Default Cover Image

2008 Second International Conference on Emerging Security Information, Systems and Technologies

Aug. 25 2008 to Aug. 31 2008

ISBN: 978-0-7695-3329-2

Table of Contents

Papers
[Publisher's information]Freely available from IEEE.pp. 436
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-x
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
PrefaceFreely available from IEEE.pp. xi-xii
Papers
CommitteesFreely available from IEEE.pp. xiii-xvi
Papers
Enhancing Trusted Platform Modules with Hardware-Based Virtualization TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Papers
A Secure Task Delegation Model for WorkflowsFull-text access may be available. Sign in or learn about subscription options.pp. 10-15
Papers
Formal Modeling of Authentication in SIP RegistrationFull-text access may be available. Sign in or learn about subscription options.pp. 16-21
Papers
A New Approach for Secure and Portable OSFull-text access may be available. Sign in or learn about subscription options.pp. 28-33
Papers
Distack -- A Framework for Anomaly-Based Large-Scale Attack DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 34-40
Papers
Team?-Based MAC Policy over Security-?Enhanced LinuxFull-text access may be available. Sign in or learn about subscription options.pp. 41-46
Papers
Prototyping a New Identity Authentication Framework for IP TelephonyFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
Efficient Anomaly Detection System for Mobile HandsetsFull-text access may be available. Sign in or learn about subscription options.pp. 154-160
Papers
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule SetsFull-text access may be available. Sign in or learn about subscription options.pp. 53-61
Papers
Security Patterns for Capturing Encryption-Based Access Control to Sensor DataFull-text access may be available. Sign in or learn about subscription options.pp. 62-67
Papers
Security Policy Management for Peer Group MeetingsFull-text access may be available. Sign in or learn about subscription options.pp. 68-73
Papers
FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 74-79
Papers
Proving Trust LocallyFull-text access may be available. Sign in or learn about subscription options.pp. 80-87
Papers
A Security Framework for Input ValidationFull-text access may be available. Sign in or learn about subscription options.pp. 88-92
Papers
Defending E-Banking Services: Antiphishing ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 93-98
Papers
Preventing Insider Information Leakage for EnterprisesFull-text access may be available. Sign in or learn about subscription options.pp. 99-106
Papers
Scalable Detection of SIP Fuzzing AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 114-119
Papers
Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil AttackFull-text access may be available. Sign in or learn about subscription options.pp. 120-126
Papers
The Automatic Discovery, Identification and Measurement of BotnetsFull-text access may be available. Sign in or learn about subscription options.pp. 127-132
Papers
A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin PolicyFull-text access may be available. Sign in or learn about subscription options.pp. 133-138
Papers
Email Worm Mitigation by Controlling the Name Server Response RateFull-text access may be available. Sign in or learn about subscription options.pp. 139-145
Papers
Anti-counterfeiting with a Random PatternFull-text access may be available. Sign in or learn about subscription options.pp. 146-153
Papers
Providing Secure Access to Unsecure Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 161-164
Papers
Towards Decentralised Security Policies for e-Health CollaborationsFull-text access may be available. Sign in or learn about subscription options.pp. 165-172
Papers
Rating Agencies Interoperation for Peer-to-Peer Online TransactionsFull-text access may be available. Sign in or learn about subscription options.pp. 173-178
Security Governance for Enterprise VoIP CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 279-286
Papers
Optimal Trust Network Analysis with Subjective LogicFull-text access may be available. Sign in or learn about subscription options.pp. 179-184
Papers
From Monitoring Templates to Security Monitoring and Threat DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 185-192
Papers
Family of Parameterized Hash AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 203-208
Papers
Public Key Cryptography: A Dynamical Systems PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
Papers
A Related-Key Attack on TREYFERFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
Papers
Security and Adoption of Internet PaymentFull-text access may be available. Sign in or learn about subscription options.pp. 218-223
Papers
Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001Full-text access may be available. Sign in or learn about subscription options.pp. 224-231
Papers
Generic and Complete Three-Level Identity Management ModelFull-text access may be available. Sign in or learn about subscription options.pp. 232-237
Papers
A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 238-242
Papers
A New Anti-phishing Method in OpenIDFull-text access may be available. Sign in or learn about subscription options.pp. 243-247
Papers
Toward the Engineering of Security of Information Systems (ESIS): UML and the IS ConfidentialityFull-text access may be available. Sign in or learn about subscription options.pp. 248-256
Papers
Designing an Undergraduate Software Security CourseFull-text access may be available. Sign in or learn about subscription options.pp. 257-262
Papers
High-Speed Private Information Retrieval Computation on GPUFull-text access may be available. Sign in or learn about subscription options.pp. 263-272
Advanced Rule-Based Techniques in Mission Critical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 375-380
Papers
Vulnerability Dependencies in Antivirus SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 273-278
Papers
ToLeRating UR-STDFull-text access may be available. Sign in or learn about subscription options.pp. 287-293
Papers
Collaborative Approach to Automatic Classification of Heterogeneous Information SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 294-299
Papers
Infusing Information Assurance into an Undergraduate CS CurriculumFull-text access may be available. Sign in or learn about subscription options.pp. 300-305
Papers
On the Portability of Trained Machine Learning Classifiers for Early Application IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 306-310
Papers
Activity- and Inactivity-Based Approaches to Analyze an Assisted Living EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 311-316
Papers
Analysis of Computer Infection Risk Factors Based on Customer Network UsageFull-text access may be available. Sign in or learn about subscription options.pp. 317-325
Papers
Design-Time Learning for Operational Planning ImprovementFull-text access may be available. Sign in or learn about subscription options.pp. 326-331
Papers
Molecular Approach Paves the Way towards High Resilience for Large Mission-Critical Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
Papers
Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 338-343
Papers
Generation of Diagnostic Plans for Large ICT SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 344-349
Papers
Dependability Analysis of Information Systems with Hierarchical Reconfiguration of ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 350-355
Papers
Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 356-361
Papers
Dependability and Security Metrics in Controlling InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 368-374
Papers
Fast Algorithms for Local Inconsistency Detection in Firewall ACL UpdatesFull-text access may be available. Sign in or learn about subscription options.pp. 381-390
Papers
Agent Based Approach to Events Monitoring in Complex Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 397-402
Papers
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 403-411
Papers
On System Security Metrics and the Definition ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 412-419
Papers
Policy-Driven System Configuration for DependabilityFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
Papers
A Dependability Case Approach to the Assessment of IP NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 426-432
Papers
Author IndexFreely available from IEEE.pp. 433-435
Showing 73 out of 73