Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria. IEEE Computer Society 2007
BibTeX
Session 1: Trust Model & Trust Management
- Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell:
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. 3-10
Electronic Edition (link) BibTeX - Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone:
From Trust to Dependability through Risk Analysis. 19-26
Electronic Edition (link) BibTeX - Jatinder Singh, Jean Bacon, Ken Moody:
Dynamic trust domains for secure, private, technology-assisted living. 27-34
Electronic Edition (link) BibTeX - Ching Lin, Vijay Varadharajan:
A Hybrid Trust Model for Enhancing Security in Distributed Systems. 35-42
Electronic Edition (link) BibTeX - Wilfried N. Gansterer, Andreas Janecek, Peter Lechner:
A Reliable Component-Based Architecture for E-Mail Filtering. 43-52
Electronic Edition (link) BibTeX
Session 2: Availability, Fault-Tolerant & Recovery
- Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Goeschka:
Availability and Performance of the Adaptive Voting Replication. 53-60
Electronic Edition (link) BibTeX - Marcin Gorawski, Pawel Marks:
Distributed Stream Processing Analysis in High Availability Context. 61-68
Electronic Edition (link) BibTeX - Stefan Beyer, Francesc D. Muñoz-Escoí, Pablo Galdámez:
Implementing Network Partition-Aware Fault-Tolerant CORBA Systems. 69-76
Electronic Edition (link) BibTeX - Bin Rong, Fred Douglis, Cathy H. Xia, Zhen Liu:
Failure Recovery in Cooperative Data Stream Analysis. 77-84
Electronic Edition (link) BibTeX - José Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Bettina Kemme:
A Recovery Protocol for Middleware Replicated Databases Providing GSI. 85-92
Electronic Edition (link) BibTeX - Rubén de Juan-Marín, Hendrik Decker, Francesc D. Muñoz-Escoí:
Revisiting Hot Passive Replication. 93-102
Electronic Edition (link) BibTeX
Session 3: Reputation Management & Trust
Session 4: Privacy & Access Control
Session 5: Failure Detection & Attack Prevention
Session 6: Authentication & Authorisation
Session 7: Security Algorithm & Framework
Session 8: Software Security
- David Byers, Nahid Shahmehri:
Design of a Process for Software Security. 301-309
Electronic Edition (link) BibTeX - Christoph Krauß, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert:
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. 310-317
Electronic Edition (link) BibTeX - Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck:
A secure architecture for the pseudonymization of medical data. 318-324
Electronic Edition (link) BibTeX - Thomas Nowey, Hannes Federrath:
Collection of Quantitative Data on Security Incidents. 325-334
Electronic Edition (link) BibTeX
Session 9: Security Models
- Suranjith Ariyapperuma, Chris J. Mitchell:
Security vulnerabilities in DNS and DNSSEC. 335-342
Electronic Edition (link) BibTeX - David Arsenault, Arun Sood, Yih Huang:
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). 343-350
Electronic Edition (link) BibTeX - Raihan Al-Ekram, Richard C. Holt, Chris Hobbs:
Applying a Tradeoff Model (TOM) to TACT. 351-355
Electronic Edition (link) BibTeX - Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Pattern System for Security Requirements Engineering. 356-365
Electronic Edition (link) BibTeX - Stefan Durbeck, Rolf Schillinger, Jan Kolter:
Security Requirements for a Semantic Service-oriented Architecture. 366-373
Electronic Edition (link) BibTeX - Ludwig Fuchs, Günther Pernul:
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. 374-384
Electronic Edition (link) BibTeX
Session 10: Miscellaneous Security Techniques
- Vidar Evenrud Seeberg, Slobodan Petrovic:
A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. 385-390
Electronic Edition (link) BibTeX - Valentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina:
Static evaluation of Certificate Policies for GRID PKIs interoperability. 391-399
Electronic Edition (link) BibTeX - Mansoor Ahmed, Amin Andjomshoaa, Tho Manh Nguyen, A. Min Tjoa:
Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE. 400-407
Electronic Edition (link) BibTeX - TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang:
Universally Composable Three-Party Key Distribution. 408-416
Electronic Edition (link) BibTeX
Session 11: eAuction & eVoting Protocol
Session 12: Dependability in Distributed & Ubiquitous Computing
