default search action
ARES 2008: Barcelona , Spain
- Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain. IEEE Computer Society 2008, ISBN 978-0-7695-3102-1
- Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli:
Securing Telehealth Applications in a Web-Based e-Health Portal. 3-9 - Andreas Janecek, Wilfried N. Gansterer, K. Ashwin Kumar:
Multi-Level Reputation-Based Greylisting. 10-17 - Kim Wuyts, Riccardo Scandariato, Geert Claeys, Wouter Joosen:
Hardening XDS-Based Architectures. 18-25 - Svein Yngvar Willassen:
Finding Evidence of Antedating in Digital Investigations. 26-32 - Navid Farazmand, Mahdi Fazeli, Seyed Ghassem Miremadi:
FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program Interruption. 33-38 - Bernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer:
Economic and Security Aspects of Applying a Threshold Scheme in e-Health. 39-46 - Mehdi Kiani, Andrew J. Clark, George M. Mohay:
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. 47-55 - Jehan-François Pâris, Thomas J. E. Schwarz:
On the Possibility of Small, Service-Free Disk Based Storage Systems. 56-63 - Heine Kolltveit, Svein-Olaf Hvasshovd:
Efficient High Availability Commit Processing. 64-71 - Alfredo Pironti, Riccardo Sisto:
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. 72-79 - Antonio Maña, Gimena Pujol:
Towards Formal Specification of Abstract Security Properties. 80-87 - Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani:
A Behavioral Model of Ideologically-motivated "Snowball" Attacks. 88-95 - Igor Siveroni, Andrea Zisman, George Spanoudakis:
Property Specification and Static Verification of UML Models. 96-103 - Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. 104-111 - Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. 112-119 - J. R. Juárez-Rodríguez, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil, Francesc D. Muñoz-Escoí:
A Database Replication Protocol Where Multicast Writesets Are Always Committed. 120-127 - Nataliia Bielova, Marco Dalla Torre, Nicola Dragoni, Ida Sri Rejeki Siahaan:
Matching Policies with Security Claims of Mobile Applications. 128-135 - David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. 136-143 - Amir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi:
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. 144-152 - Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. 153-160 - Esma Aïmeur, Gilles Brassard, José M. Fernandez, Flavien Serge Mani Onana, Zbigniew Rakowski:
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. 161-170 - Natsumi Kitajima, Yuichi Goto, Jingde Cheng:
Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems. 171-178 - Simon Tjoa, Stefan Jakoubi, Gerald Quirchmayr:
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology. 179-186 - Thomas Neubauer, Johannes Heurix:
Defining Secure Business Processes with Respect to Multiple Objectives. 187-194 - Denis Hatebur, Maritta Heisel, Holger Schmidt:
Analysis and Component-based Realization of Security Requirements. 195-203 - Yacine Bouzida, Christophe Mangin:
A Framework for Detecting Anomalies in VoIP Networks. 204-211 - Kuan-Ta Chen, Jing-Kai Lou:
Rapid Detection of Constant-Packet-Rate Flows. 212-220 - Andriy Panchenko, Lexi Pimenidis, Johannes Renner:
Performance Analysis of Anonymous Communication Channels Provided by Tor. 221-228 - Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca:
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets. 229-236 - William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. 237-244 - Yonghua You, Mohammad Zulkernine, Anwar Haque:
A Distributed Defense Framework for Flooding-Based DDoS Attacks. 245-252 - Liwen He, Paul Botham:
Pure MPLS Technology. 253-259 - Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He:
Symmetric Active/Active Replication for Dependent Services. 260-267 - Marcus Völp:
Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. 268-275 - David Byers, Nahid Shahmehri:
A Cause-Based Approach to Preventing Software Vulnerabilities. 276-283 - Shanai Ardi, Nahid Shahmehri:
Integrating a Security Plug-in with the OpenUP/Basic Development Process. 284-291 - Jostein Jensen:
A Novel Testbed for Detection of Malicious Software Functionality. 292-301 - Syrine Tlili, Mourad Debbabi:
Type and Effect Annotations for Safe Memory Access in C. 302-309 - Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Adaptabilty of a GP Based IDS on Wireless Networks. 310-318 - Liwei Kuang, Mohammad Zulkernine:
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. 319-326 - Lukasz Chmielewski, Jaap-Henk Hoepman:
Fuzzy Private Matching (Extended Abstract). 327-334 - Jens-Uwe Bußer, Steffen Fries, Martin Otto, Peter Hartmann:
Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge. 335-343 - Christian Schläger, Günther Pernul:
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. 344-351 - Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho:
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. 352-359 - José María de Fuentes, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda:
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. 363-368 - Josep M. Bernabé-Gisbert, Francesc D. Muñoz-Escoí:
Extending Mixed Serialisation Graphs to Replicated Environments. 369-375 - Frederic Stumpf, Claudia Eckert, Shane Balfe:
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. 376-382 - Alexandre Vorobiev, Rudolph E. Seviora:
Fuzzy Belief-Based Supervision. 383-389 - Rubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí:
Ensuring Progress in Amnesiac Replicated Systems. 390-396 - R. J. Hulsebosch, P. W. G. Ebben:
Enhancing Face Recognition with Location Information. 397-403 - Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer:
A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors. 404-409 - Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen:
Defending On-Line Web Application Security with User-Behavior Surveillance. 410-415 - Nelly A. Delessy, Eduardo B. Fernández:
A Pattern-Driven Security Process for SOA Applications. 416-421 - Pablo Neira Ayuso, Laurent Lefèvre, Denis Barbaron, Rafael M. Gasca:
Towards a Dependable Architecture for Highly Available Internet Services. 422-427 - Alan Stewart, Maurice Clint, Terry Harmer, Peter Kilpatrick, Ronald H. Perrott, Joaquim Gabarró:
Assessing the Reliability and Cost of Web and Grid Orchestrations. 428-433 - Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi:
Application-Oriented Trust in Distributed Computing. 434-439 - Bradley Markides, Marijke Coetzee:
BlueTrust in a Real World. 440-445 - Ananda Swarup Das, Jitu Kumar Keshri, Kannan Srinathan, Vaibhav Srivastava:
Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles. 446-451 - Thomas H. Morris, V. S. S. Nair:
Privacy Protected ELF for Private Computing on Public Platforms. 452-457 - Chih-Yin Lin:
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism. 458-460 - Xiaolei Li, Jin Tian, Tingdi Zhao:
An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200. 461-466 - Ryma Abassi, Sihem Guemara El Fatmi:
A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case. 467-472 - Guangyu He, Yingyou Wen, Hong Zhao:
SPIT Detection and Prevention Method in VoIP Environment. 473-478 - Ezzat Kirmani, Cynthia S. Hood:
A New Approach to Analysis of Interval Availability. 479-483 - Xiang-he Yang, Huaping Hu, Xin Chen:
SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol. 484-490 - Mehdi Dehbashi, Vahid Lari, Seyed Ghassem Miremadi, Mohammad Shokrollah-Shirazi:
Fault Effects in FlexRay-Based Networks with Hybrid Topology. 491-496 - Xun Yi, Mike Faulkner, Eiji Okamoto:
Secure Wireless Sensor Networks. 497-502 - Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa:
SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. 503-508 - Meiko Jensen, Nils Gruschka, Norbert Luttenberger:
The Impact of Flooding Attacks on Network-based Services. 509-513 - Emili Miedes, Francesc D. Muñoz-Escoí:
Managing Priorities in Atomic Multicast Protocols. 514-519 - Asier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez:
Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. 520-525 - Stefan Lindskog, Anna Brunström:
An End-to-End Security Solution for SCTP. 526-531 - Hongji Wang, Gang Yao, Qingshan Jiang:
An Identity-Based Group Key Agreement Protocol from Pairing. 532-537 - Gang Yao, Hongji Wang, Qingshan Jiang:
An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. 538-543 - Adel Almohammad, Robert M. Hierons, Gheorghita Ghinea:
High Capacity Steganographic Method Based Upon JPEG. 544-549 - Elisavet Konstantinou:
Cluster-based Group Key Agreement for Wireless Ad hoc Networks. 550-557 - Zhili Chen, Liusheng Huang, Zhenshan Yu, Lingjun Li, Wei Yang:
A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. 558-563 - Bo Zhang, Kai Han, Binoy Ravindran, E. Douglas Jensen:
RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks. 564-571 - Jan Willemson, Arne Ansper:
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. 572-577 - Liang Xiao, Javier Vicente, Carlos Sáez, Andrew Peet, Alex Gibb, Paul H. Lewis, Srinandan Dasmahapatra, Madalina Croitoru, Horacio González-Vélez, Magí Lluch i Ariet, David Dupplaw:
A Security Model and its Application to a Distributed Decision Support System for Healthcare. 578-585 - Salvador Cavadini, Diego Cheda:
Run-time Information Flow Monitoring based on Dynamic Dependence Graphs. 586-591 - Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli:
Automated Process Classi?cation Framework using SELinux Security Context. 592-596 - Judith E. Y. Rossebø, Rolv Bræk:
Using Composition Policies to Manage Authentication and Authorization Patterns and Services. 597-603 - Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo, Pakorn Leesutthipornchai:
Providing Fault Tolerance in Wireless Backhaul Network Design with Path Restoration. 604-609 - Adrian Frei, Marc Rennhard:
Histogram Matrix: Log File Visualization for Anomaly Detection. 610-617 - Salem Benferhat, Karim Tabia:
Context-based Profiling for Anomaly Intrusion Detection with Diagnosis. 618-623 - Ulf Larson, Erland Jonsson, Stefan Lindskog:
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection. 624-629 - Youhui Zhang, Hongyi Wang, Yu Gu, Dongsheng Wang:
IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI. 630-635 - Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani:
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. 636-641 - Gerald Madlmayr, Josef Langer, Christian Kantner, Josef Scharinger:
NFC Devices: Security and Privacy. 642-647 - Nima Mehdizadeh, Mohammad Shokrollah-Shirazi, Seyed Ghassem Miremadi:
Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessor. 648-652 - Guna Santos, Angelo Duarte, Dolores Rexachs, Emilio Luque:
Increasing the Performability of Computer Clusters Using RADIC II. 653-658 - Geoffroy Vallée, Kulathep Charoenpornwattana, Christian Engelmann, Anand Tikotekar, Chokchai Leangsuksun, Thomas J. Naughton, Stephen L. Scott:
A Framework for Proactive Fault Tolerance. 659-664 - Sanjam Garg, Huzur Saran:
Anti-DDoS Virtualized Operating System. 667-674 - Erin Farr, Richard E. Harper, Lisa Spainhower, Jimi Xenidis:
A Case for High Availability in a Virtualized Environment (HAVEN). 675-682 - Stéphane Onno:
A Federated Physical and Logical Access Control Enforcement Model. 683-692 - Octavian Catrina, Florian Kerschbaum:
Fostering the Uptake of Secure Multiparty Computation in E-Commerce. 693-700 - Rafael Martínez-Peláez, Cristina Satizábal, Francisco Rico-Novella, Jordi Forné:
Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols. 701-708 - Mathias Kohler, Andreas Schaad:
Avoiding Policy-based Deadlocks in Business Processes. 709-716 - Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura:
A Secure High-Speed Identification Scheme for RFID Using Bloom Filters. 717-722 - Youan Xiao:
New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. 723-726 - Qi Wang, Yonglong Luo, Liusheng Huang:
Privacy-preserving Protocols for Finding the Convex Hulls. 727-732 - Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi:
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. 733-740 - Ascensión Hernández Encinas, Ángel Martín del Rey, José Luis Pérez Iglesias, Gerardo Rodríguez Sánchez, Araceli Queiruga Dios:
Cryptographic Properties of Second-Order Memory Elementary Cellular Automata. 741-745 - Shengke Zeng, Mingxing He, Weidong Luo:
New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group. 746-751 - Christian Schläger, Ludwig Fuchs, Günther Pernul:
Intensive Programme on Information and Communication Security. 752-757 - Heinz Lothar Grob, Gereon Strauch, Christian Buddendick:
Applications for IT-Risk Management - Requirements and Practical Evaluation. 758-764 - Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse:
Security Analysis of Role-based Separation of Duty with Workflows. 765-770 - Stefan Böttcher, Rita Hartel, Matthias Kirschner:
Detecting Suspicious Relational Database Queries. 771-778 - Denis Royer:
Assessing the Value of Enterprise Identity Management (EIdM) - Towards a Generic Evaluation Approach. 779-786 - Mark E. Orwat, Timothy E. Levin, Cynthia E. Irvine:
An Ontological Approach to Secure MANET Management. 787-794 - Roland Donat, Laurent Bouillaut, Patrice Aknin, Philippe Leray:
Reliability Analysis using Graphical Duration Models. 795-800 - Mikel Larrea, Cristian Martín:
From Omega to ?P in the Crash-Recovery Failure Model with Unknown Membership. 801-806 - Mario Anzures-García, Luz A. Sánchez-Gálvez:
Policy-based Group Organizational Structure Management using an Ontological Approach. 807-812 - Carlos Blanco, Joaquín Lasheras, Rafael Valencia-García, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini:
A Systematic Review and Comparison of Security Ontologies. 813-820 - Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Context Ontology for Secure Interoperability. 821-827 - Kimmo Halunen, Pauli Rikula, Juha Röning:
On the Security of VSH in Password Schemes. 828-833