Default Cover Image

2008 Third International Conference on Availability, Reliability and Security

March 4 2008 to March 7 2008

Barcelona

Table of Contents

Papers
Conference OfficersFreely available from IEEE.pp. xxii
Papers
[Publisher's information]Freely available from IEEE.pp. 1464
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xx
Papers
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation MethodologyFull-text access may be available. Sign in or learn about subscription options.pp. 179-186
Papers
Information Stream Based Model for Organizing SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 1405-1412
Papers
Providing Fault Tolerance in Wireless Backhaul Network Design with Path RestorationFull-text access may be available. Sign in or learn about subscription options.pp. 604-609
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Chair MessageFreely available from IEEE.pp. xxi
Papers
Keynote AtluriFreely available from IEEE.pp. xxiii-xxv
Papers
Keynote PernulFreely available from IEEE.pp. xxvi
Papers
Keynote SandhuFreely available from IEEE.pp. xxvii-xxxii
Papers
Securing Telehealth Applications in a Web-Based e-Health PortalFull-text access may be available. Sign in or learn about subscription options.pp. 3-9
Papers
Multi-Level Reputation-Based GreylistingFull-text access may be available. Sign in or learn about subscription options.pp. 10-17
Papers
Hardening XDS-Based ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 18-25
Papers
Finding Evidence of Antedating in Digital InvestigationsFull-text access may be available. Sign in or learn about subscription options.pp. 26-32
Papers
FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program InterruptionFull-text access may be available. Sign in or learn about subscription options.pp. 33-38
Papers
Economic and Security Aspects of Applying a Threshold Scheme in e-HealthFull-text access may be available. Sign in or learn about subscription options.pp. 39-46
Papers
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 47-55
Papers
On the Possibility of Small, Service-Free Disk Based Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 56-63
Papers
Efficient High Availability Commit ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 64-71
Papers
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 72-79
Papers
Towards Formal Specification of Abstract Security PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 80-87
Papers
A Behavioral Model of Ideologically-motivated ?Snowball? AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 88-95
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule SetsFull-text access may be available. Sign in or learn about subscription options.pp. 229-236
Papers
Property Specification and Static Verification of UML ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 96-103
Papers
A New Scheme for Distributed Density Estimation based Privacy-Preserving ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 112-119
Papers
Matching Policies with Security Claims of Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 128-135
Papers
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 136-143
Papers
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 144-152
Papers
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 153-160
Papers
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender SystemFull-text access may be available. Sign in or learn about subscription options.pp. 161-170
Papers
Fast Qualitative Reasoning about Actions for Computing Anticipatory SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 171-178
Papers
Defining Secure Business Processes with Respect to Multiple ObjectivesFull-text access may be available. Sign in or learn about subscription options.pp. 187-194
Papers
Analysis and Component-based Realization of Security RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 195-203
Papers
A Framework for Detecting Anomalies in VoIP NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 204-211
Papers
Rapid Detection of Constant-Packet-Rate FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 212-220
Papers
Performance Analysis of Anonymous Communication Channels Provided by TorFull-text access may be available. Sign in or learn about subscription options.pp. 221-228
Papers
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field CaseFull-text access may be available. Sign in or learn about subscription options.pp. 237-244
Papers
A Distributed Defense Framework for Flooding-Based DDoS AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 245-252
Papers
Pure MPLS TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 253-259
Papers
Symmetric Active/Active Replication for Dependent ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 260-267
Ensuring Progress in Amnesiac Replicated SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 390-396
Papers
Statically Checking Confidentiality of Shared Memory Programs with Dynamic LabelsFull-text access may be available. Sign in or learn about subscription options.pp. 268-275
Papers
A Cause-Based Approach to Preventing Software VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 276-283
Papers
Integrating a Security Plug-in with the OpenUP/Basic Development ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 284-291
Papers
A Novel Testbed for Detection of Malicious Software FunctionalityFull-text access may be available. Sign in or learn about subscription options.pp. 292-301
Papers
Type and Effect Annotations for Safe Memory Access in CFull-text access may be available. Sign in or learn about subscription options.pp. 302-309
Papers
Adaptabilty of a GP Based IDS on Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 310-318
