Default Cover Image

2009 International Conference on Availability, Reliability and Security

Mar. 16 2009 to Mar. 19 2009

Fukuoka Institute of Technology, Fukuoka, Japan

ISBN: 978-0-7695-3564-7

Table of Contents

Papers
DAWAM Organization Co-chairsFreely available from IEEE.pp. xxv
Papers
Conference OfficersFreely available from IEEE.pp. xx
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xvii
Papers
Program CommitteeFreely available from IEEE.pp. xxi-xxiii
Papers
DAWAM ReviewersFreely available from IEEE.pp. xxvii
FARES ReviewersFreely available from IEEE.pp. xxxiii-xxxv
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
GloSec ReviewersFreely available from IEEE.pp. xxxix
Papers
Message from General Co-chairsFreely available from IEEE.pp. xviii
Papers
Message from ARES Workshops' Co-chairsFreely available from IEEE.pp. xix
Papers
IWSS ReviewersFreely available from IEEE.pp. xliii
Papers
OSA Organization CommitteeFreely available from IEEE.pp. xlv
Papers
Message from DAWAM Workshop Co-chairsFreely available from IEEE.pp. xxiv
Papers
OSA Program CommitteeFreely available from IEEE.pp. xlvi
Papers
DAWAM Program CommitteeFreely available from IEEE.pp. xxvi
Papers
OSA ReviewersFreely available from IEEE.pp. xlvii
Papers
Message from FARES Workshop Co-chairsFreely available from IEEE.pp. xxviii
Papers
FARES Organization CommitteeFreely available from IEEE.pp. xxix
Papers
RIBC ReviewersFreely available from IEEE.pp. li
Papers
FARES Program CommitteeFreely available from IEEE.pp. xxx-xxxii
Papers
Message from GloSec Workshop ChairFreely available from IEEE.pp. xxxvi
Papers
GloSec Organization CommitteeFreely available from IEEE.pp. xxxvii
Papers
SecSE reviewersFreely available from IEEE.pp. lv
Papers
GloSec Program CommitteeFreely available from IEEE.pp. xxxviii
Papers
Message from IWSS Workshop Co-chairsFreely available from IEEE.pp. xl
Papers
IWSS Organization CommitteeFreely available from IEEE.pp. xli
Papers
SECUSAB reviewersFreely available from IEEE.pp. lvix
Papers
IWSS Program CommitteeFreely available from IEEE.pp. xlii
Papers
Message from OSA Workshop Co-chairsFreely available from IEEE.pp. xliv
Papers
WAIS reviewersFreely available from IEEE.pp. lxiii
Papers
Message from RIBC Workshop Co-chairsFreely available from IEEE.pp. xlviii
Papers
RIBC Organization CommitteeFreely available from IEEE.pp. xlvix
Papers
RIBC Program CommitteeFreely available from IEEE.pp. l
Papers
WSDF reviewersFreely available from IEEE.pp. lxvii
Papers
Message from SecSE Workshop Co-chairsFreely available from IEEE.pp. lii
Papers
SecSE Organization CommitteeFreely available from IEEE.pp. liii
Papers
SecSE Program CommitteeFreely available from IEEE.pp. liv
Papers
Message from SECUSAB Workshop Co-chairsFreely available from IEEE.pp. lvi
Papers
SECUSAB Organization CommitteeFreely available from IEEE.pp. lvii
Papers
SECUSAB Program CommitteeFreely available from IEEE.pp. lviii
Papers
Message from WAIS Workshop Co-chairsFreely available from IEEE.pp. lx
Papers
WAIS Organization CommitteeFreely available from IEEE.pp. lxi
Papers
WAIS Program CommitteeFreely available from IEEE.pp. lxii
Papers
Message from WSDF Workshop Co-chairsFreely available from IEEE.pp. lxiv
Papers
WSDF Organization CommitteeFreely available from IEEE.pp. lxv
Papers
WSDF Program CommitteeFreely available from IEEE.pp. lxvi
Papers
Keynote 2: Digital Identity Protection - Concepts and IssuesFreely available from IEEE.pp. lxix-lxxviii
Papers
Keynote 3: Topological Analysis of Network Attack VulnerabilityFreely available from IEEE.pp. lxxix
Papers
A Pluggable Domain Management Approach for Building Practical Distributed CoalitionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Retaining Data Control to the Client in Infrastructure CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Papers
Workflows in Dynamic and Restricted DelegationFull-text access may be available. Sign in or learn about subscription options.pp. 17-24
Papers
The Accountability Problem of Flooding Attacks in Service-Oriented ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 25-32
Papers
Web Service Trust: Towards a Dynamic Assessment FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 33-40
Papers
Security Requirements Specification in Service-Oriented Business Process ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 41-48
Papers
Quantitative Analysis of Secure Information Flow via Probabilistic SemanticsFull-text access may be available. Sign in or learn about subscription options.pp. 49-57
Papers
Deploying Security Policy in Intra and Inter Workflow Management SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 58-65
Papers
An Empirically Derived Loss Taxonomy Based on Publicly Known Security IncidentsFull-text access may be available. Sign in or learn about subscription options.pp. 66-73
Papers
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 74-81
Papers
