Assessing the value of enterprise identity management (EldM) - towards a generic evaluation approach (English)
- New search for: Royer, D.
- New search for: Royer, D.
In:
ARES, International Conference on Availability, Reliability and Security, 3
;
779-786
;
2008
-
ISBN:
- Conference paper / Print
-
Title:Assessing the value of enterprise identity management (EldM) - towards a generic evaluation approach
-
Contributors:Royer, D. ( author )
-
Published in:
-
Publisher:
- New search for: IEEE Operations Center
-
Place of publication:Piscataway
-
Publication date:2008
-
Size:8 Seiten, 35 Quellen
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Securing Telehealth Applications in a Web-Based e-Health PortalLiu, Qian / Lu, Shuo / Hong, Yuan / Wang, Lingyu / Dssouli, Rachida et al. | 2008
- 10
-
Multi-Level Reputation-Based GreylistingJanecek, Andreas G.K. / Gansterer, Wilfried N. / Kumar, K. Ashwin et al. | 2008
- 18
-
Hardening XDS-Based ArchitecturesWuyts, Kim / Scandariato, Riccardo / Claeys, Geert / Joosen, Wouter et al. | 2008
- 26
-
Finding Evidence of Antedating in Digital InvestigationsWillassen, Svein Yngvar et al. | 2008
- 33
-
FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program InterruptionFarazmand, Navid / Fazeli, Mahdi / Miremadi, Seyyed Ghasem et al. | 2008
- 39
-
Economic and Security Aspects of Applying a Threshold Scheme in e-HealthRiedl, Bernhard / Grascher, Veronika / Kolb, Mathias / Neubauer, Thomas et al. | 2008
- 47
-
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection AttacksKiani, Mehdi / Clark, Andrew / Mohay, George et al. | 2008
- 56
-
On the Possibility of Small, Service-Free Disk Based Storage SystemsPâris, Jehan-François / Schwarz, Thomas J.E. et al. | 2008
- 64
-
Efficient High Availability Commit ProcessingKolltveit, Heine / Hvasshovd, Svein-Olaf et al. | 2008
- 72
-
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol ModelsPironti, Alfredo / Sisto, Riccardo et al. | 2008
- 80
-
Towards Formal Specification of Abstract Security PropertiesMaña, Antonio / Pujol, Gimena et al. | 2008
- 88
-
A Behavioral Model of Ideologically-motivated “Snowball” AttacksStakhanova, Natalia / Stakhanov, Oleg / Ghorbani, Ali et al. | 2008
- 96
-
Property Specification and Static Verification of UML ModelsSiveroni, Igor / Zisman, Andrea / Spanoudakis, George et al. | 2008
- 104
-
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security RequirementsSoler, Emilio / Stefanov, Veronika / Mazon, Jose-Norberto / Trujillo, Juan / Fernandez-Madina, Eduardo / Piattini, Mario et al. | 2008
- 112
-
A New Scheme for Distributed Density Estimation based Privacy-Preserving ClusteringSu, Chunhua / Bao, Feng / Zhou, Jianying / Takagi, Tsuyoshi / Sakurai, Kouichi et al. | 2008
- 120
-
A Database Replication Protocol Where Multicast Writesets Are Always CommittedJuarez-Rodriguez, Jose Ramon / Armendariz-Iñigo, J.E. / Mendivil, J.R. Gonzalez de / Muñoz-Escoi, F.D. et al. | 2008
- 128
-
Matching Policies with Security Claims of Mobile ApplicationsBielova, Nataliia / Torre, Marco Dalla / Dragoni, Nicola / Siahaan, Ida et al. | 2008
- 136
-
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile DevicesRosado, David G. / Fernandez-Medina, Eduardo / López, Javier / Piattini, Mario et al. | 2008
- 144
-
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc NetworksKhakpour, Amir R. / Laurent-Maknavicius, Maryline / Chaouchi, Hakima et al. | 2008
- 153
-
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC SystemsDamiani, Maria Luisa / Silvestri, Claudio / Bertino, Elisa et al. | 2008
- 161
-
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender SystemAimeur, Esma / Brassard, Gilles / Fernandez, Jose M. / Onana, Flavien Serge Mani / Rakowski, Zbigniew et al. | 2008
