Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ARES
ARES 2008
Generate Citations
2008 Third International Conference on Availability, Reliability and Security
March 4 2008 to March 7 2008
Barcelona
Table of Contents
Papers
Conference Officers
Freely available from IEEE.
pp. xxii
Papers
[Publisher's information]
Freely available from IEEE.
pp. 1464
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xx
Papers
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-186
Papers
Information Stream Based Model for Organizing Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 1405-1412
Papers
Providing Fault Tolerance in Wireless Backhaul Network Design with Path Restoration
Full-text access may be available. Sign in or learn about subscription options.
pp. 604-609
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Chair Message
Freely available from IEEE.
pp. xxi
Papers
Keynote Atluri
Freely available from IEEE.
pp. xxiii-xxv
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-111
by
Emilio Soler
,
Veronika Stefanov
,
Jose-Norberto Mazon
,
Juan Trujillo
,
Eduardo Fernandez-Medina
,
Mario Piattini
Papers
Keynote Pernul
Freely available from IEEE.
pp. xxvi
Papers
Keynote Sandhu
Freely available from IEEE.
pp. xxvii-xxxii
Papers
Securing Telehealth Applications in a Web-Based e-Health Portal
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-9
by
Qian Liu
,
Shuo Lu
,
Yuan Hong
,
Lingyu Wang
,
Rachida Dssouli
Papers
Multi-Level Reputation-Based Greylisting
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-17
by
Andreas G.K. Janecek
,
Wilfried N. Gansterer
,
K. Ashwin Kumar
Papers
Hardening XDS-Based Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-25
by
Kim Wuyts
,
Riccardo Scandariato
,
Geert Claeys
,
Wouter Joosen
Papers
Finding Evidence of Antedating in Digital Investigations
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-32
by
Svein Yngvar Willassen
Papers
FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program Interruption
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-38
by
Navid Farazmand
,
Mahdi Fazeli
,
Seyyed Ghasem Miremadi
Papers
Economic and Security Aspects of Applying a Threshold Scheme in e-Health
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-46
by
Bernhard Riedl
,
Veronika Grascher
,
Mathias Kolb
,
Thomas Neubauer
Papers
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-55
by
Mehdi Kiani
,
Andrew Clark
,
George Mohay
Papers
On the Possibility of Small, Service-Free Disk Based Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-63
by
Jehan-Fran?ois P?ris
,
Thomas J.E. Schwarz
Papers
Efficient High Availability Commit Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-71
by
Heine Kolltveit
,
Svein-Olaf Hvasshovd
Papers
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-79
by
Alfredo Pironti
,
Riccardo Sisto
Papers
Towards Formal Specification of Abstract Security Properties
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-87
by
Antonio Ma?
,
Gimena Pujol
Papers
A Behavioral Model of Ideologically-motivated ?Snowball? Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-95
by
Natalia Stakhanova
,
Oleg Stakhanov
,
Ali Ghorbani
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-236
by
Sergio Pozo Hidalgo
,
Rafael Ceballos
,
Rafael Martínez Gasca
Papers
Property Specification and Static Verification of UML Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-103
by
Igor Siveroni
,
Andrea Zisman
,
George Spanoudakis
Papers
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-119
by
Chunhua Su
,
Feng Bao
,
Jianying Zhou
,
Tsuyoshi Takagi
,
Kouichi Sakurai
Papers
A Database Replication Protocol Where Multicast Writesets Are Always Committed
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-127
by
Jose Ramon Juarez-Rodriguez
,
J.E. Armendariz-I?igo
,
J.R. Gonzalez de Mendivil
,
F.D. Mu?oz-Escoi
Papers
Matching Policies with Security Claims of Mobile Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-135
by
Nataliia Bielova
,
Marco Dalla Torre
,
Nicola Dragoni
,
Ida Siahaan
Papers
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-143
by
David G. Rosado
,
Eduardo Fernandez-Medina
,
Javier L?pez
,
Mario Piattini
Papers
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-152
by
Amir R. Khakpour
,
Maryline Laurent-Maknavicius
,
Hakima Chaouchi
Papers
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-160
by
Maria Luisa Damiani
,
Claudio Silvestri
,
Elisa Bertino
Papers
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-170
by
Esma Aimeur
,
Gilles Brassard
,
Jose M. Fernandez
,
Flavien Serge Mani Onana
,
Zbigniew Rakowski
Papers
Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-178
by
Natsumi Kitajima
,
Yuichi Goto
,
Jingde Cheng
Papers
Defining Secure Business Processes with Respect to Multiple Objectives
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-194
by
Thomas Neubauer
,
Johannes Heurix
Papers
Analysis and Component-based Realization of Security Requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-203
by
Denis Hatebur
,
Maritta Heisel
,
Holger Schmidt
Papers
A Framework for Detecting Anomalies in VoIP Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-211
by
Yacine Bouzida
,
Christophe Mangin
Papers
Rapid Detection of Constant-Packet-Rate Flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-220
by
Kuan-Ta Chen
,
Jing-Kai Lou
Papers
Performance Analysis of Anonymous Communication Channels Provided by Tor
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-228
by
Andriy Panchenko
,
Lexi Pimenidis
,
Johannes Renner
Papers
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-244
by
William Yurcik
,
Clay Woolam
,
Greg Hellings
,
Latifur Khan
,
Bhavani Thuraisingham
Papers
A Distributed Defense Framework for Flooding-Based DDoS Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-252
by
Yonghua You
,
Mohammad Zulkernine
,
Anwar Haque
Papers
Pure MPLS Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-259
by
Liwen He
,
Paul Botham
Papers
Symmetric Active/Active Replication for Dependent Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-267
by
Christian Engelmann
,
Stephen L. Scott
,
Chokchai Leangsuksun
,
Xubin He
Ensuring Progress in Amnesiac Replicated Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-396
by
Ruben de Juan-Marin
,
Luis Irun-Briz
,
Francesc D. Munoz-Escoi
Papers
Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-275
by
Marcus V?
