


default search action
2nd SECURWARE 2008: Cap Esterel, France
- André Cotton, Oana Dini, Antonio Fernandez Gómez-Skarmeta, Mihaela Ion, Manuela Popescu, Masaru Takesue:

Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France. IEEE Computer Society 2008, ISBN 978-0-7695-3329-2
Frameworks, Architectures and Protocols I
- Frederic Stumpf, Claudia Eckert:

Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. 1-9 - Khaled Gaaloul, Andreas Schaad, Ulrich Flegel, François Charoy

:
A Secure Task Delegation Model for Workflows. 10-15 - Anders Moen Hagalisletto, Lars Strand:

Formal Modeling of Authentication in SIP Registration. 16-21 - Sameerchand Pudaruth, Nevin Vunka Jungum, Soulakshmee D. Ghurbhurrun, Leckraj Nagowah

:
Controlling Access to Location-Based Services in Vehicular Mobile Pervasive Environments. 22-27
Frameworks, Architectures and Protocols II
- H. Rezaei Ghaleh, M. A. Doustari:

A New Approach for Secure and Portable OS. 28-33 - Thomas Gamer, Christoph P. Mayer, Martina Zitterbart:

Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection. 34-40 - Jérémy Briffaut, Jean-François Lalande

, Waleed W. Smari:
Team--Based MAC Policy over Security--Enhanced Linux. 41-46 - Shu-Lin Chen, Stanley Chow, Christophe Gustave, Dmitri Vinokurov:

Prototyping a New Identity Authentication Framework for IP Telephony. 47-52 - Sergio Pozo Hidalgo

, Rafael Ceballos
, Rafael M. Gasca
, Angel Jesus Varela-Vaca
:
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets. 53-61
Frameworks, Architectures and Protocols III
- Ángel Cuevas

, Paul El Khoury, Laurent Gomez, Annett Laube:
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data. 62-67 - Fuwen Liu, Hartmut König:

Security Policy Management for Peer Group Meetings. 68-73 - Sandhya Khurana

, Neelima Gupta:
FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks. 74-79 - Anders Moen Hagalisletto:

Proving Trust Locally. 80-87 - Rafael Bosse Brinhosa, Carlos Becker Westphall, Carla Merkle Westphall:

A Security Framework for Input Validation. 88-92
System Security
- Antonio San Martino, Xavier Perramon

:
Defending E-Banking Services: Antiphishing Approach. 93-98 - Imad M. Abbadi, Muntaha Alawneh:

Preventing Insider Information Leakage for Enterprises. 99-106 - Pedro R. M. Inácio

, Mário M. Freire
, Manuela Pereira
, Paulo P. Monteiro
:
Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic. 107-113 - Eric Y. Chen, Mitsutaka Itoh:

Scalable Detection of SIP Fuzzing Attacks. 114-119 - Sarosh Hashmi, John Brooke:

Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack. 120-126
Malware & Security
- Ian Castle, Eimear Buckley:

The Automatic Discovery, Identification and Measurement of Botnets. 127-132 - Masaru Takesue:

A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy. 133-138 - Nikolaos Chatzis, Enric Pujol:

Email Worm Mitigation by Controlling the Name Server Response Rate. 139-145 - Cheun Ngen Chong, Dan Jiang, Jiagang Zhang, Long Guo:

Anti-counterfeiting with a Random Pattern. 146-153 - Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri, Satoshi Kawasaki, Hirotake Abe, Takahiro Shinagawa

, Kazuhiko Kato:
Efficient Anomaly Detection System for Mobile Handsets. 154-160
Ecosystem Security and Trust
- Vasile Florian Pais, Viorica Stancalie

:
Providing Secure Access to Unsecure Web Services. 161-164 - Oluwafemi O. Ajayi, Richard O. Sinnott

, Anthony Stell:
Towards Decentralised Security Policies for e-Health Collaborations. 165-172 - Mihaela Ion, Hristo Koshutanski

, Volker Hoyer, Luigi Telesca:
Rating Agencies Interoperation for Peer-to-Peer Online Transactions. 173-178 - Audun Jøsang

, Touhid Bhuiyan
:
Optimal Trust Network Analysis with Subjective Logic. 179-184 - Nuno Amálio

, George Spanoudakis:
From Monitoring Templates to Security Monitoring and Threat Detection. 185-192
Cryptography
- Ioannis G. Askoxylakis, Damien Sauveron, Constantinos Markantonakis

, Theodore Tryfonas
, Apostolos Traganitis:
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. 193-202 - Przemyslaw Rodwald

, Janusz Stoklosa
:
Family of Parameterized Hash Algorithms. 203-208 - Roland Schmitz:

Public Key Cryptography: A Dynamical Systems Perspective. 209-212 - Aleksandar Kircanski, Amr M. Youssef:

A Related-Key Attack on TREYFER. 213-217
Information Security I
- Jean-Michel Sahut:

Security and Adoption of Internet Payment. 218-223 - Wolfgang Boehmer:

Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001. 224-231 - Marcin Dabrowski, Piotr Pacyna:

Generic and Complete Three-Level Identity Management Model. 232-237 - Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed:

A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. 238-242 - HwanJin Lee, InKyung Jeun, Kilsoo Chun, Junghwan Song:

A New Anti-phishing Method in OpenID. 243-247
Information Security II
- Wilson Goudalo, Dominique Seret:

Toward the Engineering of Security of Information Systems (ESIS): UML and the IS Confidentiality. 248-256 - Cynthia Y. Lester, Frank Jamerson:

Designing an Undergraduate Software Security Course. 257-262 - Carlos Aguilar Melchor, Benoît Crespin, Philippe Gaborit, Vincent Jolivet, Pierre Rousseau:

High-Speed Private Information Retrieval Computation on GPU. 263-272 - Kreetta Askola, Rauli Puuperä, Pekka Pietikäinen

, Juhani Eronen, Marko Laakso, Kimmo Halunen, Juha Röning
:
Vulnerability Dependencies in Antivirus Software. 273-278
Information Security III
- Rainer Falk, Steffen Fries:

Security Governance for Enterprise VoIP Communication. 279-286 - Jan Feyereisl, Uwe Aickelin

:
ToLeRating UR-STD. 287-293 - Fatiha Benali, Stéphane Ubéda, Véronique Legrand:

Collaborative Approach to Automatic Classification of Heterogeneous Information Security. 294-299 - Cynthia Y. Lester, Hira N. Narang, Chung-Han Chen:

Infusing Information Assurance into an Undergraduate CS Curriculum. 300-305
Profiling Data Mining
- Giacomo Verticale

:
On the Portability of Trained Machine Learning Classifiers for Early Application Identification. 306-310 - Martin Floeck, Lothar Litz:

Activity- and Inactivity-BasedApproaches to Analyze an Assisted Living Environment. 311-316 - Yannick Carlinet, Ludovic Mé, Hervé Debar

, Yvon Gourhant:
Analysis of Computer Infection Risk Factors Based on Customer Network Usage. 317-325
DEPEND I
- Daniel J. Martinez, Juan M. Marin, Jorge Bernal Bernabé, Manuel Gil Pérez

, Antonio Fernandez Gómez-Skarmeta:
Design-Time Learning for Operational Planning Improvement. 326-331 - André Cotton, Maurice Israël, Julien Borgel:

Molecular Approach Paves the Way towards High Resilience for Large Mission-Critical Information Systems. 332-337 - Maurice Israël, Julien Borgel, André Cotton:

Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems. 338-343 - Marco Domenico Aime, Andrea S. Atzeni:

Generation of Diagnostic Plans for Large ICT Systems. 344-349
DEPEND II
- Dariusz Caban

, Wojciech Zamojski:
Dependability Analysis of Information Systems with Hierarchical Reconfiguration of Services. 350-355 - Katarzyna Michalska, Tomasz Walkowiak

:
Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and Simulation. 356-361 - Juan Manuel Marín Pérez, Jorge Bernal Bernabé

, Daniel J. Martínez-Manzano, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta:
Towards the Definition of a Web Service Based Management Framework. 362-367 - Imre Kocsis

, György Csertán, Péter László Pásztor, András Pataricza
:
Dependability and Security Metrics in Controlling Infrastructure. 368-374
DEPEND III
- Maite Avelino, Francisco de la Torre:

Advanced Rule-Based Techniques in Mission Critical Systems. 375-380 - Sergio Pozo Hidalgo

, Rafael Ceballos
, Rafael M. Gasca
, Angel Jesus Varela-Vaca
:
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates. 381-390 - Jesús J. Martinez Molina, Miguel A. Hernández Ruíz, Manuel Gil Pérez

, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta:
Event-Driven Architecture for Intrusion Detection Systems Based on Patterns. 391-396 - Marek Woda

, Tomasz Walkowiak
:
Agent Based Approach to Events Monitoring in Complex Information Systems. 397-402
DEPEND IV
- Xiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu:

A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. 403-411 - Artur Hecker

:
On System Security Metrics and the Definition Approaches. 412-419 - Marco Domenico Aime, Paolo Carlo Pomi, Marco Vallini:

Policy-Driven System Configuration for Dependability. 420-425 - Ilkka Norros, Pirkko Kuusela

, Pekka Savola:
A Dependability Case Approach to the Assessment of IP Networks. 426-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