- 171
-
Fast Qualitative Reasoning about Actions for Computing Anticipatory SystemsKitajima, Natsumi / Goto, Yuichi / Cheng, Jingde et al. | 2008
- 179
-
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation MethodologyTjoa, Simon / Jakoubi, Stefan / Quirchmayr, Gerald et al. | 2008
- 187
-
Defining Secure Business Processes with Respect to Multiple ObjectivesNeubauer, Thomas / Heurix, Johannes et al. | 2008
- 195
-
Analysis and Component-based Realization of Security RequirementsHatebur, Denis / Heisel, Maritta / Schmidt, Holger et al. | 2008
- 204
-
A Framework for Detecting Anomalies in VoIP NetworksBouzida, Yacine / Mangin, Christophe et al. | 2008
- 212
-
Rapid Detection of Constant-Packet-Rate FlowsChen, Kuan-Ta / Lou, Jing-Kai et al. | 2008
- 221
-
Performance Analysis of Anonymous Communication Channels Provided by TorPanchenko, Andriy / Pimenidis, Lexi / Renner, Johannes et al. | 2008
- 229
-
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule SetsHidalgo, Sergio Pozo / Ceballos, Rafael / Gasca, Rafael Martínez et al. | 2008
- 237
-
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field CaseYurcik, William / Woolam, Clay / Hellings, Greg / Khan, Latifur / Thuraisingham, Bhavani et al. | 2008
- 245
-
A Distributed Defense Framework for Flooding-Based DDoS AttacksYou, Yonghua / Zulkernine, Mohammad / Haque, Anwar et al. | 2008
- 253
-
Pure MPLS TechnologyHe, Liwen / Botham, Paul et al. | 2008
- 260
-
Symmetric Active/Active Replication for Dependent ServicesEngelmann, Christian / Scott, Stephen L. / Leangsuksun, Chokchai / He, Xubin et al. | 2008
- 268
-
Statically Checking Confidentiality of Shared Memory Programs with Dynamic LabelsVölp, Marcus et al. | 2008
- 276
-
A Cause-Based Approach to Preventing Software VulnerabilitiesByers, David / Shahmehri, Nahid et al. | 2008
- 284
-
Integrating a Security Plug-in with the OpenUP/Basic Development ProcessArdi, Shanai / Shahmehri, Nahid et al. | 2008
- 292
-
A Novel Testbed for Detection of Malicious Software FunctionalityJensen, Jostein et al. | 2008
- 302
-
Type and Effect Annotations for Safe Memory Access in CTlili, Syrine / Debbabi, Mourad et al. | 2008
- 310
-
Adaptability of a GP based IDS on wireless networksMakanju, A. / Zincir-Heywood, A.N. / Milios, E.E. et al. | 2008
- 310
-
Adaptabilty of a GP Based IDS on Wireless NetworksMakanju, Adetokunbo / Zincir-Heywood, Nur / Milios, Evangelos et al. | 2008
- 319
-
An Intrusion-Tolerant Mechanism for Intrusion Detection SystemsKuang, Liwei / Zulkernine, Mohammad et al. | 2008
- 327
-
Fuzzy Private Matching (Extended Abstract)Chmielewski, Lukasz / Hoepman, Jaap-Henk et al. | 2008
- 335
-
Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global KnowledgeBußer, Jens-Uwe / Fries, Steffen / Otto, Martin / Hartmann, Peter et al. | 2008
- 344
-
Trust Modelling in E-Commerce through Fuzzy Cognitive MapsSchläger, Christian / Pernul, Günther et al. | 2008
- 352
-
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and DefenderZhang, Zonghua / Nait-Abdesselam, Farid / Ho, Pin-Han et al. | 2008
- 363
-
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologiesde Fuentes, José María / Gonzalez-Tablas, Ana Isabel / Ribagorda, Arturo et al. | 2008
- 369
-
Extending Mixed Serialisation Graphs to Replicated EnvironmentsBernabé-Gisbert, Josep M. / Muñoz-Escoí, Francesc D. et al. | 2008
- 376
-
Towards Secure E-Commerce Based on Virtualization and Attestation TechniquesStumpf, Frederic / Eckert, Claudia / Balfe, Shane et al. | 2008
- 383
-
Fuzzy Belief-Based SupervisionVorobiev, Alexandre / Seviora, Rudolph et al. | 2008