Application-Oriented Trust in Distributed ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 434-439
Papers
An Intrusion-Tolerant Mechanism for Intrusion Detection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 319-326
Papers
Fuzzy Private Matching (Extended Abstract)Full-text access may be available. Sign in or learn about subscription options.pp. 327-334
Papers
Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global KnowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 335-343
Papers
Trust Modelling in E-Commerce through Fuzzy Cognitive MapsFull-text access may be available. Sign in or learn about subscription options.pp. 344-351
A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall CaseFull-text access may be available. Sign in or learn about subscription options.pp. 467-472
Papers
Extending Mixed Serialisation Graphs to Replicated EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 369-375
Papers
Towards Secure E-Commerce Based on Virtualization and Attestation TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 376-382
Papers
Fuzzy Belief-Based SupervisionFull-text access may be available. Sign in or learn about subscription options.pp. 383-389
Papers
Enhancing Face Recognition with Location InformationFull-text access may be available. Sign in or learn about subscription options.pp. 397-403
Papers
A Lazy Monitoring Approach for Heartbeat-Style Failure DetectorsFull-text access may be available. Sign in or learn about subscription options.pp. 404-409
Papers
Defending On-Line Web Application Security with User-Behavior SurveillanceFull-text access may be available. Sign in or learn about subscription options.pp. 410-415
Papers
A Pattern-Driven Security Process for SOA ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 416-421
Papers
Towards a Dependable Architecture for Highly Available Internet ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 422-427
Papers
Assessing the Reliability and Cost of Web and Grid OrchestrationsFull-text access may be available. Sign in or learn about subscription options.pp. 428-433
Papers
BlueTrust in a Real WorldFull-text access may be available. Sign in or learn about subscription options.pp. 440-445
Papers
Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal ObstaclesFull-text access may be available. Sign in or learn about subscription options.pp. 446-451
Papers
Privacy Protected ELF for Private Computing on Public PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 452-457
Papers
haplog: A Hash-Only and Privacy-Preserved Secure Logging MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 458-460
Papers
An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200Full-text access may be available. Sign in or learn about subscription options.pp. 461-466
Papers
SPIT Detection and Prevention Method in VoIP EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 473-478
Papers
A New Approach to Analysis of Interval AvailabilityFull-text access may be available. Sign in or learn about subscription options.pp. 479-483
Papers
SFMD: A Secure Data Forwarding and Malicious Routers Detecting ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 484-490
Papers
Fault Effects in FlexRay-Based Networks with Hybrid TopologyFull-text access may be available. Sign in or learn about subscription options.pp. 491-496
Papers
Secure Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 497-502
Papers
SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 503-508
Papers
The Impact of Flooding Attacks on Network-based ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 509-513
Papers
Managing Priorities in Atomic Multicast ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 514-519
Papers
Beacon Frame Spoofing Attack Detection in IEEE 802.11 NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 520-525
Papers
An End-to-End Security Solution for SCTPFull-text access may be available. Sign in or learn about subscription options.pp. 526-531
Papers
An Identity-Based Group Key Agreement Protocol from PairingFull-text access may be available. Sign in or learn about subscription options.pp. 532-537
Papers
An Authenticated 3-Round Identity-Based Group Key Agreement ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 538-543
Papers
High Capacity Steganographic Method Based Upon JPEGFull-text access may be available. Sign in or learn about subscription options.pp. 544-549
Papers
Cluster-based Group Key Agreement for Wireless Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 550-557
Increasing the Performability of Computer Clusters Using RADIC IIFull-text access may be available. Sign in or learn about subscription options.pp. 653-658
Papers
A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of WordsFull-text access may be available. Sign in or learn about subscription options.pp. 558-563
Papers
RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 564-571
Papers
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 572-577
Papers
Run-time Information Flow Monitoring based on Dynamic Dependence GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 586-591
Papers
Automated Process Classi?cation Framework using SELinux Security ContextFull-text access may be available. Sign in or learn about subscription options.pp. 592-596
Papers
Using Composition Policies to Manage Authentication and Authorization Patterns and ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 597-603
Papers
Histogram Matrix: Log File Visualization for Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 610-617
Papers
Context-based Profiling for Anomaly Intrusion Detection with DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 618-623
Papers
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 624-629
Showing 100 out of 213