


default search action
ARES 2009: Fukoka, Japan
- Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan. IEEE Computer Society 2009, ISBN 978-1-4244-3572-2

Distributed Systems and Grid
- Yasuharu Katsuno, Yuji Watanabe, Michiharu Kudo, Eiji Okamoto:

A Pluggable Domain Management Approach for Building Practical Distributed Coalitions. 1-8 - Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa

, David Huemer:
Retaining Data Control to the Client in Infrastructure Clouds. 9-16 - Mehran Ahsant, Jim Basney:

Workflows in Dynamic and Restricted Delegation. 17-24
SOA Security
- Meiko Jensen, Jörg Schwenk:

The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. 25-32 - George Spanoudakis, Stephane LoPresti:

Web Service Trust: Towards a Dynamic Assessment Framework. 33-40 - Michael Menzel, Ivonne Thomas, Christoph Meinel:

Security Requirements Specification in Service-Oriented Business Process Management. 41-48
Enterprise Security 1
- Chunyan Mu, David Clark

:
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics. 49-57 - Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:

Deploying Security Policy in Intra and Inter Workflow Management Systems. 58-65 - Frank Innerhofer-Oberperfler, Ruth Breu:

An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents. 66-73
Intrusion and Fraud Detection
- Junghwan Rhee, Ryan D. Riley

, Dongyan Xu, Xuxian Jiang:
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. 74-81 - Markus Goldstein

, Matthias Reif, Armin Stahl, Thomas M. Breuel:
Server-Side Prediction of Source IP Addresses Using Density Estimation. 82-89 - Ying-Wei Kuo, Shou-Hsuan Stephen Huang:

Detecting Stepping-Stone Connection Using Association Rule Mining. 90-97
Enterprise Security 2
- Alexander Pretschner, Judith Rüesch, Christian Schaefer, Thomas Walter:

Formal Analyses of Usage Control Policies. 98-105 - Justin Leonard, Shouhuai Xu, Ravi S. Sandhu:

A First Step towards Characterizing Stealthy Botnets. 106-113 - Jaafar Almasizadeh, Mohammad Abdollahi Azgomi

:
Intrusion Process Modeling for Security Quantification. 114-121 - Ludwig Fuchs, Christian Broser, Günther Pernul:

Different Approaches to In-House Identity Management - Justification of an Assumption. 122-129
Digital Forensics and Security in Communication
- Ya-Fen Chang, Yen-Cheng Lai:

An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications. 130-134 - Ge Zhang, Simone Fischer-Hübner, Leonardo A. Martucci, Sven Ehlert:

Revealing the Calling History of SIP VoIP Systems by Timing Attacks. 135-142 - Benjamin P. Turnbull

, Robert Taylor, Barry Blundell:
The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime Data. 143-149 - Amirhossein Taherinia

, Mansour Jamzad:
A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising. 150-157
Availability and Reliability 1
- Xiao Xiao

, Tadashi Dohi
:
On Equilibrium Distribution Properties in Software Reliability Modeling. 158-165 - Alireza Rohani, Hamid R. Zarandi:

An Analysis of Fault Effects and Propagations in AVR Microcontroller ATmega103(L). 166-172 - Narate Taerat, Nichamon Naksinehaboon, Clayton Chandler, James Elliott, Chokchai Leangsuksun, George Ostrouchov, Stephen L. Scott, Christian Engelmann

:
Blue Gene/L Log Analysis and Time to Interrupt Estimation. 173-180
Cryptography
- Masami Izumi, Kazuo Sakiyama, Kazuo Ohta:

A New Approach for Implementing the MPL Method toward Higher SPA Resistance. 181-186 - Sandeep Hans, Sarat C. Addepalli, Anuj Gupta, Kannan Srinathan:

On Privacy Preserving Convex Hull. 187-192 - Bezawada Bruhadeshwar

, Kishore Kothapalli, M. Poornima, M. Divya:
Routing Protocol Security Using Symmetric Key Based Techniques. 193-200
Software Security 1
- David Byers, Nahid Shahmehri:

Prioritisation and Selection of Software Security Activities. 201-207 - Ping Chen, Yi Wang, Zhi Xin, Bing Mao, Li Xie:

BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. 208-215 - Pierre Parrend:

Enhancing Automated Detection of Vulnerabilities in Java Components. 216-223
Software Security 2
- Daniel Mellado, Jesús Rodríguez, Eduardo Fernández-Medina

, Mario Piattini
:
Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. 224-231 - Koen Buyens, Bart De Win, Wouter Joosen:

Identifying and Resolving Least Privilege Violations in Software Architectures. 232-239 - Gerardo Canfora

, Corrado Aaron Visaggio
, Vito Paradiso:
A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases. 240-247
Availability and Reliability 2
- Hiroshi Fujinoki:

Improving Reliability for Multi-home Inbound Traffic: MHLB/I Packet-Level Inter-domain Load-Balancing. 248-256 - Song Fu

, Cheng-Zhong Xu
:
Proactive Resource Management for Failure Resilient High Performance Computing Clusters. 257-264 - Mourad Elhadef

:
A Perceptron Neural Network for Asymmetric Comparison-Based System-Level Fault Diagnosis. 265-272 - Raimundo José de Araújo Macêdo

, Sérgio Gorender:
Perfect Failure Detection in the Partitioned Synchronous Distributed System Model. 273-280
Privacy and Trust
- Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula:

Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols. 281-288 - Hugo L. Jonker, Sjouke Mauw

, Jun Pang:
Measuring Voter-Controlled Privacy. 289-298 - Jan Paul Kolter, Günther Pernul:

Generating User-Understandable Privacy Preferences. 299-306 - George O. M. Yee:

An Automatic Privacy Policy Agreement Checker for E-services. 307-315
Dependable Systems and Trusted Computing 1
- Mohammad-Hamed Razmkhah, Seyed Ghassem Miremadi, Alireza Ejlali:

A Micro-FT-UART for Safety-Critical SoC-Based Applications. 316-321 - Thomas Butter, Markus Aleksy

:
MixVM - An Approach to Service Isolation and Data Protection in Mobile Context-Sensitive Applications. 322-328 - Jörn-Marc Schmidt, Stefan Tillich:

On the Security of Untrusted Memory. 329-334
Dependable Systems and Trusted Computing 2
- Pin Zhang, Xiangwei Kong:

Detecting Image Tampering Using Feature Fusion. 335-340 - Antonio Muñoz, Antonio Maña

, Daniel Serrano:
SecMiLiA: An Approach in the Agent Protection. 341-348 - Yi Wang, Ping Chen, Yi Ge, Bing Mao, Li Xie:

Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. 349-354
Software Security
- Hyung Chan Kim, Angelos D. Keromytis, Michael Covington, Ravi Sahita:

Capturing Information Flow with Concatenated Dynamic Taint Analysis. 355-362 - Thomas Heyman, Riccardo Scandariato, Wouter Joosen:

Risk-Driven Architectural Decomposition. 363-368 - Bezawada Bruhadeshwar

, Kishore Kothapalli, Maddi Sree Deepya:
Reducing the Cost of Session Key Establishment. 369-373
Privacy and Trust
- Tim Storer, Russell Lock:

Accuracy: The Fundamental Requirement for Voting Systems. 374-379 - Jostein Jensen, Inger Anne Tøndel, Martin Gilje Jaatun

, Per Håkon Meland, Herbjørn Andresen:
Reusable Security Requirements for Healthcare Applications. 380-385 - Maryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas:

P2F: A User-Centric Privacy Protection Framework. 386-391
Enterprise Security and Security Evaluation 1
- Wolfgang Boehmer:

Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001. 392-399 - Marcelo Masera, Igor Nai Fovino:

Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. 400-405 - Omar Khadeer Hussain

, Tharam S. Dillon:
Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method. 406-411
Enterprise Security and Security Evaluation 2
- Christophe Feltus

, Michaël Petit:
Building a Responsibility Model Including Accountability, Capability and Commitment. 412-419 - Antonio Muñoz, Antonio Maña

, Daniel Serrano:
AVISPA in the Validation of Ambient Intelligence Scenarios. 420-426 - Ryutaro Fujimoto, Hiroyuki Okamura

, Tadashi Dohi
:
Security Evaluation of an Intrusion Tolerant System with MRSPNs. 427-432 - Sebastian Mödersheim

:
Algebraic Properties in Alice and Bob Notation. 433-440
Availability and Reliability
- Ao Ma, Yang Yin, Wenwu Na, Xiaoxuan Meng, Qingzhong Bu, Lu Xu:

Scrubbing in Storage Virtualization Platform for Long-Term Backup Application. 441-447 - Mehrtash Manoochehri, Alireza Ejlali, Seyed Ghassem Miremadi:

Fault Tolerant and Low Energy Write-Back Heterogeneous Set Associative Cache for DSM Technologies. 448-453 - Ali Kanso, Maria Toeroe, Abdelwahab Hamou-Lhadj

, Ferhat Khendek
:
Generating AMF Configurations from Software Vendor Constraints and User Requirements. 454-461
Authentication and Authorization
- George Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, Lisa M. Marvel:

Using XACML for Embedded and Fine-Grained Access Control Policy. 462-468 - Somchart Fugkeaw

, Piyawit Manpanpanich, Sekpon Juntapremjitt:
A-COLD: Access Control of Web OLAP over Multi-data Warehouse. 469-474 - Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson:

Package-Role Based Authorization Control Model for Wireless Network Services. 475-480 - Mehran Ahsant, Esteban Talavera Gonzalez, Jim Basney:

Security Credential Mapping in Grids. 481-486
Cryptography 1
- Keita Emura

, Atsuko Miyaji
, Kazumasa Omote:
A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. 487-492 - Stefan Rass

, Peter Schartner:
Security in Quantum Networks as an Optimization Problem. 493-498 - Kimmo Halunen, Pauli Rikula, Juha Röning

:
Finding Preimages of Multiple Passwords Secured with VSH. 499-503
Cryptography 2
- Nurdan Buz Saran, Ali Doganaksoy:

Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack. 504-509 - Ganugula Umadevi, Sarat C. Addepalli, Kannan Srinathan:

Generalized Robust Combiners for Oblivious Transfer. 510-515
DAWAM 2009 - Security & Privacy Enhancement in DWHs
- Carlos Blanco

, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
, Juan Trujillo
, Mario Piattini
:
Including Security Rules Support in an MDA Approach for Secure DWs. 516-521 - Marcin Gorawski, Szymon Panfil:

A System of Privacy Preserving Distributed Spatial Data Warehouse Using Relation Decomposition. 522-527 - Carlos Blanco

, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
, Juan Trujillo
, Mario Piattini
:
Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. 528-533
DAWAM 2009 - Intrusion and Network Attack Prevention
- Fagen Li

, Masaaki Shirase, Tsuyoshi Takagi:
Identity-Based Hybrid Signcryption. 534-539 - Vik Tor Goh

, Jacob Zimmermann, Mark Looi:
Towards Intrusion Detection for Encrypted Networks. 540-545 - Virginia N. L. Franqueira

, Pascal van Eck, Roel J. Wieringa, Raul H. C. Lopes:
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation. 546-553
DAWAM 2009 - Dependability, Failure Analysis & Detection
- Toshiya Fujii, Tadashi Dohi

:
Statistical Failure Analysis of a Web Server System. 554-559 - Jun Li, Bryan Stephenson, Sharad Singhal:

A Policy Framework for Data Management in Services Marketplaces. 560-565 - Eduardo B. Fernández

, Nobukazu Yoshioka
, Hironori Washizaki
:
Modeling Misuse Patterns. 566-571 - (Withdrawn) Novel Algorithms for Subgroup Detection in Terrorist Networks. 572-577

FARES 2009 - Authentication and Authorization
- Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka:

QR-TAN: Secure Mobile Transaction Authentication. 578-583 - Xiaowei Shi, Fenlin Liu, Daofu Gong, Jing Jing:

An Authentication Watermark Algorithm for JPEG images. 584-588 - Amirhossein Taherinia

, Mehran Fotouhi, Mansour Jamzad:
A New Watermarking Attack Using Long-Range Correlation Image Restoration. 589-594
FARES 2009 - Security in Distributed Systems
- Frederik Orellana, Christian Ulrik Søttrup, Anders Wäänänen, Daniel Kalici, Michael Grønager:

The Case for a Simpler Security Model in Grid Computing. 595-599 - Sarat C. Addepalli, Piyush Bansal, Kannan Srinathan, K. Madhava Krishna:

Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots. 600-605 - Marco Descher, Thomas Feilhauer, Thomas Ludescher, Philip Masser, B. Wenzel, Peter Brezany, Ibrahim Elsayed, Alexander Wöhrer, A Min Tjoa

, David Huemer:
Position Paper: Secure Infrastructure for Scientific Data Life Cycle Management. 606-611
FARES 2009 - Software Security and Digital Forensics
- S. Hamid Amiri, Mansour Jamzad:

A Robust Image Watermarking Method in Wavelet Domain Using Genetic Algorithm. 612-617 - Alka Agrawal, Shalini Chandra

, Raees Ahmad Khan:
An Efficient Measurement of Object Oriented Design Vulnerability. 618-623 - Kenichi Yajima, Shoichi Morimoto, Daisuke Horie, Noor Sheila Azreen, Yuichi Goto

, Jingde Cheng:
FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408. 624-629
FARES 2009 - Dependability Aspects
- Bagher Rahimpour Cami, Mohammad Reza Matash Brujerdi:

Using Hybrid Trust Model for Handling Inaccurate Resource. 630-634 - Alireza Namazi, Seyed Ghassem Miremadi, Alireza Ejlali:

A High Speed and Low Cost Error Correction Technique for the Carry Select Adder. 635-640 - Youcheng Chen, Mohammad Reza Selim, Yuichi Goto

, Jingde Cheng:
An Improvement of REM: A Replication Oriented Event-Based Middleware. 641-646
GloSec 2009
- Xianglin Deng, Malcolm Shore:

Advanced Flooding Attack on a SIP Server. 647-651 - Sopheak Cheang, Sinawong Sang:

State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia. 652-657 - Solange Ghernaouti-Helie:

An Inclusive Information Society Needs a Global Approach of Information Security. 658-662 - Binbin Wang, Zhitang Li, Hao Tu, Jie Ma:

Measuring Peer-to-Peer Botnets Using Control Flow Stability. 663-669 - Igli Tashi:

Regulatory Compliance and Information Security Assurance. 670-674 - David John Simms:

Information Security Optimization: From Theory to Practice. 675-680
IWSS 2009 - Security in Ad Hoc and Mesh Networks
- Vegar Westerlund, Thomas Pronstad, Inger Anne Tøndel, Leendert W. M. Wienhofen:

Trusting User Defined Context in MANETs: Experience from the MIDAS Approach. 681-686 - Mohaned Kafi, Sylvain Guilley, Sandra Marcello, David Naccache:

Deconvolving Protected Signals. 687-694
IWSS 2009 - Security in Contactless Systems
- Collin Mulliner:

Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones. 695-700 - Vincent Alimi, Marc Pasquet:

Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element. 701-705 - George Poulopoulos, Konstantinos Markantonakis