- 390
-
Ensuring Progress in Amnesiac Replicated SystemsJuan-Marín, Rubén de / Irún-Briz, Luis / Muñoz-Escoí, Francesc D. et al. | 2008
- 397
-
Enhancing Face Recognition with Location InformationHulsebosch, R.J. / Ebben, P.W.G. et al. | 2008
- 404
-
A Lazy Monitoring Approach for Heartbeat-Style Failure DetectorsSatzger, Benjamin / Pietzowski, Andreas / Trumler, Wolfgang / Ungerer, Theo et al. | 2008
- 410
-
Defending On-Line Web Application Security with User-Behavior SurveillanceCheng, Yu-Chin / Laih, Chi-Sung / Lai, Gu-Hsin / Chen, Chia-Mei / Chen, Tsuhan et al. | 2008
- 416
-
A Pattern-Driven Security Process for SOA ApplicationsDelessy, Nelly A. / Fernandez, Eduardo B. et al. | 2008
- 422
-
Towards a Dependable Architecture for Highly Available Internet ServicesAyuso, Pablo Neira / Lefèvre, Laurent / Barbaron, Denis / Gasca, Rafael M. et al. | 2008
- 428
-
Assessing the Reliability and Cost of Web and Grid OrchestrationsStewart, Alan / Clint, Maurice / Harmer, Terry / Kilpatrick, Peter / Perrott, Ron / Gabarro, Joaquim et al. | 2008
- 434
-
Application-Oriented Trust in Distributed ComputingScandariato, Riccardo / Ofek, Yoram / Falcarin, Paolo / Baldi, Mario et al. | 2008
- 440
-
BlueTrust in a Real WorldMarkides, Bradley / Coetzee, Marijke et al. | 2008
- 446
-
Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal ObstaclesDas, Ananda Swarup / Keshri, Jitu Kumar / Srinathan, Kannan / Srivastava, Vaibhav et al. | 2008
- 452
-
Privacy Protected ELF for Private Computing on Public PlatformsMorris, Thomas H. / Nair, V.S.S. et al. | 2008
- 458
-
haplog: A Hash-Only and Privacy-Preserved Secure Logging MechanismLin, Chih-Yin et al. | 2008
- 461
-
An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200Xiaolei, Li / Jin, Tian / Tingdi, Zhao et al. | 2008
- 467
-
A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall CaseAbbassi, Ryma / Fatmi, Sihem Guemara El et al. | 2008
- 473
-
SPIT Detection and Prevention Method in VoIP EnvironmentGuang-Yu, He / Ying-You, Wen / Hong, Zhao et al. | 2008
- 479
-
A New Approach to Analysis of Interval AvailabilityKirmani, Ezzat / Hood, Cynthia S. et al. | 2008
- 484
-
SFMD: A Secure Data Forwarding and Malicious Routers Detecting ProtocolYang, Xiang-he / Hu, Hua-ping / Chen, Xin et al. | 2008
- 491
-
Fault Effects in FlexRay-Based Networks with Hybrid TopologyDehbashi, Mehdi / Lari, Vahid / Miremadi, Seyed Ghassem / Shokrollah-Shirazi, Mohammad et al. | 2008
- 497
-
Secure Wireless Sensor NetworksYi, Xun / Faulkner, Mike / Okamoto, Eiji et al. | 2008
- 503
-
SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor NetworksOuadjaout, Abdelraouf / Challal, Yacine / Lasla, Noureddine / Bagaa, Miloud et al. | 2008
- 509
-
The Impact of Flooding Attacks on Network-based ServicesJensen, Meiko / Gruschka, Nils / Luttenberger, Norbert et al. | 2008
- 514
-
Managing Priorities in Atomic Multicast ProtocolsMiedes, Emili / Muñoz-Escoí, Francesc D. et al. | 2008
- 520
-
Beacon Frame Spoofing Attack Detection in IEEE 802.11 NetworksMartínez, Asier / Zurutuza, Urko / Uribeetxeberria, Roberto / Fernández, Miguel / Lizarraga, Jesus / Serna, Ainhoa / Vélez, Iñaki et al. | 2008
- 526
-
An End-to-End Security Solution for SCTPLindskog, Stefan / Brunstrom, Anna et al. | 2008
- 532
-
An Identity-Based Group Key Agreement Protocol from PairingWang, Hongji / Yao, Gang / Jiang, Qingshan et al. | 2008
- 538
-
An Authenticated 3-Round Identity-Based Group Key Agreement ProtocolYao, Gang / Wang, Hongji / Jiang, Qingshan et al. | 2008
- 544
-
High Capacity Steganographic Method Based Upon JPEGAlmohammad, Adel / Hierons, Robert M. / Ghinea, Gheorghita et al. | 2008
- 550
-
