


default search action
ARES 2010: Krakow, Poland
- ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland. IEEE Computer Society 2010, ISBN 978-0-7695-3965-2

ARES 2010 Full Papers
Network Security I
- Christophe Feltus

, Djamel Khadraoui, Jocelyn Aubert
:
A Security Decision-Reaction Architecture for Heterogeneous Distributed Network. 1-8 - Anjali Sardana, Ramesh Chandra Joshi:

Dual-Level Attack Detection and Characterization for Networks under DDoS. 9-16 - Hai Nguyen, Katrin Franke, Slobodan Petrovic:

Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. 17-24
Network Security II
- Phongphun Kijsanayothin, Rattikorn Hewett:

Analytical Approach to Attack Graph Analysis for Network Security. 25-32 - Gregory Epiphaniou

, Carsten Maple, Paul Sant
, Matthew Reeve:
Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss. 33-40 - Klaus Hildebrandt, Igor Podebrad, Bernd Klauer:

A Computer Architecture with Hardwarebased Malware Detection. 41-45
Identity Management, Authentication, and Authorization I
- Alan H. Karp, Jun Li:

Solving the Transitive Access Problem for the Services Oriented Architecture. 46-53 - Byoungcheon Lee

:
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. 54-61 - Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek:

Secure Bindings of SAML Assertions to TLS Sessions. 62-69
Identity Management, Authentication, and Authorization II
- Yehia Elrakaiby

, Frédéric Cuppens, Nora Cuppens-Boulahia:
From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach. 70-78 - Anna Vapen, David Byers, Nahid Shahmehri:

2-clickAuth. 79-86 - Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Laurent Toutain:

Architecture-Aware Adaptive Deployment of Contextual Security Policies. 87-95
Availability and Reliability I
- Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka

:
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients. 96-103 - Alex Hai Wang, Su Yan, Peng Liu:

A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems. 104-111
Availability and Reliability II
- Fatima-Zohra Benhamida

, Yacine Challal
:
FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor Networks. 112-118 - Somayeh Bahramnejad

, Hamid R. Zarandi:
An Adaptive Redundancy Oriented Method to Tolerate Soft Errors in SRAM-Based FPGAs Using Unused Resources. 119-124 - Iman Faraji, Moslem Didehban, Hamid R. Zarandi:

Analysis of Transient Faults on a MIPS-Based Dual-Core Processor. 125-130
Risk and Security Management I
- Jan Paul Kolter, Michael Netter, Günther Pernul:

Visualizing Past Personal Data Disclosures. 131-139 - Bernard Stepien, Stan Matwin

, Amy P. Felty:
Strategies for Reducing Risks of Inconsistencies in Access Control Policies. 140-147 - Yudistira Asnar, Paolo Giorgini

:
Multi-dimensional Uncertainty Analysis in Secure and Dependable Domain. 148-155
Risk and Security Management II
- Achim D. Brucker

, Dieter Hutter
:
Information Flow in Disaster Management Systems. 156-163 - Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita

:
Formal Specification and Analysis of an E-voting System. 164-171 - Esma Aïmeur, Sébastien Gambs, Ai Ho:

Towards a Privacy-Enhanced Social Networking Site. 172-179
Risk and Security Management III
- Stefan Jakoubi, Simon Tjoa

, Sigrun Goluch
, Gerhard Kitzler:
A Formal Approach Towards Risk-Aware Service Level Analysis and Planning. 180-187 - Holger Schmidt:

Threat- and Risk-Analysis During Early Security Requirements Engineering. 188-195 - Shuhaili Talib

, Nathan L. Clarke
, Steven Furnell
:
An Analysis of Information Security Awareness within Home and Work Environments. 196-203
ARES 2010 Short Papers
Security and Privacy
- Poonam Gera, Kumkum Garg, Manoj Misra:

Trust Based Multi Path DSR Protocol. 204-209 - Rui Miguel Soares Silva

, Rui Gustavo Nunes Pereira Crespo, Mário Serafim dos Santos Nunes
:
Enhanced Chaotic Stream Cipher for WSNs. 210-215 - A. A. Adekunle, S. R. Woodhead:

Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms. 216-221
Identity Management, Authentication, and Authorization
- Stefan Durbeck, Christoph Fritsch, Günther Pernul, Rolf Schillinger:

A Semantic Security Architecture for Web Services. 222-227 - Thorsten Höllrigl

, Jochen Dinger, Hannes Hartenstein:
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management. 228-235 - Mohsen Saffarian, Babak Sadighi:

Owner-Based Role-Based Access Control OB-RBAC. 236-241
Cryptography and Secure Protocols
- Zeljko Vrba, Pål Halvorsen, Carsten Griwodz:

Program Obfuscation by Strong Cryptography. 242-247 - Nina Moebius, Kurt Stenzel, Wolfgang Reif

:
Pitfalls in Formal Reasoning about Security Protocols. 248-253 - Sigurd Eskeland, Vladimir A. Oleshchuk:

Secure Group Communication Using Fractional Public Keys. 254-257
Risk and Security Management
- Jan Willemson

:
Extending the Gordon and Loeb Model for Information Security Investment. 258-261 - Jocelyn Aubert

, Thomas Schaberreiter, Christophe Incoul, Djamel Khadraoui, Benjamin Gâteau:
Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures. 262-267 - Simon Tjoa

, Stefan Jakoubi, Sigrun Goluch
, Gerhard Kitzler:
Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach. 268-274
Miscellaneous
- Ronald Kainda, Ivan Flechais, A. W. Roscoe:

Security and Usability: Analysis and Evaluation. 275-282 - Matthew Simon, Jill Slay

:
Recovery of Skype Application Activity Data from Physical Memory. 283-288 - Arash Rezaei, Mohsen Sharifi

:
Rejuvenating High Available Virtualized Systems. 289-294
Fifth International Workshop on Frontiers in Availability, Reliability, and Security (FARES 2010 )
Fraud and Misuse Detection
- Raja Khurram Shahzad

, Syed Imran Haider, Niklas Lavesson
:
Detection of Spyware by Mining Executable Files. 295-302 - Gerardo Canfora

, Bice Cavallo
:
A Probabilistic Approach for On-Line Sum-Auditing. 303-308 - Mansoor Ahmed

, Amin Anjomshoaa
, Muhammad Asfand-e-yar, A Min Tjoa
, Abid Khan
:
Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop. 309-314
Intrusion Detection
- Hao Chen, John A. Clark, Siraj A. Shaikh

, Howard Chivers, Philip Nobles:
Optimising IDS Sensor Placement. 315-320 - Neminath Hubballi, Santosh Biswas, Sukumar Nandi

:
Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection. 321-326 - Jorge Blasco Alís

, Agustín Orfila, Arturo Ribagorda:
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming. 327-332
Privacy and Trust
- Martin Boldt

, Anton Borg
, Bengt Carlsson:
On the Simulation of a Software Reputation System. 333-340 - Yun Ding, Karsten Klein:

Model-Driven Application-Level Encryption for the Privacy of E-health Data. 341-346 - Tanveer A. Zia

, Md Zahidul Islam
:
Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks. 347-352
Global Information Security
- Solange Ghernaouti-Helie, Igli Tashi, David Simms:

A Multi-stage Methodology for Ensuring Appropriate Security Culture and Governance. 353-360 - Hiroshi Nagano:

Development of ICT Infrastructure for Local Socio-Economic System in Japan. 361-369 - Solange Ghernaouti-Helie:

A National Strategy for an Effective Cybersecurity Approach and Culture. 370-373
Software Security and Authentication
- Milos Milovanovic

, Marija Bogicevic
, Miroslav Lazovic, Dejan B. Simic, Dusan Starcevic:
Choosing Authentication Techniques in E-procurement System in Serbia. 374-379 - Ines Brosso, Alessandro La Neve, Graça Bressan

, Wilson Vicente Ruggiero
:
A Continuous Authentication System Based on User Behavior Analysis. 380-385 - Dejan Baca:

Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting. 386-390
Digital Content Security
- Laila El Aimani