Papers
A Cause-Based Approach to Preventing Software Vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-283
by
David Byers
,
Nahid Shahmehri
Papers
Integrating a Security Plug-in with the OpenUP/Basic Development Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-291
by
Shanai Ardi
,
Nahid Shahmehri
Papers
A Novel Testbed for Detection of Malicious Software Functionality
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-301
by
Jostein Jensen
Papers
Type and Effect Annotations for Safe Memory Access in C
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-309
by
Syrine Tlili
,
Mourad Debbabi
Papers
Adaptabilty of a GP Based IDS on Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-318
by
Adetokunbo Makanju
,
Nur Zincir-Heywood
,
Evangelos Milios
Application-Oriented Trust in Distributed Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 434-439
by
Riccardo Scandariato
,
Yoram Ofek
,
Paolo Falcarin
,
Mario Baldi
Papers
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-326
by
Liwei Kuang
,
Mohammad Zulkernine
Papers
Fuzzy Private Matching (Extended Abstract)
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-334
by
Lukasz Chmielewski
,
Jaap-Henk Hoepman
Papers
Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-343
by
Jens-Uwe Bu?er
,
Steffen Fries
,
Martin Otto
,
Peter Hartmann
Papers
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-351
by
Christian Schl?ger
,
G?nther Pernul
Papers
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-359
by
Zonghua Zhang
,
Farid Nait-Abdesselam
,
Pin-Han Ho
Papers
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-368
by
Jos? Mar?a de Fuentes
,
Ana Isabel Gonz?lez-Tablas
,
Arturo Ribagorda
A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-472
by
Ryma Abassi
,
Sihem Guemara El Fatmi
Papers
Extending Mixed Serialisation Graphs to Replicated Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-375
by
Josep M. Bernab?-Gisbert
,
Francesc D. Mu?oz-Esco?
Papers
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-382
by
Frederic Stumpf
,
Claudia Eckert
,
Shane Balfe
Papers
Fuzzy Belief-Based Supervision
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-389
by
Alexandre Vorobiev
,
Rudolph Seviora
Papers
Enhancing Face Recognition with Location Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-403
by
R.J. Hulsebosch
,
P.W.G. Ebben
Papers
A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-409
by
Benjamin Satzger
,
Andreas Pietzowski
,
Wolfgang Trumler
,
Theo Ungerer
Papers
Defending On-Line Web Application Security with User-Behavior Surveillance
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-415
by
Yu-Chin Cheng
,
Chi-Sung Laih
,
Gu-Hsin Lai
,
Chia-Mei Chen
,
Tsuhan Chen
Papers
A Pattern-Driven Security Process for SOA Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 416-421
by
Nelly A. Delessy
,
Eduardo B. Fernandez
Papers
Towards a Dependable Architecture for Highly Available Internet Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-427
by
Pablo Neira Ayuso
,
Laurent Lef?vre
,
Denis Barbaron
,
Rafael M. Gasca
Papers
Assessing the Reliability and Cost of Web and Grid Orchestrations
Full-text access may be available. Sign in or learn about subscription options.
pp. 428-433
by
Alan Stewart
,
Maurice Clint
,
Terry Harmer
,
Peter Kilpatrick
,
Ron Perrott
,
Joaquim Gabarro
Papers
BlueTrust in a Real World
Full-text access may be available. Sign in or learn about subscription options.
pp. 440-445
by
Bradley Markides
,
Marijke Coetzee
Papers
Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles
Full-text access may be available. Sign in or learn about subscription options.
pp. 446-451
by
Ananda Swarup Das
,
Jitu Kumar Keshri
,
Kannan Srinathan
,
Vaibhav Srivastava
Papers
Privacy Protected ELF for Private Computing on Public Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-457
by
Thomas H. Morris
,
V.S.S. Nair
Papers
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 458-460
by
Chih-Yin Lin
Papers
An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-466
by
Li Xiaolei
,
Tian Jin
,
Zhao Tingdi
Papers
SPIT Detection and Prevention Method in VoIP Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 473-478
by
He Guang-Yu
,
Wen Ying-You
,
Zhao Hong
Papers
A New Approach to Analysis of Interval Availability
Full-text access may be available. Sign in or learn about subscription options.
