Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ARES
ARES 2010
Generate Citations
2010 International Conference on Availability, Reliability and Security
Feb. 15 2010 to Feb. 18 2010
Krakow, Poland
ISBN: 978-0-7695-3965-2
Table of Contents
Papers
A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results
Full-text access may be available. Sign in or learn about subscription options.
pp. 696-701
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xiv
Papers
Welcome Message from ARES 2010 Chairs
Freely available from IEEE.
pp. xv
Papers
Welcome Message from ARES 2010 Workshop Co-Chair
Freely available from IEEE.
pp. xvi
Papers
ARES 2010 Conference Officers
Freely available from IEEE.
pp. xvii
Papers
ARES 2010 Reviewer List
Freely available from IEEE.
pp. xviii-xx
Papers
Welcome Message from the FARES 2010 Workshop C0-Chairs
Freely available from IEEE.
pp. xxi
Papers
Welcome Message from the OSA 2010 Workshop Chair
Freely available from IEEE.
pp. xxii
Papers
OSA 2010 Organizing Committee
Freely available from IEEE.
pp. xxiii
Papers
OSA 2010 Reviewer List
Freely available from IEEE.
pp. xxiv
Papers
Welcome Message from the SECSE 2010 Workshop Organizers
Freely available from IEEE.
pp. xxv
Papers
SecSE 2010 Organization
Freely available from IEEE.
pp. xxvi
Papers
Welcome Message from the SPattern 2010 Workshop Organizers
Freely available from IEEE.
pp. xxvii
Papers
SPattern 2010 Organization Committee
Freely available from IEEE.
pp. xxviii
Papers
Welcome Message from the WAIS 2010 Workshop Chair
Freely available from IEEE.
pp. xxix
Papers
WAIS 2010 Organizing Committee
Freely available from IEEE.
pp. xxx
Papers
WAIS 2010 reviewers
Freely available from IEEE.
pp. xxxi
Papers
Welcome Message from the WSDF 2010 Workshop Organizers
Freely available from IEEE.
pp. xxxii
Papers
WSDF 2010 Organizing Committee
Freely available from IEEE.
pp. xxxiii
Papers
A Security Decision-Reaction Architecture for Heterogeneous Distributed Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Christophe Feltus
,
Djamel Khadraoui
,
Jocelyn Aubert
Papers
Dual-Level Attack Detection and Characterization for Networks under DDoS
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Anjali Sardana
,
Ramesh Chandra Joshi
Papers
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-24
by
Hai Nguyen
,
Katrin Franke
,
Slobodan Petrovic
Papers
Analytical Approach to Attack Graph Analysis for Network Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-32
by
Phongphun Kijsanayothin
,
Rattikorn Hewett
Papers
Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-40
by
Gregory Epiphaniou
,
Carsten Maple
,
Paul Sant
,
Matthew Reeve
Papers
A Computer Architecture with Hardwarebased Malware Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-45
by
Klaus Hildebrandt
,
Igor Podebrad
,
Bernd Klauer
Papers
Solving the Transitive Access Problem for the Services Oriented Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-53
by
Alan H. Karp
,
Jun Li
Papers
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-61
by
Byoungcheon Lee
Papers
Secure Bindings of SAML Assertions to TLS Sessions
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-69
by
Florian Kohlar
,
Jörg Schwenk
,
Meiko Jensen
,
Sebastian Gajek
Papers
From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-78
by
Yehia Elrakaiby
,
Frédéric Cuppens
,
Nora Cuppens-Boulahia
Papers
2-clickAuth
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-86
by
Anna Vapen
,
David Byers
,
Nahid Shahmehri
Architecture-Aware Adaptive Deployment of Contextual Security Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-95
by
Stere Preda
,
Nora Cuppens-Boulahia
,
Frédéric Cuppens
,
Laurent Toutain
Papers
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-103
by
Guenther Starnberger
,
Lorenz Froihofer
,
Karl M. Goeschka
Papers
A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-111
by
Alex Hai Wang
,
Su Yan
,
Peng Liu
Papers
FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-118
by
Fatima Zohra Benhamida
,
Yacine Challal
Papers
An Adaptive Redundancy Oriented Method to Tolerate Soft Errors in SRAM-Based FPGAs Using Unused Resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
Somayeh Bahramnejad
,
Hamid Reza Zarandi
Papers
Analysis of Transient Faults on a MIPS-Based Dual-Core Processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-130
by
Iman Faraji
,
Moslem Didehban
,
Hamid Reza Zarandi
Papers
Visualizing Past Personal Data Disclosures
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-139
by
Jan Kolter
,
Michael Netter
,
Günther Pernul
Papers
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-147
by
Bernard Stepien
,
Stan Matwin
,
Amy Felty
Papers
Multi-dimensional Uncertainty Analysis in Secure and Dependable Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-155
by
Yudistira Asnar
,
Paolo Giorgini
Papers
Information Flow in Disaster Management Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-163
by
Achim D. Brucker
,
Dieter Hutter
Papers
Formal Specification and Analysis of an E-voting System
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-171
by
Komminist Weldemariam
,
Richard A. Kemmerer
,
Adolfo Villafiorita
Papers
Towards a Privacy-Enhanced Social Networking Site
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-179
by
Esma Aïmeur
,
Sébastien Gambs
,
Ai Ho
Papers
A Formal Approach Towards Risk-Aware Service Level Analysis and Planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-187
by
Stefan Jakoubi
,
Simon Tjoa
,
Sigrun Goluch
,
Gerhard Kitzler
Papers