Server-Side Prediction of Source IP Addresses Using Density EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 82-89
Papers
Detecting Stepping-Stone Connection Using Association Rule MiningFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
Papers
Formal Analyses of Usage Control PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 98-105
Papers
A First Step towards Characterizing Stealthy BotnetsFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
Papers
Intrusion Process Modeling for Security QuantificationFull-text access may be available. Sign in or learn about subscription options.pp. 114-121
Papers
Different Approaches to In-House Identity Management - Justification of an AssumptionFull-text access may be available. Sign in or learn about subscription options.pp. 122-129
Papers
An LPN-Problem-Based Lightweight Authentication Protocol for Wireless CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 130-134
Papers
Revealing the Calling History of SIP VoIP Systems by Timing AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 135-142
Papers
The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime DataFull-text access may be available. Sign in or learn about subscription options.pp. 143-149
Papers
A Robust Image Watermarking Using Two Level DCT and Wavelet Packets DenoisingFull-text access may be available. Sign in or learn about subscription options.pp. 150-157
Papers
On Equilibrium Distribution Properties in Software Reliability ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 158-165
Papers
An Analysis of Fault Effects and Propagations in AVR Microcontroller ATmega103(L)Full-text access may be available. Sign in or learn about subscription options.pp. 166-172
Papers
A New Approach for Implementing the MPL Method toward Higher SPA ResistanceFull-text access may be available. Sign in or learn about subscription options.pp. 181-186
Papers
On Privacy Preserving Convex HullFull-text access may be available. Sign in or learn about subscription options.pp. 187-192
Papers
Routing Protocol Security Using Symmetric Key Based TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 193-200
Papers
Prioritisation and Selection of Software Security ActivitiesFull-text access may be available. Sign in or learn about subscription options.pp. 201-207
Papers
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based VulnerabilityFull-text access may be available. Sign in or learn about subscription options.pp. 208-215
Papers
Enhancing Automated Detection of Vulnerabilities in Java ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 216-223
Papers
Identifying and Resolving Least Privilege Violations in Software ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 232-239
Papers
Improving Reliability for Multi-home Inbound Traffic: MHLB/I Packet-Level Inter-domain Load-BalancingFull-text access may be available. Sign in or learn about subscription options.pp. 248-256
Papers
Proactive Resource Management for Failure Resilient High Performance Computing ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 257-264
Papers
A Perceptron Neural Network for Asymmetric Comparison-Based System-Level Fault DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 265-272
Papers
Perfect Failure Detection in the Partitioned Synchronous Distributed System ModelFull-text access may be available. Sign in or learn about subscription options.pp. 273-280
Papers
Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 281-288
Papers
Measuring Voter-Controlled PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 289-298
Papers
Generating User-Understandable Privacy PreferencesFull-text access may be available. Sign in or learn about subscription options.pp. 299-306
Papers
An Automatic Privacy Policy Agreement Checker for E-servicesFull-text access may be available. Sign in or learn about subscription options.pp. 307-315
Papers
A Micro-FT-UART for Safety-Critical SoC-Based ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 316-321
Papers
MixVM - An Approach to Service Isolation and Data Protection in Mobile Context-Sensitive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 322-328
Papers
On the Security of Untrusted MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 329-334
Papers
Detecting Image Tampering Using Feature FusionFull-text access may be available. Sign in or learn about subscription options.pp. 335-340
Papers
SecMiLiA: An Approach in the Agent ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 341-348
Papers
Traffic Controller: A Practical Approach to Block Network Covert Timing ChannelFull-text access may be available. Sign in or learn about subscription options.pp. 349-354
Papers
Capturing Information Flow with Concatenated Dynamic Taint AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 355-362
Papers
Risk-Driven Architectural DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 363-368
Showing 100 out of 212