Default Cover Image

Fourth IEEE International Workshop on Information Assurance (IWIA'06)

Apr. 13 2006 to Apr. 14 2006

Royal Holloway, United Kingdom

ISBN: 0-7695-2564-4

Table of Contents

Introduction
Message from the Workshop ChairsFreely available from IEEE.pp. vii
Present and future challenges concerning DoS-attacks against PSAPs in VoIP networksFull-text access may be available. Sign in or learn about subscription options.pp. 6 pp.-108
Introduction
Program CommitteeFreely available from IEEE.pp. viii
Session I: Intrusion Detection and Prevention I
The LAIDS/LIDS Framework for Systematic IPS DesignFull-text access may be available. Sign in or learn about subscription options.pp. 3-11
Session I: Intrusion Detection and Prevention I
An Intelligent Detection and Response Strategy to False Positives and Network AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 12-31
Session I: Intrusion Detection and Prevention I
Active Event Correlation in Bro IDS to Detect Multi-stage AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 32-50
Session II: Evaluation and Criteria
Designing a Secure Point-of-Sale SystemFull-text access may be available. Sign in or learn about subscription options.pp. 51-65
Session II: Evaluation and Criteria
High Robustness Requirements in a Common Criteria Protection ProfileFull-text access may be available. Sign in or learn about subscription options.pp. 66-78
Session III: Modeling and Engineering Software Security
Ensuring Compliance between Policies, Requirements and Software Design: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 79-92
Session III: Modeling and Engineering Software Security
A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 93-102
Session IV: Defending Communication Systems
Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Session IV: Defending Communication Systems
Jamming Commercial Satellite Communications During Wartime: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 109-118
Session V: Intrusion Detection and Prevention II
An Application of Information Theory to Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 119-134
Session V: Intrusion Detection and Prevention II
HonIDS: Enhancing Honeypot System with Intrusion Detection ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 135-143
Session V: Intrusion Detection and Prevention II
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 144-156
Session VI: Modeling Security
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 157-168
Session VI: Modeling Security
Factoring High Level Information Flow Specifications into Low Level Access ControlsFull-text access may be available. Sign in or learn about subscription options.pp. 169-186
Author Index
Author IndexFreely available from IEEE.pp. 187
Showing 21 out of 21