, Yona Raekow:
Reselling Digital Content. 391-396 - Sascha Müller, Stefan Katzenbeisser:

A New DRM Architecture with Strong Enforcement. 397-403 - Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo, Silvio Causetti:

A Secure and Scalable Grid-Based Content Management System. 404-409 - Nils Gruschka, Meiko Jensen, Luigi Lo Iacono

:
A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages. 410-415
The Second International Workshop on Organizational Security Aspects (OSA 2010)
Organizational Aspects of Security: Session 1
- Juhani Anttila, Jorma Kajava:

Challenging IS and ISM Standardization for Business Benefits. 416-421 - Luis Enrique Sánchez

, Carlos Ruiz, Eduardo Fernández-Medina
, Mario Piattini
:
Managing the Asset Risk of SMEs. 422-429
Organizational Aspects of Security: Session 2
- André Miede, Nedislav Nedyalkov, Christian Gottron, André König, Nicolas Repp, Ralf Steinmetz

:
A Generic Metamodel for IT Security. 430-437 - Inger Anne Tøndel, Jostein Jensen, Lillian Røstad:

Combining Misuse Cases with Attack Trees and Security Activity Models. 438-445 - Virginia N. L. Franqueira

, André van Cleeff, Pascal van Eck, Roel J. Wieringa:
External Insider Threat: A Real Security Challenge in Enterprise Value Webs. 446-453
Organizational Aspects of Security: Session 3
- Kassidy P. Clark, Martijn Warnier

, Frances M. T. Brazier, Thomas B. Quillinan:
Secure Monitoring of Service Level Agreements. 454-461 - Jordan Crain, Lukasz Opyrchal, Atul Prakash

:
Fighting Phishing with Trusted Email. 462-467 - Matthias Kehlenbeck, Thorben Sandner, Michael H. Breitner

:
Application and Economic Implications of an Automated Requirement-Oriented and Standard-Based Compliance Monitoring and Reporting Prototype. 468-474
Organizational Aspects of Security: Session 4
- Lucie Langer, Axel Schmidt, Johannes Buchmann, Melanie Volkamer:

A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept. 475-480 - Kyawt Kyawt Khaing, Khin Mi Mi Aung

:
Secured Key Distribution Scheme for Cryptographic Key Management System. 481-486 - Natasha Bodorik, Nur Zincir-Heywood

:
One Size Fits None: The Importance of Detector Parameterization. 487-494
Fourth International Workshop on Secure Software Engineering (SecSE 2010 )
Agile Development and Hot Patching
- Steffen Bartsch:

Supporting Authorization Policy Modification in Agile Development of Web Applications. 495-500 - Richard Sasson, Martin Gilje Jaatun

, Jostein Jensen:
The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development. 501-506 - Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Michael E. Locasto:

Katana: A Hot Patching Framework for ELF Executables. 507-512
Testing, Monitoring, and Validation
- Federico Mancini, Dag Hovland

, Khalid A. Mughal:
Investigating the Limitations of Java Annotations for Input Validation. 513-518 - Hossain Shahriar

, Mohammad Zulkernine:
Classification of Buffer Overflow Vulnerability Monitors. 519-524 - Huning Dai, Christian Murphy, Gail E. Kaiser:

Configuration Fuzzing for Software Vulnerability Detection. 525-530
Security Modeling and Vulnerabilites
- Christian Jung

, Frank Elberzhager
, Alessandra Bagnato
, Fabio Raiteri:
Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project. 531-536 - Egil Trygve Baadshaug, Gencer Erdogan, Per Håkon Meland:

Security Modeling and Tool Support Advantages. 537-542 - Shamal Faily, Ivan Flechais:

Analysing and Visualising Security and Usability in IRIS. 543-548 - Ziyad S. Al-Salloum, Stephen D. Wolthusen:

Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. 549-554
Fourth International Workshop on Secure Systems Methodologies Using Patterns (SPattern 2010)
SPattern Application
- Yuki Shiroma, Hironori Washizaki

, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka
:
Model-Driven Security Patterns Application Based on Dependences among Patterns. 555-559 - Michael Netter, Eduardo B. Fernández