, Keith Mayes:
A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems. 706-711
OSA 2009 - Risk Management
- Gholamreza Latif Shabgahi, F. Tajarrod:

A New Approach for the Construction of Fault Trees from System Simulink. 712-717 - Siv Hilde Houmb, Virginia N. L. Franqueira

:
Estimating ToE Risk Level Using CVSS. 718-725 - Amril Syalim, Yoshiaki Hori, Kouichi Sakurai:

Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. 726-731
OSA 2009 - Security Management and Education
- Juhani Anttila, Jorma Kajava:

Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments. 732-737 - Ronald C. Dodge, Brian Hay, Kara L. Nance:

Standards-Based Cyber Exercises. 738-743 - Luanna Lopes Lobato, Eduardo B. Fernández

, Sérgio Donizetti Zorzo:
Patterns to Support the Development of Privacy Policies. 744-749
OSA 2009 - Security Mangement
- Sebastian Sowa, Roland Gabriel:

Multidimensional Management of Information Security - A Metrics Based Approach Merging Business and Information Security Topics. 750-755 - Igli Tashi, Solange Ghernaouti-Helie:

A Security Management Assurance Model to Holistically Assess the Information Security Posture. 756-761 - Christophe Feltus

, Christophe Incoul, Jocelyn Aubert
, Benjamin Gâteau, André Adelsbach, Marc Camy:
Methodology to Align Business and IT Policies: Use Case from an IT Company. 762-767
RIBC 2009 - Authentication, Watermarking and Steganography
- Claude Carlet:

On the Higher Order Nonlinearities of Boolean Functions and S-boxes. 768 - Keita Emura

, Atsuko Miyaji
, Kazumasa Omote:
A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. 769-773 - Kotaro Yamamoto, Munetoshi Iwakiri:

A Standard MIDI File Steganography Based on Fluctuation of Duration. 774-779 - Kohei Tatara, Kouichi Sakurai:

A Signature Scheme Associated with Universal Re-signcryption. 780-785
RIBC 2009 - Authentication, Watermarking and Cryptosystems
- Kotaro Yamamoto, Munetoshi Iwakiri:

Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument. 786-791 - Hiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, Yoshio Yoshioka:

A Reconfigurable-Permutation Algorithm for M_S-Box. 792-797
SecSE 2009 - Education and Other Vulnerabilities
- Yves Younan, Frank Piessens, Wouter Joosen:

Protecting Global and Static Variables from Buffer Overflow Attacks. 798-803 - Dejan Baca, Kai Petersen

, Bengt Carlsson, Lars Lundberg:
Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter? 804-810 - Øyvind Nerbråten, Lillian Røstad:

hACMEgame: A Tool for Teaching Software Security. 811-816
SecSE 2009 - Secure Software-Development Lifecycles and Reuse
- Ilkka Uusitalo, Kaarina Karppinen, Pasi Ahonen, Heimo Pentikäinen:

Towards Evaluation of Security Assurance during the Software Development Lifecycle. 817-822 - Per Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios

, Txus Sanchez, Nahid Shahmehri, Inger Anne Tøndel:
An Architectural Foundation for Security Model Sharing and Reuse. 823-828 - Francisco José Barreto Nunes, Arnaldo Dias Belchior, Adriano Bessa Albuquerque:

A Knowledge Management Approach to Support a Secure Software Development. 829-834
SecSE 2009 - Model-Driven Development and Checklists
- Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi

:
A Practical Framework for the Dataflow Pointcut in AspectJ. 835-840 - Nina Moebius, Kurt Stenzel, Holger Grandy, Wolfgang Reif

:
SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. 841-846 - Kim Wuyts

, Riccardo Scandariato, Bart De Decker, Wouter Joosen:
Linking Privacy Solutions to Developer Goals. 847-852 - Frank Elberzhager