Cluster-based Group Key Agreement for Wireless Ad hoc NetworksKonstantinou, Elisavet et al. | 2008
- 553
-
Statistical algorithm for linguistic steganography detection based on distribution of wordsChen, Zhi-li / Huang, Liu-sheng / Yu, Zhen-shan / Li, Ling-jun / Yang, Wei et al. | 2008
- 558
-
A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of WordsZhi-li, Chen / Liu-sheng, Huang / Zhen-shan, Yu / Ling-jun, Li / Wei, Yang et al. | 2008
- 564
-
RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable NetworksZhang, Bo / Han, Kai / Ravindran, Binoy / Jensen, E.D. et al. | 2008
- 572
-
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment ApplicationsWillemson, Jan / Ansper, Arne et al. | 2008
- 578
-
A Security Model and its Application to a Distributed Decision Support System for HealthcareXiao, Liang / Vicente, Javier / Sáez, Carlos / Peet, Andrew / Gibb, Alex / Lewis, Paul / Dasmahapatra, Srinandan / Croitoru, Madalina / González-Vélez, Horacio / Ariet, Magí Lluch i et al. | 2008
- 586
-
Run-time Information Flow Monitoring based on Dynamic Dependence GraphsCavadini, Salvador / Cheda, Diego et al. | 2008
- 592
-
Automated Process Classi?cation Framework using SELinux Security ContextShinde, Pravin / Sharma, Priyanka / Guntupalli, Srinivas et al. | 2008
- 597
-
Using Composition Policies to Manage Authentication and Authorization Patterns and ServicesRossebø, Judith E.Y. / Bræk, Rolv et al. | 2008
- 604
-
Providing Fault Tolerance in Wireless Backhaul Network Design with Path RestorationWattanapongsakorn, Naruemon / Charnsripinyo, Chalermpol / Leesutthipornchai, Pakorn et al. | 2008
- 610
-
Histogram Matrix: Log File Visualization for Anomaly DetectionFrei, Adrian / Rennhard, Marc et al. | 2008
- 618
-
Context-based Profiling for Anomaly Intrusion Detection with DiagnosisSalem, Benferhat / Karim, Tabia et al. | 2008
- 624
-
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion DetectionLarson, Ulf / Jonsson, Erland / Lindskog, Stefan et al. | 2008
- 630
-
IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSIZhang, Youhui / Wang, Hongyi / Gu, Yu / Wang, Dongsheng et al. | 2008
- 636
-
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized SchemeAzer, Marianne / El-Kassas, Sherif / Hassan, Abdel Wahab / El-Soudani, Magdy et al. | 2008
- 642
-
NFC Devices: Security and PrivacyMadlmayr, Gerald / Langer, Josef / Kantner, Christian / Scharinger, Josef et al. | 2008
- 648
-
Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessorMehdizadeh, Nima / Shokrolah-Shirazi, Mohammad / Miremadi, Seyed Ghassem et al. | 2008
- 653
-
Increasing the Performability of Computer Clusters Using RADIC IISantos, Guna / Duarte, Angelo / Dolores, / Luque, Emilio et al. | 2008
- 659
-
A Framework for Proactive Fault ToleranceVallee, Geoffroy / Charoenpornwattana, Kulathep / Engelmann, Christian / Tikotekar, Anand / Leangsuksun, Chokchai / Naughton, Thomas / Scott, Stephen L. et al. | 2008
- 667
-
Anti-DDoS Virtualized Operating SystemGarg, Sanjam / Saran, Huzur et al. | 2008
- 675
-
A Case for High Availability in a Virtualized Environment (HAVEN)Farr, Erin / Harper, Richard / Spainhower, Lisa / Xenidis, Jimi et al. | 2008
- 683
-
A Federated Physical and Logical Access Control Enforcement ModelOnno, Stéphane et al. | 2008
- 693
-
Fostering the Uptake of Secure Multiparty Computation in E-CommerceCatrina, Octavian / Kerschbaum, Florian et al. | 2008
- 701
-
Efficient Certificate Path Validation and Its Application in Mobile Payment ProtocolsMartinez-Peláez, Rafael / Satizábal, Cristina / Rico-Novella, Francisco / Forné, Jordi et al. | 2008
- 709
-
Avoiding Policy-based Deadlocks in Business ProcessesKohler, Mathias / Schaad, Andreas et al. | 2008