pp. 479-483
by
Ezzat Kirmani
,
Cynthia S. Hood
Papers
SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 484-490
by
Xiang-he Yang
,
Hua-ping Hu
,
Xin Chen
Papers
Fault Effects in FlexRay-Based Networks with Hybrid Topology
Full-text access may be available. Sign in or learn about subscription options.
pp. 491-496
by
Mehdi Dehbashi
,
Vahid Lari
,
Seyed Ghassem Miremadi
,
Mohammad Shokrollah-Shirazi
Papers
Secure Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 497-502
by
Xun Yi
,
Mike Faulkner
,
Eiji Okamoto
Papers
SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 503-508
by
Abdelraouf Ouadjaout
,
Yacine Challal
,
Noureddine Lasla
,
Miloud Bagaa
Papers
The Impact of Flooding Attacks on Network-based Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 509-513
by
Meiko Jensen
,
Nils Gruschka
,
Norbert Luttenberger
Papers
Managing Priorities in Atomic Multicast Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 514-519
by
Emili Miedes
,
Francesc D. Mu?oz-Esco?
Papers
Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 520-525
by
Asier Mart?nez
,
Urko Zurutuza
,
Roberto Uribeetxeberria
,
Miguel Fern?ndez
,
Jesus Lizarraga
,
Ainhoa Serna
,
I?aki V?lez
Papers
An End-to-End Security Solution for SCTP
Full-text access may be available. Sign in or learn about subscription options.
pp. 526-531
by
Stefan Lindskog
,
Anna Brunstrom
Papers
An Identity-Based Group Key Agreement Protocol from Pairing
Full-text access may be available. Sign in or learn about subscription options.
pp. 532-537
by
Hongji Wang
,
Gang Yao
,
Qingshan Jiang
Papers
An Authenticated 3-Round Identity-Based Group Key Agreement Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 538-543
by
Gang Yao
,
Hongji Wang
,
Qingshan Jiang
Papers
High Capacity Steganographic Method Based Upon JPEG
Full-text access may be available. Sign in or learn about subscription options.
pp. 544-549
by
Adel Almohammad
,
Robert M. Hierons
,
Gheorghita Ghinea
Papers
Cluster-based Group Key Agreement for Wireless Ad hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 550-557
by
Elisavet Konstantinou
Increasing the Performability of Computer Clusters Using RADIC II
Full-text access may be available. Sign in or learn about subscription options.
pp. 653-658
by
Guna Santos
,
Angelo Duarte
,
Dolores Rexachs
,
Emilio Luque
Papers
A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words
Full-text access may be available. Sign in or learn about subscription options.
pp. 558-563
by
Chen Zhi-li
,
Huang Liu-sheng
,
Yu Zhen-shan
,
Li Ling-jun
,
Yang Wei
Papers
RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 564-571
by
Bo Zhang
,
Kai Han
,
Binoy Ravindran
,
E.D. Jensen
Papers
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 572-577
by
Jan Willemson
,
Arne Ansper
Papers
A Security Model and its Application to a Distributed Decision Support System for Healthcare
Full-text access may be available. Sign in or learn about subscription options.
pp. 578-585
by
Liang Xiao
,
Javier Vicente
,
Carlos S?ez
,
Andrew Peet
,
Alex Gibb
,
Paul Lewis
,
Srinandan Dasmahapatra
,
Madalina Croitoru
,
Horacio Gonz?lez-V?lez
,
Mag? Lluch i Ariet
,
David Dupplaw
Papers
Run-time Information Flow Monitoring based on Dynamic Dependence Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 586-591
by
Salvador Cavadini
,
Diego Cheda
Papers
Automated Process Classi?cation Framework using SELinux Security Context
Full-text access may be available. Sign in or learn about subscription options.
pp. 592-596
by
Pravin Shinde
,
Priyanka Sharma
,
Srinivas Guntupalli
Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 701-708
by
Rafael Martinez-Pelaez
,
Cristina Satizabal
,
Francisco Rico-Novella
,
Jordi Forne
Papers
Using Composition Policies to Manage Authentication and Authorization Patterns and Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 597-603
by
Judith E.Y. Rosseb?
,
Rolv Br?
Papers
Histogram Matrix: Log File Visualization for Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 610-617
by
Adrian Frei
,
Marc Rennhard
Papers
Context-based Profiling for Anomaly Intrusion Detection with Diagnosis
Full-text access may be available. Sign in or learn about subscription options.
pp. 618-623
by
Benferhat Salem
,
Tabia Karim
Papers
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 624-629
by
Ulf Larson
,
Erland Jonsson
,
Stefan Lindskog
Showing 100 out of 213
Load More
Load All