, Günther Pernul:
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. 560-564 - Eduardo B. Fernández

, Nobukazu Yoshioka
, Hironori Washizaki
, Michael VanHilst:
Measuring the Level of Security Introduced by Security Patterns. 565-568
SPattern Development
- Hans Löhr

, Ahmad-Reza Sadeghi, Marcel Winandy:
Patterns for Secure Boot and Secure Storage in Computer Systems. 569-573
Fourth International Workshop on Advances in Information Security (WAIS 2010)
Identity and Privacy
- Yoshio Kakizaki

, Keiichi Iwamura:
A Consideration of the Reliability of Registration and Attribute Exchange. 574-579 - Minh-Triet Tran

, Isao Echizen, Anh Duc Duong:
Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services. 580-585 - Mebae Ushida, Tetsuya Izu, Masahiko Takenaka, Kazuo Ohta:

Multiple Designated Verifiers Signatures Reconsidered. 586-590
System Security
- Takamasa Isohara, Keisuke Takemori, Yutaka Miyake, Ning Qu, Adrian Perrig:

LSM-Based Secure System Monitoring Using Kernel Protection Schemes. 591-596 - Grégoire Jacob, Eric Filiol

, Hervé Debar
:
Formalization of Viruses and Malware Through Process Algebras. 597-602 - Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, Masashi Fujiwara:

Heuristics for Detecting Botnet Coordinated Attacks. 603-607
Experimental and Physical Security
- Kitahiro Kaneda, Yuki Fujii, Keiichi Iwamura, Seiichiro Hangai:

An Improvement of Robustness Against Physical Attacks and Equipment Independence in Information Hiding Based on the Artificial Fiber Pattern. 608-612 - Ken Wakasa, Hiroaki Hazeyama, Toshifumi Kai, Akira Hashiguchi, Masaya Yamagata, Masahiko Fujinaga, Ryunosuke Ohshima, Takashi Shintani:

Large Scale Demonstration Experiments Towards Acheiving Practical Traceback on the Internet. 613-618 - Atsushi Waseda, Masahide Sasaki, Masahiro Takeoka, Mikio Fujiwara, Morio Toyoshima, Hidema Tanaka:

Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels. 619-624 - Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda:

Experimental Results on Cheon's Algorithm. 625-628
Third International Workshop on Digital Forensics (WSDF 2010)
Digital Forenisc Workshop: Session 1
- Grant Osborne, Benjamin P. Turnbull

, Jill Slay
:
The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation. 629-634 - Andrew Marrington

, George M. Mohay, Hasmukh Morarji, Andrew J. Clark:
A Model for Computer Profiling. 635-640 - Stefan Axelsson:

Using Normalized Compression Distance for Classifying File Fragments. 641-646
Digital Forenisc Workshop: Session 2
- Talania Grobler, C. P. Louwrens, Sebastiaan H. von Solms:

A Multi-component View of Digital Forensics. 647-652 - Chiew Kang Leng

, Josef Pieprzyk
:
Blind Steganalysis: A Countermeasure for Binary Image Steganography. 653-658 - Jorge Herrerías Guerrero, Roberto Gómez Cárdenas:

Log Analysis Towards an Automated Forensic Diagnosis System. 659-664
Digital Forenisc Workshop: Session 3
- Yinghua Guo, Jill Slay

:
A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools. 665-670 - Richard E. Overill, Jantje A. M. Silomon, Kam-Pui Chow:

A Complexity Based Model for Quantifying Forensic Evidential Probabilities. 671-676 - Talania Grobler, C. P. Louwrens, Sebastiaan H. von Solms:

A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations. 677-682 - Chiew Kang Leng

, Josef Pieprzyk
:
Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography. 683-688
Digital Forenisc Workshop Session 4
- Jason Howarth, Irfan Altas, Barney Dalgarno

:
Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI). 689-695 - Maximilian Bielecki, Gerald Quirchmayr:

A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results. 696-701 - Zahra Toony, Mansour Jamzad:

A Novel Image Hiding Scheme Using Content Aware Seam Carving Method. 702-707

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