- 717
-
A Secure High-Speed Identification Scheme for RFID Using Bloom FiltersNohara, Yasunobu / Inoue, Sozo / Yasuura, Hiroto et al. | 2008
- 723
-
New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve CryptosystemXiao, Youan et al. | 2008
- 727
-
Privacy-preserving Protocols for Finding the Convex HullsWang, Qi / Luo, Yonglong / Huang, Liusheng et al. | 2008
- 733
-
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian ProxyOsaka, Kyosuke / Chang, Shuang / Takagi, Tsuyoshi / Yamazaki, Kenichi / Takahashi, Osamu et al. | 2008
- 741
-
Cryptographic Properties of Second-Order Memory Elementary Cellular AutomataEncinas, Ascension Hernández / Rey, Angel Martín del / Iglesias, J.L. Pérez / Sánchez, Gerardo Rodríguez / Dios, Araceli Queiruga et al. | 2008
- 746
-
New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer GroupZeng, Shengke / He, Mingxing / Luo, Weidong et al. | 2008
- 752
-
Intensive Programme on Information and Communication SecuritySchläger, Christian / Fuchs, Ludwig / Pernul, Günther et al. | 2008
- 758
-
Applications for IT-Risk Management – Requirements and Practical EvaluationGrob, Heinz Lothar / Strauch, Gereon / Buddendick, Christian et al. | 2008
- 765
-
Security Analysis of Role-based Separation of Duty with WorkflowsHewett, Rattikorn / Kijsanayothin, Phongphun / Thipse, Aashay et al. | 2008
- 771
-
Detecting Suspicious Relational Database QueriesBöttcher, Stefan / Hartel, Rita / Kirschner, Matthias et al. | 2008
- 779
-
Assessing the value of enterprise identity management (EldM) - towards a generic evaluation approachRoyer, D. et al. | 2008
- 779
-
Assessing the Value of Enterprise Identity Management (EIdM) – Towards a Generic Evaluation ApproachRoyer, Denis et al. | 2008
- 787
-
An Ontological Approach to Secure MANET ManagementOrwat, Mark E. / Levin, Timothy E. / Irvine, Cynthia E. et al. | 2008
- 795
-
Reliability Analysis using Graphical Duration ModelsDonat, Roland / Bouillaut, Laurent / Aknin, Patrice / Leray, Philippe et al. | 2008
- 801
-
From Omega to ?P in the Crash-Recovery Failure Model with Unknown MembershipLarrea, Mikel / Martín, Cristian et al. | 2008
- 807
-
Policy-based Group Organizational Structure Management using an Ontological ApproachAnzures-García, Mario / Sánchez-Gálvez, Luz A. et al. | 2008
- 813
-
A Systematic Review and Comparison of Security OntologiesBlanco, Carlos / Lasheras, Joaquin / Valencia-García, Rafael / Fernández-Medina, Eduardo / Toval, Ambrosio / Piattini, Mario et al. | 2008
- 821
-
Context Ontology for Secure InteroperabilityComa, Céline / Cuppens-Boulahia, Nora / Cuppens, Frédéric / Cavalli, Ana-Rosa et al. | 2008
- 828
-
On the Security of VSH in Password SchemesHalunen, Kimmo / Rikula, Pauli / Röning, Juha et al. | 2008
- 834
-
Sustaining Web Services High-Availability Using CommunitiesMaamar, Zakaria / Sheng, Quan Z. / Benslimane, Djamal et al. | 2008
- 842
-
Distributed Information Retrieval Service for Ubiquitous ServicesTsuchiya, Takeshi / Lihan, Marc / Yoshinaga, Hirokazu / Koyanagi, Keiichi et al. | 2008
- 851
-
A Lightweight Security Analyzer inside GCCPozza, Davide / Sisto, Riccardo et al. | 2008
- 859
-
Dynamic Maintenance of Software Systems at RuntimeSeifzadeh, Habib / Kermani, Mostafa / Sadighi, Mohsen et al. | 2008
- 866
-
Software Security; A Vulnerability Activity RevisitHadavi, Mohammad Ali / Shirazi, Hossein / Sangchi, Hasan Mokhtari / Hamishagi, Vahid Saber et al. | 2008
- 873
-
Making Multi-Dimensional Trust Decisions on Inter-Enterprise CollaborationsRuohomaa, Sini / Kutvonen, Lea et al. | 2008
- 881
-
A Survey on Trust and Reputation Schemes in Ad Hoc NetworksAzer, Marianne A. / El-Kassas, Sherif M. / Hassan, Abdel Wahab F. / El-Soudani, Magdy S. et al. | 2008
