Default Cover Image

2010 International Conference on Availability, Reliability and Security

Feb. 15 2010 to Feb. 18 2010

Krakow, Poland

ISBN: 978-0-7695-3965-2

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xiv
Papers
Welcome Message from ARES 2010 ChairsFreely available from IEEE.pp. xv
Papers
Welcome Message from ARES 2010 Workshop Co-ChairFreely available from IEEE.pp. xvi
Papers
ARES 2010 Conference OfficersFreely available from IEEE.pp. xvii
Papers
ARES 2010 Reviewer ListFreely available from IEEE.pp. xviii-xx
Papers
Welcome Message from the FARES 2010 Workshop C0-ChairsFreely available from IEEE.pp. xxi
Papers
Welcome Message from the OSA 2010 Workshop ChairFreely available from IEEE.pp. xxii
Papers
OSA 2010 Organizing CommitteeFreely available from IEEE.pp. xxiii
Papers
OSA 2010 Reviewer ListFreely available from IEEE.pp. xxiv
Papers
Welcome Message from the SECSE 2010 Workshop OrganizersFreely available from IEEE.pp. xxv
Papers
SecSE 2010 OrganizationFreely available from IEEE.pp. xxvi
Papers
Welcome Message from the SPattern 2010 Workshop OrganizersFreely available from IEEE.pp. xxvii
Papers
SPattern 2010 Organization CommitteeFreely available from IEEE.pp. xxviii
Papers
Welcome Message from the WAIS 2010 Workshop ChairFreely available from IEEE.pp. xxix
Papers
WAIS 2010 Organizing CommitteeFreely available from IEEE.pp. xxx
Papers
WAIS 2010 reviewersFreely available from IEEE.pp. xxxi
Papers
Welcome Message from the WSDF 2010 Workshop OrganizersFreely available from IEEE.pp. xxxii
Papers
WSDF 2010 Organizing CommitteeFreely available from IEEE.pp. xxxiii
Papers
A Security Decision-Reaction Architecture for Heterogeneous Distributed NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Dual-Level Attack Detection and Characterization for Networks under DDoSFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Papers
Improving Effectiveness of Intrusion Detection by Correlation Feature SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 17-24
Papers
Analytical Approach to Attack Graph Analysis for Network SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 25-32
Papers
A Computer Architecture with Hardwarebased Malware DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 41-45
Papers
Solving the Transitive Access Problem for the Services Oriented ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 46-53
Papers
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 54-61
Papers
Secure Bindings of SAML Assertions to TLS SessionsFull-text access may be available. Sign in or learn about subscription options.pp. 62-69
Papers
From Contextual Permission to Dynamic Pre-obligation: An Integrated ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 70-78
Papers
2-clickAuthFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
Architecture-Aware Adaptive Deployment of Contextual Security PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 87-95
Papers
Using Smart Cards for Tamper-Proof Timestamps on Untrusted ClientsFull-text access may be available. Sign in or learn about subscription options.pp. 96-103
Papers
A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
Papers
FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 112-118
Papers
An Adaptive Redundancy Oriented Method to Tolerate Soft Errors in SRAM-Based FPGAs Using Unused ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 119-124
Papers
Analysis of Transient Faults on a MIPS-Based Dual-Core ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 125-130
Papers
Visualizing Past Personal Data DisclosuresFull-text access may be available. Sign in or learn about subscription options.pp. 131-139
Papers
Strategies for Reducing Risks of Inconsistencies in Access Control PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 140-147
Papers
Multi-dimensional Uncertainty Analysis in Secure and Dependable DomainFull-text access may be available. Sign in or learn about subscription options.pp. 148-155
Papers
Information Flow in Disaster Management SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 156-163
Papers
Formal Specification and Analysis of an E-voting SystemFull-text access may be available. Sign in or learn about subscription options.pp. 164-171
Papers
Towards a Privacy-Enhanced Social Networking SiteFull-text access may be available. Sign in or learn about subscription options.pp. 172-179
Papers
A Formal Approach Towards Risk-Aware Service Level Analysis and PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 180-187
Papers
Threat- and Risk-Analysis During Early Security Requirements EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 188-195
Papers
An Analysis of Information Security Awareness within Home and Work EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 196-203
Trust Based Multi Path DSR ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 204-209
Papers
Enhanced Chaotic Stream Cipher for WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 210-215
Papers
Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 216-221
Papers
A Semantic Security Architecture for Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 222-227
Papers
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 228-235
Papers
Owner-Based Role-Based Access Control OB-RBACFull-text access may be available. Sign in or learn about subscription options.pp. 236-241
Papers
Program Obfuscation by Strong CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 242-247
Papers
Pitfalls in Formal Reasoning about Security ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 248-253
Papers
Secure Group Communication Using Fractional Public KeysFull-text access may be available. Sign in or learn about subscription options.pp. 254-257