Threat- and Risk-Analysis During Early Security Requirements Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-195
by
Holger Schmidt
Papers
An Analysis of Information Security Awareness within Home and Work Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-203
by
Shuhaili Talib
,
Nathan L. Clarke
,
Steven M. Furnell
Trust Based Multi Path DSR Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Poonam Gera
,
Kumkum Garg
,
Manoj Misra
Papers
Enhanced Chaotic Stream Cipher for WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-215
by
Rui Miguel Soares Silva
,
Rui Gustavo Nunes Pereira Crespo
,
Mário Serafim dos Santos Nunes
Papers
Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-221
by
A.A. Adekunle
,
S.R. Woodhead
Papers
A Semantic Security Architecture for Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-227
by
Stefan Dürbeck
,
Christoph Fritsch
,
Günther Pernul
,
Rolf Schillinger
Papers
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-235
by
Thorsten Hoellrigl
,
Jochen Dinger
,
Hannes Hartenstein
Papers
Owner-Based Role-Based Access Control OB-RBAC
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-241
by
Mohsen Saffarian
,
Babak Sadighi
Papers
Program Obfuscation by Strong Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-247
by
Vrba
,
Pâl Halvorsen
,
Carsten Griwodz
Papers
Pitfalls in Formal Reasoning about Security Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-253
by
Nina Moebius
,
Kurt Stenzel
,
Wolfgang Reif
Papers
Secure Group Communication Using Fractional Public Keys
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-257
by
Sigurd Eskeland
,
Vladimir Oleshchuk
Papers
Extending the Gordon and Loeb Model for Information Security Investment
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-261
by
Jan Willemson
Papers
Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-267
by
Jocelyn Aubert
,
Thomas Schaberreiter
,
Christophe Incoul
,
Djamel Khadraoui
,
Benjamin Gâteau
Papers
Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-274
by
Simon Tjoa
,
Stefan Jakoubi
,
Sigrun Goluch
,
Gerhard Kitzler
Security and Usability: Analysis and Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-282
by
Ronald Kainda
,
Ivan Fléchais
,
A.W. Roscoe
Papers
Recovery of Skype Application Activity Data from Physical Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-288
by
Matthew Simon
,
Jill Slay
Papers
Rejuvenating High Available Virtualized Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-294
by
Arash Rezaei
,
Mohsen Sharifi
Detection of Spyware by Mining Executable Files
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-302
by
Raja Khurram Shahzad
,
Syed Imran Haider
,
Niklas Lavesson
Papers
A Probabilistic Approach for On-Line Sum-Auditing
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-308
by
Gerardo Canfora
,
Bice Cavallo
Papers
Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-314
by
Mansoor Ahmed
,
Amin Anjomshoaa
,
Muhammad Asfandeyar
,
A. Min Tjoa
,
Abid Khan
Papers
Optimising IDS Sensor Placement
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-320
by
Hao Chen
,
John A. Clark
,
Siraj A. Shaikh
,
Howard Chivers
,
Philip Nobles
Papers
Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-326
by
Neminath Hubballi
,
Santosh Biswas
,
Sukumar Nandi
Papers
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-332
by
Jorge Blasco
,
Agustín Orfila
,
Arturo Ribagorda
Papers
On the Simulation of a Software Reputation System
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-340
by
Martin Boldt
,
Anton Borg
,
Bengt Carlsson
Papers
Model-Driven Application-Level Encryption for the Privacy of E-health Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-346
by
Yun Ding
,
Karsten Klein
Papers
Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-352
by
Tanveer A Zia
,
Md Zahidul Islam
Papers
A Multi-stage Methodology for Ensuring Appropriate Security Culture and Governance
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-360
by
Solange Ghernouti-Hélie
,
Igli Tashi
,
David Simms
Papers
Development of ICT Infrastructure for Local Socio-Economic System in Japan
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-369
by
Hiroshi Nagano
Papers
A National Strategy for an Effective Cybersecurity Approach and Culture
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-373
by
Solange Ghernouti-Hélie
Papers
Choosing Authentication Techniques in E-procurement System in Serbia
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-379
by
Miloš Milovanovic
,
Marija Bogicevic
,
Miroslav Lazovic
,
Dejan Simic
,
Dušan Starcevic
Papers
A Continuous Authentication System Based on User Behavior Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-385
by
Ines Brosso
,
Alessandro La Neve
,
Graça Bressan
,
Wilson Vicente Ruggiero
Papers
Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-390
by
Dejan Baca
Papers
Reselling Digital Content
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-396
by
Laila El Aimani
,
Yona Raekow
Papers
A New DRM Architecture with Strong Enforcement
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-403
by
Sascha Müller
,
Stefan Katzenbeisser
Papers
A Secure and Scalable Grid-Based Content Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-409
by
Benjamin Aziz
,
Alvaro Arenas
,
Giovanni Cortese
,
Bruno Crispo
,
Silvio Causetti
Papers
A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-415
by
Nils Gruschka
,
Meiko Jensen
,
Luigi Lo Iacono
Papers
Challenging IS and ISM Standardization for Business Benefits
Full-text access may be available. Sign in or learn about subscription options.
