


default search action
7. ARES 2012: Prague, Czech Republic
- Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2244-7

Full Papers
Security as Quality Property
- Jason L. Wright

, Miles McQueen, Lawrence Wellman:
Analyses of Two End-User Software Vulnerability Exposure Metrics. 1-10 - Yue Ma, Wei Jiang, Nan Sang, Ziguo Zhong:

An Adaptive Risk Control and Security Management for Embedded Real-Time System. 11-17 - Mourad Elhadef

:
Using Linear Support Vector Machines to Solve the Asymmetric Comparison-Based Fault Diagnosis Problem. 18-27
Aspects of Privacy
- Stanislaus Stelle, Mark Manulis

, Matthias Hollick
:
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach. 28-37 - Thomas Plos, Christian Maierhofer:

On Measuring the Parasitic Backscatter of Sensor-Enabled UHF RFID Tags. 38-46 - Raja Khurram Shahzad

, Niklas Lavesson
:
Veto-based Malware Detection. 47-54
Cryptography
- Noura Al Ebri, Joonsang Baek

, Abdulhadi Shoufan
, Quang Hieu Vu:
Efficient Generic Construction of Forward-Secure Identity-Based Signature. 55-64 - David Cadé, Bruno Blanchet:

From Computationally-proved Protocol Specifications to Implementations. 65-74 - Amir Herzberg

, Haya Schulmann:
Oblivious and Fair Server-Aided Two-Party Computation. 75-84
Privacy Enhancing Technologies
- Xihui Chen, Gabriele Lenzini, Sjouke Mauw

, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. 85-93 - Stefan Rass

, Peter Schartner, Raphael Wigoutschnigg, Christian Kollmitzer:
Anonymous Communication by Branch-and-Bound. 94-102 - Moritz Riesner, Michael Netter

, Günther Pernul:
An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites. 103-112
Authorization and Authentication
- Anne Baumgrass, Mark Strembeck:

An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides. 113-122 - Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro

:
Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications. 123-132 - Stefan Craß, Tobias Dönz, Gerson Joskowicz, Eva Kühn:

A Coordination-Driven Authorization Framework for Space Containers. 133-142
Short Papers
Software Security
- Rui Wu, Ping Chen, Bing Mao, Li Xie:

RIM: A Method to Defend from JIT Spraying Attack. 143-148 - Anja Strunk, Marc Mosch, Stephan Groß, Yvonne Thoß, Alexander Schill:

Building a Flexible Service Architecture for User Controlled Hybrid Clouds. 149-154 - Marijke Coetzee

:
Towards a Holistic Information Security Governance Framework for SOA. 155-160
Security and Usability
- Bernard Stepien, Stan Matwin

, Amy P. Felty:
An Algorithm for Compression of XACML Access Control Policy Sets by Recursive Subsumption. 161-167 - Anton Borg

, Niklas Lavesson:
E-mail Classification Using Social Network Information. 168-173 - Rakesh M. Verma

, Narasimha K. Shashidhar, Nabil Hossain:
Two-Pronged Phish Snagging. 174-179
Security in Electronic Services and Mobile Services
- Stephan Neumann, Melanie Volkamer:

Civitas and the Real World: Problems and Solutions from a Practical Point of View. 180-185 - Ali Fawzi Najm Al-Shammari

, Adolfo Villafiorita
, Komminist Weldemariam:
Understanding the Development Trends of Electronic Voting Systems. 186-195 - Federico Mancini, Samson Gejibo, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr:

Secure Mobile Data Collection Systems for Low-Budget Settings. 196-205
Security Control
- Jean Michel Combes, Ghada Arfaoui

, Maryline Laurent
:
Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration Context. 206-211 - Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone

:
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. 212-217 - Zonghua Zhang

, Shuzhen Wang:
Boosting Logical Attack Graph for Efficient Security Control. 218-223 - Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande

:
High Level Model of Control Flow Attacks for Smart Card Functional Security. 224-229
Security Studies
- Jostein Jensen:

Federated Identity Management Challenges. 230-235 - Amanda Sávio Nascimento

, Fernando Castor
, Cecília M. F. Rubira
, Rachel Burrows:
An Empirical Study on Design Diversity of Functionally Equivalent Web Services. 236-241 - Kristian Beckers, Stephan Faßbender, Maritta Heisel, Holger Schmidt:

Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation. 242-248
Network Analysis and Security
- Amine Belabed, Esma Aïmeur, Mohammed Amine Chikh:

A Personalized Whitelist Approach for Phishing Webpage Detection. 249-254 - Christian Winter, Markus Schneider, York Yannikos

:
Model-Based Digit Analysis for Fraud Detection Overcomes Limitations of Benford Analysis. 255-261 - Amir Herzberg

, Haya Schulmann:
Antidotes for DNS Poisoning by Off-Path Adversaries. 262-267
Cloud Security and Analysis
- Itziar Arrieta-Salinas, José Enrique Armendáriz-Iñigo

, Joan Navarro
:
Classic Replication Techniques on the Cloud. 268-273 - Thanadech Thanakornworakij, Raja Nassar, Chokchai Leangsuksun, Mihaela Paun

:
An Economic Model for Maximizing Profit of a Cloud Service Provider. 274-279 - Thomas Ludescher, Thomas Feilhauer, Peter Brezany:

Security Concept and Implementation for a Cloud Based E-science Infrastructure. 280-285
Seventh International Workshop on Frontiers in Availability, Reliability, and Security (FARES 2012)
Risk Assessment, Security Measurement, and Embedded Security
- Marianne Azer

, Ahmed Shaker, Sherif Nagy, Ahmed Raafat, Mohamad M. Abuzaid:
Organizational Risk Assessment Based on Attacks Repetition. 286-290 - Manuel Rudolph, Reinhard Schwarz:

A Critical Survey of Security Indicator Approaches. 291-300 - Hossein Khezripour, Saadat Pourmozaffari:

Fault Tolerance and Power Consumption Analysis on Chip-Multi Processors Architectures. 301-306
Privacy
- Stefan Hofbauer

, Kristian Beckers, Gerald Quirchmayr:
A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems. 307-316 - Karin Bernsmed, Inger Anne Tøndel, Åsmund Ahlmann Nyre:

Design and Implementation of a CBR-based Privacy Agent. 317-326 - Kirsi Helkala

:
Disabilities and Authentication Methods: Usability and Security. 327-334 - Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci:

Privacy Policy Preferences Enforced by SPARQL Query Rewriting. 335-342
Cloud Computing and Social Networks
- Canh Ngo, Peter Membrey

, Yuri Demchenko
, Cees de Laat:
Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud Infrastructures. 343-349 - Peter Membrey

, Keith C. C. Chan
, Canh Ngo, Yuri Demchenko
, Cees de Laat:
Trusted Virtual Infrastructure Bootstrapping for On Demand Services. 350-357 - Hoang-Quoc Nguyen-Son, Quoc-Binh Nguyen

, Minh-Triet Tran
, Dinh-Thuc Nguyen, Hiroshi Yoshiura, Isao Echizen:
Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure. 358-364
First International Workshop on Security of Mobile Applications (IWSMA 2012)
- Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui

, Maryline Laurent
:
E2E: An Optimized IPsec Architecture for Secure and Fast Offload. 365-374 - Lin Yao, Chi Lin, Guangya Liu, Fangyu Deng, Guowei Wu:

Location Anonymity Based on Fake Queries in Continuous Location-Based Services. 375-382 - Mohamad M. Abuzaid, Marianne A. Azer

:
Janitor, Certificate and Jury (JCJ) Trust Scheme for Wireless Ad-hoc Networks. 383-387 - Pascal Berthomé, Thomas Fécherolle, Nicolas Guilloteau, Jean-François Lalande

:
Repackaging Android Applications for Auditing Access to Private Data. 388-396
First International Workshop on Modern Cryptography and Security Engineering (MoCrySEN 2012)
Modern Cryptography
- Aleksandar Kircanski, Amr M. Youssef:

On the Weak State in GGHN-like Ciphers. 397-401
Security Engineering
- Abdel Alim Kamal, Amr M. Youssef:

A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem. 402-409 - Anca Jurcut

, Tom Coffey, Reiner Dojen:
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks. 410-416 - Nan Guo, Tianhan Gao, Bin Zhang:

BPVrfy: Hybrid Cryptographic Scheme Based - Federate Identity Attributes Verification Model for Business Processes. 417-424
Fourth International Workshop on Organizational Security Aspects (OSA 2012)
- Juhani Anttila, Kari Jussila