, Alexander Klaus, Marek Jawurek:
Software Inspections Using Guided Checklists to Ensure Security Goals. 853-858
SecUSAB 2009
- Filippo Chiariglione, Giacomo Cosenza, Sergio Matone:

Managing Rights and Value of Digital Media. 859-864 - Charlott Eliasson, Markus Fiedler, Ivar Jørstad:

A Criteria-Based Evaluation Framework for Authentication Schemes in IMS. 865-869 - Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon:

The User-Centric Vision Matches Credentials Exchanges. 870-876 - Lillian Røstad, Ole Andreas Alsos:

Patient-Administered Access Control: A Usability Study. 877-881 - Noam Ben-Asher, Joachim Meyer, Sebastian Möller, Roman Englert:

An Experimental System for Studying the Tradeoff between Usability and Security. 882-887
WAIS 2009 - Security Analysis
- Vicenç Torra

:
Rank Swapping for Partial Orders and Continuous Variables. 888-893 - Marko Hölbl

, Tatjana Welzer:
An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange. 894-898 - Tatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:

Security Analysis for P2P Routing Protocols. 899-904
WAIS 2009 - Network Security
- Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai:

Secrecy Capacity of Wireless LAN. 905-910 - Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada:

Privacy-Preserving Collaborative Filtering Schemes. 911-916 - Justin Leonard, Shouhuai Xu, Ravi S. Sandhu:

A Framework for Understanding Botnets. 917-922
WAIS 2009 - Signature and Protection
- Chia-Chen Lin

, Shih-Chi Wu, Po-Hsuan Chiang, Chang-Chi Chen:
Enterprise-Oriented Digital Rights Management Mechanism: eDRM. 923-928 - Javier Jiménez, Vicenç Torra

:
Utility and Risk of JPEG-Based Continuous Microdata Protection Methods. 929-934 - Yuh-Min Tseng, Tsu-Yang Wu

, Jui-Di Wu:
Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings. 935-940 - Tetsuya Izu, Noboru Kunihiro

, Kazuo Ohta, Makoto Sano, Masahiko Takenaka:
Yet Another Sanitizable Signature from Bilinear Maps. 941-946
WAIS 2009 - Secure Systems
- Aïda Valls

, Cristina Gómez-Alonso, Vicenç Torra
:
Generation of Prototypes for Masking Sequences of Events. 947-952 - Christian A. Schneider, Frederic Stumpf, Claudia Eckert:

Enhancing Control of Service Compositions in Service-Oriented Architectures. 953-959 - Chun-I Fan, Ming-Te Chen, Lung-Hsien Chen:

Truly Anonymous Paper Submission and Review Scheme. 960-965 - Genta Iha, Hiroshi Doi:

An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers. 966-971
WAIS 2009 - Information Security
- Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai:

Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. 972-977 - Frédéric Majorczyk, Jonathan-Christofer Demay:

Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems. 978-983 - Yoshio Kakizaki

, Yoshiaki Yoshida, Hidekazu Tsuji:
An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information. 984-989 - Masakatsu Nishigaki

, Takumi Yamamoto:
Making Use of Human Visual Capability to Improve Information Security. 990-994
WSDF 2009 - Digital Forensics
- Matthew Simon, Jill Slay

:
Enhancement of Forensic Computing Investigations through Memory Forensic Techniques. 995-1000 - Jooyoung Lee, Sungkyung Un, Dowon Hong

:
Improving Performance in Digital Forensics: A Case Using Pattern Matching Board. 1001-1005 - Jigang Liu, Tetsutaro Uehara

:
Computer Forensics in Japan: A Preliminary Study. 1006-1011 - Grant Osborne, Benjamin P. Turnbull

:
Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. 1012-1017 - Shanai Ardi, Nahid Shahmehri:

A Post-Mortem Incident Modeling Method. 1018-1023 - Kara L. Nance, Brian Hay, Matt Bishop

:
Investigating the Implications of Virtual Machine Introspection for Digital Forensics. 1024-1029

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














