Broadcast with One-Time Signatures in Controller Area Networks. 371-376 - Elisavet Konstantinou, Eleni Klaoudatou, Pavlos Kamparmpakis:
Performance Evaluation of ID-based Group Key Agreement Protocols. 377-384 - Ralf Gitzel, Christian Cuske, Carsten Munch:
Preliminary Thoughts on Cost-based Investment Decisions in IT: A Problem Analysis. 385-389 - Markus Hipp, Bela Mutschler, Manfred Reichert:
On the Context-aware, Personalized Delivery of Process Information: Viewpoints, Problems, and Requirements. 390-397 - Masaki Fujikawa, Junki Akimoto, Fumihiko Oda, Kengo Moriyasu, Shingo Fuchi, Yoshikazu Takeda:
Study of Countermeasures for Content Leaks by Video Recording. 398-403 - Benjamin Blau, Tobias Hildenbrand:
Product Line Engineering in Large-Scale Lean and Agile Software Product Development Environments - Towards a Hybrid Approach to Decentral Control and Managed Reuse. 404-408 - Asad M. Ali:
Seamless Fusion of Secure Software and Trusted USB Token for Protecting Enterprise & Government Data. 409-414 - Minh Lê, Max Walter:
Considering Dependent Components in the Terminal Pair Reliability Problem. 415-422 - Kaliappa Ravindran:
Cyber-Physical Systems Based Modeling of Dependability of Complex Network Systems. 423-428 - Nidhal Mahmud, Martin Walker, Yiannis Papadopoulos:
Compositional Synthesis of Temporal Fault Trees from State Machines. 429-435 - Max Walter:
Stepwise Refinement of Complex Dependability Models Using LARES+. 436-441 - Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:
Privacy Frost: A User-Oriented Data Anonymization Tool. 442-447 - Hidetoshi Yukimaru, Yoshio Kakizaki, Keiichi Iwamura:
Key Management Scheme Applicable to Various Topologies of Sensor Networks. 448-453 - Yongjian Li, Jun Pang:
An Inductive Approach to Provable Anonymity. 454-459 - Jacqui Chetty, Marijke Coetzee:
Information Security for Service Oriented Computing: Ally or Antagonist. 460-465 - Geoffroy Gueguen:
Van Wijngaarden Grammars and Metamorphism. 466-472 - Mete Akgün, M. Ufuk Çaglayan:
PUF Based Scalable Private RFID Authentication. 473-478 - Steffen Bartsch:
Practitioners' Perspectives on Security in Agile Development. 479-484 - Juan C. Granda, Pelayo Nuño, Daniel F. García, Francisco J. Suárez:
Security Issues in a Synchronous e-Training Platform. 485-492 - Marius Cristea, Bogdan Groza, Mihai Iacob:
Some Security Issues in SCALANCE Wireless Industrial Networks. 493-498 - Ryôichi Sasaki, Kazushige Takakusaki, Masaru Ohkawara, Hiroshi Yajima, Hidetaka Masuda, Tetsuro Kobayashi:
Development and Trial Application of Prototype Program for "Social-MRC": Social Consensus Formation Support System Concerning IT Risk Countermeasures. 499-506 - Péter Kárpáti, Andreas L. Opdahl, Guttorm Sindre:
Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations. 507-514 - Pablo Bravo, Daniel F. García:
Proactive Detection of Kernel-Mode Rootkits. 515-520 - Albin Zuccato, Nils Daniels, Cheevarat Jampathom:
Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security. 521-526 - Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Effective Security Impact Analysis with Patterns for Software Enhancement. 527-534 - Tristan Lavarack, Marijke Coetzee:
Web Services Security Policy Assertion Trade-offs. 535-540 - John P. Watt, Richard O. Sinnott, George Inman, David W. Chadwick:
Federated Authentication and Authorisation in the Social Science Domain. 541-548 - Takashi Uemura, Shota Takagi, Yusuke Kosuda, Ryôichi Sasaki:
A Proposed Web Access Control System Request Policy Framework for Cooperation of DNS and a Web Browser. 549-554 - Mikaël Ates, Serge Ravet, Abakar Mohamat Ahmat, Jacques Fayolle:
An Identity-Centric Internet: Identity in the Cloud, Identity as a Service and Other Delights. 555-560 - Marianne A. Azer:
Wormhole Attacks Mitigation in Ad Hoc Networks. 561-568 - Ghenima Bourkache, Mohamed Mezghiche, Karim Tamine:
A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network. 569-572 - Eckehard Hermann:
A Security Policy Model for Agent Based Service-Oriented Architectures. 13-25 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Yiyuan Luo, Qi Chai:
Tag Impersonation Attack on Two RFID Mutual Authentication Protocols. 581-584 - Alexander V. Lyubimov, Dmitry V. Cheremushkin, Natalia Andreeva, Sergey Shustikov:
Information Security Integral Engineering Technique and its Application in ISMS Design. 585-590 - Farzad Salim, Uwe Dulleck, Jason Reid, Ed Dawson:
Optimal Budget Allocation in Budget-based Access Control. 591-596 - Masaki Fujikawa, Masakatsu Nishigaki:
A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies. 597-602 - Reza Rawassizadeh, Johannes Heurix, Soheil Khosravipour, A Min Tjoa:
LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information. 603-608 - Åsmund Ahlmann Nyre, Karin Bernsmed, Solvar Bo, Stian Pedersen:
A Server-side Approach to Privacy Policy Matching. 609-614 - Zhendong Ma, Jürgen Mangler, Christian Wagner, Thomas Bleier:
Enhance Data Privacy in Service Compositions through a Privacy Proxy. 615-620 - Inger Anne Tøndel, Åsmund Ahlmann Nyre, Karin Bernsmed:
Learning Privacy Preferences. 621-626 - Martin Kost, Johann Christoph Freytag, Frank Kargl, Antonio Kung:
Privacy Verification Using Ontologies. 627-632 - Iosif Androulidakis, Gorazd Kandus:
A Survey on Saving Personal Data in the Mobile Phone. 633-638 - Kai Kittel, Stefan Sackmann:
Gaining Flexibility and Compliance in Rescue Processes with BPM. 639-644 - Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara:
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters. 645-649 - Gerard Garlick:
Improving Resilience with Community Cloud Computing. 650-655 - Tomoko Kajiyama:
A Visualization Method for Helping Children Assess the Risk of Websites. 656-660 - Konrad Meier, Dennis Wehrle, Klaus Rechert, Dirk von Suchodoletz:
Testbed for Mobile Telephony Networks. 661-666 - Anne Baumgrass:
Deriving Current State RBAC Models from Event Logs. 667-672 - Bernhard Hoisl, Stefan Sobernig:
Integrity and Confidentiality Annotations for Service Interfaces in SoaML Models. 673-679 - Sigrid Schefer:
Consistency Checks for Duties in Extended UML2 Activity Models. 680-685 - Maria Leitner:
Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges. 686-691 - Rafael Accorsi, Claus Wonnemann, Sebastian Dochow:
SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems. 692-697 - Christian Jung, Manuel Rudolph, Reinhard Schwarz:
Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base. 698-703 - Jostein Jensen, Martin Gilje Jaatun:
Security in Model Driven Development: A Survey. 704-709 - Péter Kárpáti, Guttorm Sindre, Andreas L. Opdahl:
Characterising and Analysing Security Requirements Modelling Initiatives. 710-715 - Shamal Faily, Ivan Flechais:
User-Centered Information Security Policy Development in a Post-Stuxnet World. 716-721 - Andrea S. Atzeni, Cesare Cameroni, Shamal Faily, John Lyle, Ivan Flechais:
Here's Johnny: A Methodology for Developing Attacker Personas. 722-727 - Amaury Gauthier, Clement Mazin, Julien Iguchi-Cartigny, Jean-Louis Lanet:
Enhancing Fuzzing Technique for OKL4 Syscalls Testing. 728-733 - Nafees Qamar, Yves Ledru, Akram Idani:
Evaluating RBAC Supported Techniques and their Validation and Verification. 734-739 - Suliman A. Alsuhibany:
Optimising CAPTCHA Generation. 740-745 - Matteo Avalle, Alfredo Pironti, Riccardo Sisto, Davide Pozza:
The Java SPI Framework for Security Protocol Implementation. 746-751 - Rainer Poisel, Simon Tjoa:
Roadmap to Approaches for Carving of Fragmented Multimedia Files. 752-757 - Gerald Schrenk, Rainer Poisel:
A Discussion of Visualization Techniques for the Analysis of Digital Evidence. 758-763 - Richard E. Overill, Jantje A. M. Silomon:
A Complexity Based Forensic Analysis of the Trojan Horse Defence. 764-768
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.