, Jorma Kajava, Ilkka Kamaja:
Integrating ISO/IEC 27001 and other Managerial Discipline Standards with Processes of Management in Organizations. 425-436 - Ali Fawzi Najm Al-Shammari

, Adolfo Villafiorita
, Komminist Weldemariam:
Towards an Open Standard Vote Verification Framework in Electronic Voting Systems. 437-444 - Wen Zeng, Kaiyu Liu:

Sensitivity Analysis of Loss of Corporate Efficiency and Productivity Associated with Enterprise DRM Technology. 445-453 - Elmar Kiesling, Christine Strauss, Christian Stummer:

A Multi-objective Decision Support Framework for Simulation-Based Security Control Selection. 454-462
Second International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2012)
On Security and Patterns
- Kristian Beckers, Stephan Faßbender, Holger Schmidt:

An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example. 463-472 - Midori Hirose, Akira Utsumi, Isao Echizen, Hiroshi Yoshiura:

A Private Information Detector for Controlling Circulation of Private Information through Social Networks. 473-478
On Isolation and Secure Systems
- Baozeng Ding, Yanjun Wu, Yeping He, Shuo Tian, Bei Guan, Guowei Wu:

Return-Oriented Programming Attack on the Xen Hypervisor. 479-484 - Kristian Beckers, Stephan Faßbender:

Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and Performance. 485-494 - Tomoko Kajiyama, Isao Echizen:

Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites. 495-498
First International Workshop on Security Ontologies and Taxonomies (SecOnT 2012)
Knowledge Base Development
- Widura Schwittek, Holger Schmidt, Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel:

A Common Body of Knowledge for Engineering Secure Software and Services. 499-506 - David A. Mundie, Robin Ruefle:

Building an Incident Management Body of Knowledge. 507-513 - Daniel Feledi, Stefan Fenz

:
Challenges of Web-Based Information Security Knowledge Sharing. 514-521
Applications
- Lee V. Mangold:

Using Ontologies for Adaptive Information Security Training. 522-524 - Stefania D'Agostini, Valentina Di Giacomo

, Claudia Pandolfo, Domenico Presenza
:
An Ontology for Run-Time Verification of Security Certificates for SOA. 525-533 - Henk Birkholz, Ingo Sieverdingbeck, Karsten Sohr

, Carsten Bormann
:
IO: An Interconnected Asset Ontology in Support of Risk Management Processes. 534-541
Sixth International Workshop on Secure Software Engineering (SecSE 2012)
Threats and Approaches
- Per Håkon Meland, Erlend Andreas Gjære:

Representing Threats in BPMN 2.0. 542-550 - Jean Dubreuil, Guillaume Bouffard

, Jean-Louis Lanet, Julien Cartigny:
Type Classification against Fault Enabled Mutant in Java Based Smart Card. 551-556 - Mark M. Seeger, Stephen D. Wolthusen:

Towards Concurrent Data Sampling Using GPU Coprocessing. 557-563
Taxonomies and Comparisons
- Horia V. Corcalciuc:

A Taxonomy of Time and State Attacks. 564-573 - Kristian Beckers:

Comparing Privacy Requirements Engineering Approaches. 574-581 - Aleem Khalid Alvi, Mohammad Zulkernine:

A Comparative Study of Software Security Pattern Classifications. 582-589
Fifth International Workshop on Digital Forensics (WSDF 2012)
Theoretical Methods and Statistics for Forensics
- Richard E. Overill, Jantje A. M. Silomon:

Uncertainty Bounds for Digital Forensic Evidence and Hypotheses. 590-595 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:

Using Attack Graphs in Forensic Examinations. 596-603 - Mateus de Castro Polastro, Pedro Monteiro da Silva Eleuterio:

A Statistical Approach for Identifying Videos of Child Pornography at Crime Scenes. 604-612
Applied Forensics and Data Generation
- York Yannikos

, Christian Winter, Markus Schneider:
Synthetic Data Creation for Forensic Tool Testing: Improving Performance of the 3LSPG Framework. 613-619 - Steffen Logen, Hans Höfken, Marko Schuba:

Simplifying RAM Forensics: A GUI and Extensions for the Volatility Framework. 620-624 - Peter Frühwirt, Peter Kieseberg

, Sebastian Schrittwieser
, Markus Huber
, Edgar R. Weippl:
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. 625-633

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