- 889
-
Privacy-Preserving Recommendation Systems for Consumer Healthcare ServicesKatzenbeisser, Stefan / Petkovic, Milan et al. | 2008
- 896
-
Detecting Bots Based on Keylogging ActivitiesAl-Hammadi, Yousof / Aickelin, Uwe et al. | 2008
- 903
-
A Comprehensive Approach for Context-dependent Privacy ManagementFranz, Elke / Groba, Christin / Springer, Thomas / Bergmann, Mike et al. | 2008
- 911
-
Traceable Quantitative Risk Assessment Applied to Investment Decision for Local BackupsWeiss, Steffen / Wahl, Martin / Tielemann, Michael / Meyer-Wegener, Klaus et al. | 2008
- 921
-
Quantitative Assessment of Enterprise Security SystemBreu, Ruth / Innerhofer-Oberperfler, Frank / Yautsiukhin, Artsiom et al. | 2008
- 929
-
Clustering Oriented Architectures in Medical Sensor EnvironmentsKlaoudatou, Eleni / Konstantinou, Elisavet / Kambourakis, Georgios / Gritzalis, Stefanos et al. | 2008
- 935
-
An Initial Model and a Discussion of Access Control in Patient Controlled Health RecordsRøstad, Lillian et al. | 2008
- 943
-
Secure Team-Based EPR Access Acquisition in Wireless NetworksEskeland, Sigurd / Oleshchuk, Vladimir et al. | 2008
- 950
-
VEA-bility Security Metric: A Network Security Analysis ToolTupper, Melanie / Zincir-Heywood, A. Nur et al. | 2008
- 958
-
Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing EnvironmentsWeber, Stefan G. / Heinemann, Andreas / Mühlhäuser, Max et al. | 2008
- 967
-
GOST-28147 Encryption Implementation on Graphics Processing UnitsKorobitsin, Victor / Ilyin, Sergey et al. | 2008
- 975
-
Intelligent Video Surveillance Networks: Data Protection ChallengesCoudert, Fanny / Dumortier, Jos et al. | 2008
- 982
-
Intrusion Detection with Data Correlation Relation GraphHassanzadeh, Amin / Sadeghian, Babak et al. | 2008
- 990
-
A Critique of k-Anonymity and Some of Its EnhancementsDomingo-Ferrer, Josep / Torra, Vicenç et al. | 2008
- 994
-
Cluster-Specific Information Loss Measures in Data Privacy: A ReviewTorra, Vicenc / Ladra, Susana et al. | 2008
- 1000
-
Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant AlgorithmsSatizábal, Cristina / Forné, Jordi / Martínez-Peláez, Rafael / Rico-Novella, Franciso et al. | 2008
- 1008
-
Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions ApproachBoustia, Narhimene / Mokhtari, Aicha et al. | 2008
- 1013
-
Using Non-adaptive Group Testing to Construct Spy Agent RoutesKalogridis, Georgios / Mitchell, Chris J. et al. | 2008
- 1020
-
A Bayesian Approach for on-Line Max AuditingCanfora, Gerardo / Cavallo, Bice et al. | 2008
- 1028
-
Detection of Malcodes by Packet ClassificationAhmed, Irfan / Lhee, Kyung-suk et al. | 2008
- 1036
-
Performance of a Strategy Based Packets Forwarding in Ad Hoc NetworksSeredynski, Marcin / Bouvry, Pascal / Klopotek, Mieczyslaw A. et al. | 2008
- 1044
-
Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email PrivacyAbu-Nimeh, Saeed / Nappa, Dario / Wang, Xinlei / Nair, Suku et al. | 2008
- 1052
-
AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between NodesMelchor, Carlos Aguilar / Salem, Boussad Ait / Gaborit, Philippe / Tamine, Karim et al. | 2008
- 1060
-
A Post-processing Method to Lessen k-Anonymity DissimilaritiesSolanas, Agusti / Pujol, Gloria / Martinez-Balleste, Antoni / Mateo-Sanz, Josep M. et al. | 2008
- 1067
-
Improving Techniques for Proving Undecidability of Checking Cryptographic ProtocolsLiang, Zhiyao / Verma, Rakesh M et al. | 2008
- 1075
-
A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature SetAngevine, Duffy / Zincir-Heywood, Nur et al. | 2008
- 1083
-
Partial Disclosure of Searchable Encrypted Data with Support for Boolean QueriesOhtaki, Yasuhiro et al. | 2008