Papers
Extending the Gordon and Loeb Model for Information Security InvestmentFull-text access may be available. Sign in or learn about subscription options.pp. 258-261
Papers
Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 268-274
Security and Usability: Analysis and EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 275-282
Papers
Recovery of Skype Application Activity Data from Physical MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 283-288
Papers
Rejuvenating High Available Virtualized SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 289-294
Detection of Spyware by Mining Executable FilesFull-text access may be available. Sign in or learn about subscription options.pp. 295-302
Papers
A Probabilistic Approach for On-Line Sum-AuditingFull-text access may be available. Sign in or learn about subscription options.pp. 303-308
Papers
Towards an Ontology-Based Solution for Managing License Agreement Using Semantic DesktopFull-text access may be available. Sign in or learn about subscription options.pp. 309-314
Papers
Optimising IDS Sensor PlacementFull-text access may be available. Sign in or learn about subscription options.pp. 315-320
Papers
Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 321-326
Papers
Improving Network Intrusion Detection by Means of Domain-Aware Genetic ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 327-332
Papers
On the Simulation of a Software Reputation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 333-340
Papers
Model-Driven Application-Level Encryption for the Privacy of E-health DataFull-text access may be available. Sign in or learn about subscription options.pp. 341-346
Papers
Communal Reputation and Individual Trust (CRIT) in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 347-352
Papers
A Multi-stage Methodology for Ensuring Appropriate Security Culture and GovernanceFull-text access may be available. Sign in or learn about subscription options.pp. 353-360
Papers
Development of ICT Infrastructure for Local Socio-Economic System in JapanFull-text access may be available. Sign in or learn about subscription options.pp. 361-369
Papers
A National Strategy for an Effective Cybersecurity Approach and CultureFull-text access may be available. Sign in or learn about subscription options.pp. 370-373
Papers
Choosing Authentication Techniques in E-procurement System in SerbiaFull-text access may be available. Sign in or learn about subscription options.pp. 374-379
Papers
A Continuous Authentication System Based on User Behavior AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 380-385
Papers
Identifying Security Relevant Warnings from Static Code Analysis Tools through Code TaintingFull-text access may be available. Sign in or learn about subscription options.pp. 386-390
Papers
Reselling Digital ContentFull-text access may be available. Sign in or learn about subscription options.pp. 391-396
Papers
A New DRM Architecture with Strong EnforcementFull-text access may be available. Sign in or learn about subscription options.pp. 397-403
Papers
A Secure and Scalable Grid-Based Content Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 404-409
Papers
A Design Pattern for Event-Based Processing of Security-Enriched SOAP MessagesFull-text access may be available. Sign in or learn about subscription options.pp. 410-415
Papers
Challenging IS and ISM Standardization for Business BenefitsFull-text access may be available. Sign in or learn about subscription options.pp. 416-421
Papers
Managing the Asset Risk of SMEsFull-text access may be available. Sign in or learn about subscription options.pp. 422-429
Papers
A Generic Metamodel for IT SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 430-437
Papers
Combining Misuse Cases with Attack Trees and Security Activity ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 438-445
External Insider Threat: A Real Security Challenge in Enterprise Value WebsFull-text access may be available. Sign in or learn about subscription options.pp. 446-453
Papers
Secure Monitoring of Service Level AgreementsFull-text access may be available. Sign in or learn about subscription options.pp. 454-461
Fighting Phishing with Trusted EmailFull-text access may be available. Sign in or learn about subscription options.pp. 462-467
Papers
Secured Key Distribution Scheme for Cryptographic Key Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 481-486
Papers
One Size Fits None: The Importance of Detector ParameterizationFull-text access may be available. Sign in or learn about subscription options.pp. 487-494
Papers
Supporting Authorization Policy Modification in Agile Development of Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 495-500
Papers
The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 501-506
Papers
Katana: A Hot Patching Framework for ELF ExecutablesFull-text access may be available. Sign in or learn about subscription options.pp. 507-512
Papers
Investigating the Limitations of Java Annotations for Input ValidationFull-text access may be available. Sign in or learn about subscription options.pp. 513-518
Papers
Classification of Buffer Overflow Vulnerability MonitorsFull-text access may be available. Sign in or learn about subscription options.pp. 519-524
Papers
Configuration Fuzzing for Software Vulnerability DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 525-530
Papers
Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial ProjectFull-text access may be available. Sign in or learn about subscription options.pp. 531-536
Showing 100 out of 131