Session 13: Anomaly & Intrusion Detection
International Symposium on Frontiers in Availability, Reliability and Security (FARES)
Session 1: Fault-Tolerant & Availability
Session 2: Access Control
Session 3: Authentication
Session 4: Real-Time System & Sensor Network
Session 5: RFID Techniques & Applications
Session 6: Secure Solution & Applications
Session 7: Security Issue in Business Management
Session 8: Web, XML, Content Management
Session 9: Security Policies & Techniques
Session 10: Trust Management & Trust Model
Session 11: Miscellaneous Applications
- Mohammad Feroz Raihan, Mohammad Zulkernine:
AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. 775-782
Electronic Edition (link) BibTeX - Niraj Swami, Sheikh Iqbal Ahamed:
Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments. 783-790
Electronic Edition (link) BibTeX - Rafael Páez, Cristina Satizábal, Jordi Forné:
A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. 791-798
Electronic Edition (link) BibTeX - C. Mauri, Toni Granollers, A. Solanas:
On the Assessment of the Interaction Quality of Users with Cerebral Palsy. 799-805
Electronic Edition (link) BibTeX - Chaobo Yang, Ming Qi:
Research and Design of Mobile Impeachment System with Semi-cryptonym. 806-811
Electronic Edition (link) BibTeX - Shu-Ching Wang, Shyi-Ching Liang, Kuo-Qin Yan, Guang-Yan Zheng:
Efficient Malicious Agreement in a Virtual Subnet Network. 812-820
Electronic Edition (link) BibTeX
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)
- Bhavani M. Thuraisingham, Srinivasan Iyer:
Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. 821-828
Electronic Edition (link) BibTeX - Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Application of QVT for the Development of Secure Data Warehouses: A case study. 829-836
Electronic Edition (link) BibTeX - Marcin Gorawski, Jakub Bularz:
Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. 837-844
Electronic Edition (link) BibTeX - Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Giuliano Bellone de Grecis, Flaviano Fiorino:
Applying a Flexible Mining Architecture to Intrusion Detection. 845-852
Electronic Edition (link) BibTeX - Veselina G. Jecheva, Evgeniya P. Nikolova:
An Application of Learning Problem in Anomaly-based Intrusion Detection Systems. 853-860
Electronic Edition (link) BibTeX - Nasrullah Memon, Kim C. Kristoffersen, David L. Hicks, Henrik Legind Larsen:
Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. 861-870
Electronic Edition (link) BibTeX - Lillian Røstad, Øystein Nytrø:
Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges. 871-878
Electronic Edition (link) BibTeX - Dalia El-Mansy, Ahmed Sameh:
A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace. 878-885
Electronic Edition (link) BibTeX - Calin Ciufudean, Bianca Satco, Constantin Filote:
Reliability Markov Chains for Security Data Transmitter Analysis. 886-894
Electronic Edition (link) BibTeX
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)
- Melanie Volkamer, Margaret McGaley:
Requirements and Evaluation Procedures for eVoting. 895-902
Electronic Edition (link) BibTeX - Orhan Cetinkaya, Deniz Cetinkaya:
Towards Secure E-Elections in Turkey: Requirements and Principles. 903-907
Electronic Edition (link) BibTeX - Stefan G. Weber, Roberto Araujo, Johannes Buchmann:
On Coercion-Resistant Electronic Elections with Linear Work. 908-916
Electronic Edition (link) BibTeX - Mariagrazia Fugini:
A Security Model and Architecture for Multichannel E-Government Systems. 917-924
Electronic Edition (link) BibTeX - Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben:
eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. 925-933
Electronic Edition (link) BibTeX - Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair:
Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies. 934-940
Electronic Edition (link) BibTeX - Martijn Warnier, Frances M. T. Brazier, Martin Apistola, Anja Oskamp:
Secure Distributed Dossier Management in the Legal Domain. 941-947
Electronic Edition (link) BibTeX - Elsa Estevez, Tomasz Janowski:
Building a Dependable Messaging Infrastructure for Electronic Government. 948-958
Electronic Edition (link) BibTeX
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)
- Rachid Guerraoui, Michel Raynal:
A Universal Construction for Concurrent Objects. 959-966
Electronic Edition (link) BibTeX - Bastian Braun:
FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance. 967-974
Electronic Edition (link) BibTeX - Cristian Martín, Mikel Larrea, Ernesto Jiménez:
On the implementation of the Omega failure detector in the crash-recovery failure model. 975-982
Electronic Edition (link) BibTeX - Mourad Elhadef, Azzedine Boukerche, Hisham Elkadiki:
Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach. 983-990
Electronic Edition (link) BibTeX - Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuven Yagel:
Self-Stabilization as a Foundation for Autonomic Computing. 991-998
Electronic Edition (link) BibTeX - Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He:
On Programming Models for Service-Level High Availability. 999-1008
Electronic Edition (link) BibTeX
First International Workshop on Secure Software Engineering (SecSE 2007)
- Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. 1009-1017
Electronic Edition (link) BibTeX - Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri:
How can the developer benefit from security modeling? 1017-1025
Electronic Edition (link) BibTeX - Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien:
AProSec: an Aspect for Programming Secure Web Applications. 1026-1033
Electronic Edition (link) BibTeX - Koen Buyens, Bart De Win, Wouter Joosen:
Empirical and statistical analysis of risk analysis-driven techniques for threat management. 1034-1041
Electronic Edition (link) BibTeX - Takao Okubo, Hidehiko Tanaka:
Secure Software Development through Coding Conventions and Frameworks. 1042-1051
Electronic Edition (link) BibTeX - Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean Smith:
Pastures: Towards Usable Security Policy Engineering. 1052-1059
Electronic Edition (link) BibTeX - Kaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala:
Security Objectives within a Security Testing Case Study. 1060-1065
Electronic Edition (link) BibTeX - Chengying Mao, Yansheng Lu:
CppTest: A Prototype Tool for Testing C/C++ Programs. 1066-1073
Electronic Edition (link) BibTeX - Dragan Vidakovic, Dejan Simic:
A Novel Approach to Building Secure Systems. 1074-1084
Electronic Edition (link) BibTeX
Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)
First International Workshop on Advances in Information Security (WAIS 2007)
- Alexander Krizhanovsky, Alexander Marasanov:
An Approach for Adaptive Intrusion Prevention Based on The Danger. 1135-1142
Electronic Edition (link) BibTeX - Rene Mayrhofer, Martyn Welch:
A Human-Verifiable Authentication Protocol Using Visible Laser Light. 1143-1148
Electronic Edition (link) BibTeX - Chik How Tan:
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. 1148-1154
Electronic Edition (link) BibTeX - Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki:
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. 1155-1159
Electronic Edition (link) BibTeX - Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai:
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. 1160-1166
Electronic Edition (link) BibTeX - Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama:
Analysis on Bleichenbacher's Forgery Attack. 1167-1174
Electronic Edition (link) BibTeX - Yoshio Kakizaki, Hidekazu Tsuji:
A New Method for Reducing the Revocation Delay in the Attribute Authentication. 1175-1182
Electronic Edition (link) BibTeX - Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota:
Efficient Multiparty Computation for Comparator Networks. 1183-1189
Electronic Edition (link) BibTeX - Orhan Cetinkaya, Ali Doganaksoy:
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. 1190-1196
Electronic Edition (link) BibTeX - Anders Moen Hagalisletto:
Attacks are Protocols Too. 1197-1206
Electronic Edition (link) BibTeX - Luis Zarza, Josep Pegueroles, Miguel Soriano:
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. 1207-1213
Electronic Edition (link) BibTeX - Bogdan Groza, Toma-Leonida Dragomir:
On the use of one-way chain based authentication protocols in secure control systems. 1214-1221
Electronic Edition (link) BibTeX - Nenad Stojanovski, Marjan Gusev, Danilo Gligoroski, Svein J. Knapskog:
Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. 1222-1226
Electronic Edition (link) BibTeX - Dong Seong Kim, Taek-Hyun Shin, Jong Sou Park:
A Security Framework in RFID Multi-domain System. 1227-1234
Electronic Edition (link) BibTeX
Workshop on "Security in E-Learning" (SEL)