- 1091
-
Secure and Privacy-Friendly Logging for eGovernment ServicesWouters, Karel / Simoens, Koen / Lathouwers, Danny / Preneel, Bart et al. | 2008
- 1097
-
The REM Framework for Security EvaluationAmato, Flora / Casola, Valentina / Mazzeo, Antonino / Vittorini, Valeria et al. | 2008
- 1104
-
Static Validation of Licence Conformance PoliciesHansen, Rene Rydhof / Nielson, Flemming / Nielson, Hanne Riis / Probst, Christian W. et al. | 2008
- 1112
-
Towards Practical Security Monitors of UML Policies for Mobile ApplicationsMassacci, Fabio / Naliuka, Katsiaryna et al. | 2008
- 1120
-
Synthesis of Local Controller Programs for Enforcing Global Security PropertiesMartinelli, Fabio / Matteucci, Ilaria et al. | 2008
- 1128
-
Weighted Datalog and Levels of TrustBistarelli, Stefamno / Martinelli, Fabio / Santini, Francesco et al. | 2008
- 1135
-
Negotiation of Usage Control Policies - Simply the Best?Pretschner, Alexander / Walter, Thomas et al. | 2008
- 1139
-
Security Requirement Engineering at a Telecom ProviderZuccato, Albin / Endersz, Viktor / Daniels, Nils et al. | 2008
- 1148
-
Identifying Security Aspects in Early Development StagesOkubo, Takao / Tanaka, Hidehiko et al. | 2008
- 1156
-
Using Security Patterns to Combine Security MetricsHeyman, Thomas / Scandariato, Riccardo / Huygens, Christophe / Joosen, Wouter et al. | 2008
- 1164
-
Secure Software Design in PracticeMeland, Per Håkon / Jensen, Jostein et al. | 2008
- 1172
-
Covering Your Assets in Software EngineeringJaatun, Martin Gilje / Tøndel, Inger Anne et al. | 2008
- 1180
-
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection FeaturesRen, Shangping / Kwiat, Kevin et al. | 2008
- 1188
-
Towards Incorporating Discrete-Event Systems in Secure Software DevelopmentWhittaker, Sarah / Zulkernine, Mohammad / Rudie, Karen et al. | 2008
- 1196
-
How to Open a File and Not Get HackedKupsch, James A. / Miller, Barton P. et al. | 2008
- 1204
-
Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of RulesPeine, Holger et al. | 2008
- 1213
-
Adaptive Data Integrity through Dynamically Redundant Data StructuresFlorio, Vincenzo De / Blondia, Chris et al. | 2008
- 1219
-
ISEDS: An Information Security Engineering Database System Based on ISO StandardsHorie, Daisuke / Morimoto, Shoichi / Azimah, Noor / Goto, Yuichi / Cheng, Jingde et al. | 2008
- 1226
-
Privacy Aspects of eHealthSlamanig, Daniel / Stingl, Christian et al. | 2008
- 1234
-
Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor NetworksRavindran, Kaliappa / Wu, Jiang / Kwiat, Kevin A. / Sabbir, Ali et al. | 2008
- 1240
-
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven ApproachAsnar, Yudistira / Moretti, Rocco / Sebastianis, Maurizio / Zannone, Nicola et al. | 2008
- 1248
-
Implementing Multidimensional Security into OLAP ToolsBlanco, Carlos / Fernández-Medina, Eduardo / Trujillo, Juan / Piattini, Mario et al. | 2008
- 1260
-
Privacy Preserving Support Vector Machines in Wireless Sensor NetworksKim, Dong Seong / Azim, Muhammad Anwarul / Park, Jong Sou et al. | 2008
- 1266
-
An Image Encryption System by Cellular Automata with MemoryMaleki, Farhad / Mohades, Ali / Hashemi, S. Mehdi / Shiri, Mohammad Ebrahim et al. | 2008
- 1275
-
Insider-secure Signcryption KEM/Tag-KEM Schemes without Random OraclesTan, Chik How et al. | 2008
- 1282
-
Internet Observation with ISDAS: How Long Does a Worm Perform Scanning?Kobori, Tomohiro / Kikuchi, Hiroaki / Terada, Masato et al. | 2008
- 1287
-
Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of VotesEndo, Tsukasa / Echizen, Isao / Yoshiura, Hiroshi et al. | 2008
- 1294
-