pp. 416-421
by
Juhani Anttila
,
Jorma Kajava
Papers
Managing the Asset Risk of SMEs
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-429
by
Luís Enrique Sánchez
,
Carlos Ruiz
,
Eduardo Fernández-Medina
,
Mario Piattini
Papers
A Generic Metamodel for IT Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-437
by
André Miede
,
Nedislav Nedyalkov
,
Christian Gottron
,
André König
,
Nicolas Repp
,
Ralf Steinmetz
Papers
Combining Misuse Cases with Attack Trees and Security Activity Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-445
by
Inger Anne Tøndel
,
Jostein Jensen
,
Lillian Røstad
External Insider Threat: A Real Security Challenge in Enterprise Value Webs
Full-text access may be available. Sign in or learn about subscription options.
pp. 446-453
by
Virginia N.L. Franqueira
,
Roel Wieringa
,
André van Cleeff
,
Pascal van Eck
Papers
Secure Monitoring of Service Level Agreements
Full-text access may be available. Sign in or learn about subscription options.
pp. 454-461
by
K.P. Clark
,
M.E. Warnier
,
F.M.T. Brazier
,
T.B. Quillinan
Fighting Phishing with Trusted Email
Full-text access may be available. Sign in or learn about subscription options.
pp. 462-467
by
Jordan Crain
,
Lukasz Opyrchal
,
Atul Prakash
Papers
Application and Economic Implications of an Automated Requirement-Oriented and Standard-Based Compliance Monitoring and Reporting Prototype
Full-text access may be available. Sign in or learn about subscription options.
pp. 468-474
by
Matthias Kehlenbeck
,
Thorben Sandner
,
Michael H. Breitner
Papers
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept
Full-text access may be available. Sign in or learn about subscription options.
pp. 475-480
by
Lucie Langer
,
Axel Schmidt
,
Johannes Buchmann
,
Melanie Volkamer
Papers
Secured Key Distribution Scheme for Cryptographic Key Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-486
by
Kyawt Kyawt Khaing
,
Khin Mi Mi Aung
Papers
One Size Fits None: The Importance of Detector Parameterization
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-494
by
Natasha Bodorik
,
A. Nur Zincir-Heywood
Papers
Supporting Authorization Policy Modification in Agile Development of Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 495-500
by
Steffen Bartsch
Papers
The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 501-506
by
Richard Sasson
,
Martin Gilje Jaatun
,
Jostein Jensen
Papers
Katana: A Hot Patching Framework for ELF Executables
Full-text access may be available. Sign in or learn about subscription options.
pp. 507-512
by
Ashwin Ramaswamy
,
Sergey Bratus
,
Sean W. Smith
,
Michael E. Locasto
Papers
Investigating the Limitations of Java Annotations for Input Validation
Full-text access may be available. Sign in or learn about subscription options.
pp. 513-518
by
Federico Mancini
,
Dag Hovland
,
Khalid A. Mughal
Papers
Classification of Buffer Overflow Vulnerability Monitors
Full-text access may be available. Sign in or learn about subscription options.
pp. 519-524
by
Hossain Shahriar
,
Mohammad Zulkernine
Papers
Configuration Fuzzing for Software Vulnerability Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 525-530
by
Huning Dai
,
Christian Murphy
,
Gail Kaiser
Papers
Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-536
by
Christian Jung
,
Frank Elberzhager
,
Alessandra Bagnato
,
Fabio Raiteri
Showing 100 out of 131
Load More
Load All