Enocoro-80: A Hardware Oriented Stream CipherWatanabe, Dai / Ideguchi, Kota / Kitahara, Jun / Muto, Kenichiro / Furuichi, Hiroki / Kaneko, Toshinobu et al. | 2008
- 1301
-
Cryptanalysis and Improvement of an "Improved Remote Authentication Scheme with Smart Card'Hölbl, Marko / Welzer, Tatjana et al. | 2008
- 1306
-
Effective Monitoring of a Survivable Distributed Networked Information SystemRubel, Paul / Atighetchi, Michael / Pal, Partha / Fong, Martin / O'Brien, Richard et al. | 2008
- 1313
-
Design of an FDB based Intra-domain Packet Traceback SystemHazeyama, Hiroaki / Matsumoto, Yoshihide / Kadobayashi, Youki et al. | 2008
- 1319
-
An Independent Evaluation of Web Timing Attack and its CountermeasureNagami, Yoshitaka / Miyamoto, Daisuke / Hazeyama, Hiroaki / Kadobayashi, Youki et al. | 2008
- 1325
-
Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving NetworksDurresi, Arjan / Durresi, Mimoza / Barolli, Leonard et al. | 2008
- 1332
-
Privacy-Preserving Distributed Set IntersectionYe, Qingsong / Wang, Huaxiong / Tartary, Christophe et al. | 2008
- 1340
-
Examination of Forwarding Obstruction Attacks in Structured Overlay NetworksMashimo, Yo / Ueda, Shintaro / Shinzaki, Yasutaka / Shigeno, Hiroshi et al. | 2008
- 1346
-
A Novel Approach for Multiplication over GF(2m) in Polynomial Basis RepresentationZadeh, Abdulah Abdulah et al. | 2008
- 1355
-
Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network ForensicsTurnbull, Benjamin / Slay, Jill et al. | 2008
- 1361
-
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic AnalysisBroadway, Joshua / Turnbull, Benjamin / Slay, Jill et al. | 2008
- 1369
-
Recovery of Encryption Keys from Memory Using a Linear ScanHargreaves, Christopher / Chivers, Howard et al. | 2008
- 1377
-
Proposal for Efficient Searching and Presentation in Digital ForensicsLee, Jooyoung et al. | 2008
- 1382
-
Secure Steganography in Compressed Video BitstreamsLiu, Bin / Liu, Fenlin / Yang, Chunfang / Sun, Yifeng et al. | 2008
- 1388
-
Considerations Towards a Cyber Crime Profiling SystemArthur, Kweku K. / Olivier, Martin S. / Venter, Hein S. / Eloff, Jan H.P. et al. | 2008
- 1397
-
Alignment of Misuse Cases with Security Risk ManagementMatulevicius, Raimundas / Mayer, Nicolas / Heymans, Patrick et al. | 2008
- 1405
-
Information Stream Based Model for Organizing SecurityThalheim, Bernhard / Al-Fedaghi, Sabah / Al-Saqabi, Khaled et al. | 2008
- 1413
-
Security Requirements Variability for Software Product LinesMellado, Daniel / Fernandez-Medina, Eduardo / Piattini, Mario et al. | 2008
- 1421
-
Transforming Security Requirements into ArchitectureYskout, Koen / Scandariato, Riccardo / Win, Bart De / Joosen, Wouter et al. | 2008
- 1429
-
Modelling Security Properties in a Grid-based Operating System with Anti-GoalsArenas, Alvaro / Aziz, Benjamin / Bicarregui, Juan / Matthews, Brian / Yang, Erica Y. et al. | 2008
- 1437
-
Annotating Regulations Using Cerno: An Application to Italian Documents - Extended AbstractZeni, Nicola / Kiyavitskaya, Nadzeya / Cordy, James R. / Mich, Luisa / Mylopoulos, John et al. | 2008
- 1443
-
Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security RequirementsHassan, Riham / Bohner, Shawn / El-Kassas, Sherif / Eltoweissy, Mohamed et al. | 2008
- 1451
-
Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract)Cetinkaya, Orhan et al. | 2008
- 1457
-
Author index| 2008
- 1464
-
Publisher's Information| 2008
- C1
-
Cover Art| 2008
- i
-
Title Page i| 2008
- iii
-
Title Page iii| 2008
- iv
-
Copyright Page| 2008
- v
-
Table of Contents| 2008
- xxi
-
Chair Message| 2008
- xxii
-
Conference Officers| 2008
- xxiii
-
Keynote Atluri| 2008
- xxvi
-
Keynote Pernul| 2008
- xxvii
-
Keynote Sandhu| 2008