Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SECURWARE
SECURWARE 2008
Generate Citations
2008 Second International Conference on Emerging Security Information, Systems and Technologies
Aug. 25 2008 to Aug. 31 2008
ISBN: 978-0-7695-3329-2
Table of Contents
Papers
[Publisher's information]
Freely available from IEEE.
pp. 436
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-x
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Preface
Freely available from IEEE.
pp. xi-xii
Papers
Committees
Freely available from IEEE.
pp. xiii-xvi
Papers
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Frederic Stumpf
,
Claudia Eckert
Papers
A Secure Task Delegation Model for Workflows
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-15
by
Khaled Gaaloul
,
Andreas Schaad
,
Ulrich Flegel
,
Fran?ois Charoy
Papers
Formal Modeling of Authentication in SIP Registration
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-21
by
Anders Moen Hagalisletto
,
Lars Strand
Papers
Controlling Access to Location-Based Services in Vehicular Mobile Pervasive Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-27
by
Sameerchand Pudaruth
,
Nevin Vunka Jungum
,
Soulakshmee D. Ghurbhurrun
,
Leckraj Nagowah
Papers
A New Approach for Secure and Portable OS
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-33
by
H. Rezaei Ghaleh
,
M. A. Doustari
Papers
Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-40
by
Thomas Gamer
,
Christoph P. Mayer
,
Martina Zitterbart
Papers
Team?-Based MAC Policy over Security-?Enhanced Linux
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
J. Briffaut
,
J.-F. Lalande
,
Waleed W. Smari
Papers
Prototyping a New Identity Authentication Framework for IP Telephony
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Shu-Lin Chen
,
Stanley Chow
,
Christophe Gustave
,
Dmitri Vinokurov
Efficient Anomaly Detection System for Mobile Handsets
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-160
by
Yuka Ikebe
,
Takehiro Nakayama
,
Masaji Katagiri
,
Satoshi Kawasaki
,
Hirotake Abe
,
Takahiro Shinagawa
,
Kazuhiko Kato
Papers
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-61
by
S. Pozo
,
R. Ceballos
,
R. M. Gasca
,
A. J. Varela-Vaca
Papers
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-67
by
Angel Cuevas
,
Paul El Khoury
,
Laurent Gomez
,
Annett Laube
Papers
Security Policy Management for Peer Group Meetings
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-73
by
Fuwen Liu
,
Hartmut Koenig
Papers
FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-79
by
Sandhya Khurana
,
Neelima Gupta
Papers
Proving Trust Locally
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-87
by
Anders Moen Hagalisletto
Papers
A Security Framework for Input Validation
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-92
by
Rafael Bosse Brinhosa
,
Carlos Becker Westphall
,
Carla Merkle Westphall
Papers
Defending E-Banking Services: Antiphishing Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-98
by
Antonio San Martino
,
Xavier Perramon
Papers
Preventing Insider Information Leakage for Enterprises
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-106
by
Imad M. Abbadi
,
Muntaha Alawneh
Papers
Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-113
by
Pedro R. M. In?cio
,
M?rio M. Freire
,
Manuela Pereira
,
Paulo P. Monteiro
Papers
Scalable Detection of SIP Fuzzing Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-119
by
Eric Y. Chen
,
Mitsutaka Itoh
Papers
Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-126
by
Sarosh Hashmi
,
John Brooke
Papers
The Automatic Discovery, Identification and Measurement of Botnets
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-132
by
Ian Castle
,
Eimear Buckley
Papers
A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-138
by
Masaru Takesue
Papers
Email Worm Mitigation by Controlling the Name Server Response Rate
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-145
by
Nikolaos Chatzis
,
Enric Pujol
Papers
Anti-counterfeiting with a Random Pattern
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-153
by
Cheun Ngen Chong
,
Dan Jiang
,
Jiagang Zhang
,
Long Guo
Papers
Providing Secure Access to Unsecure Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-164
by
V. F. Pais
,
V. Stancalie
Papers
Towards Decentralised Security Policies for e-Health Collaborations
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-172
by
Oluwafemi Ajayi
,
Richard Sinnott
,
Anthony Stell
Papers
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-178
by
Mihaela Ion
,
Hristo Koshutanski
,
Volker Hoyer
,
Luigi Telesca
Security Governance for Enterprise VoIP Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-286
by
Rainer Falk
,
Steffen Fries
Papers
Optimal Trust Network Analysis with Subjective Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-184
by
Audun J?sang
,
Touhid Bhuiyan
Papers
From Monitoring Templates to Security Monitoring and Threat Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-192
by
Nuno Am?lio
,
George Spanoudakis
Papers
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-202
by
Ioannis G. Askoxylakis
,
Damien Sauveron
,
Konstantinos Markantonakis
,
Theodore Tryfonas
,
Apostolos Traganitis
Papers
Family of Parameterized Hash Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-208
by
P. Rodwald
,
J. Stoklosa
Papers
Public Key Cryptography: A Dynamical Systems Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-212
by
Roland Schmitz
Papers
A Related-Key Attack on TREYFER
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Aleksandar Kircanski
,
Amr M. Youssef
Papers
Security and Adoption of Internet Payment
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-223
by
Jean-Michel Sahut
Papers
Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-231
by
Wolfgang Boehmer
Papers
Generic and Complete Three-Level Identity Management Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-237
by
M. Dabrowski
,
P. Pacyna
Papers
A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-242
by
Ayesha Altaf
,
Rabia Sirhindi
,
Attiq Ahmed
Papers
A New Anti-phishing Method in OpenID
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-247
by
HwanJin Lee
,
InKyung Jeun
,
Kilsoo Chun
,
Junghwan Song
Papers
Toward the Engineering of Security of Information Systems (ESIS): UML and the IS Confidentiality
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-256
by
Wilson Goudalo
,
Dominique Seret
Papers
Designing an Undergraduate Software Security Course
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-262
by
Cynthia Y. Lester
,
Frank Jamerson
Towards the Definition of a Web Service Based Management Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-367
by
Juan Manuel Marin Perez
,
Jorge Bernal Bernabe
,
Daniel J. Martinez Manzano
,
Gregorio Martinez Perez
,
Antonio F. Gomez Skarmeta
Papers
High-Speed Private Information Retrieval Computation on GPU
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-272
by
Carlos Aguilar Melchor
,
Benoit Crespin
,
Philippe Gaborit
,
Vincent Jolivet
,
Pierre Rousseau
Advanced Rule-Based Techniques in Mission Critical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-380
by
Maite Avelino
,
Francisco de la Torre
Papers
Vulnerability Dependencies in Antivirus Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-278
by
Kreetta Askola
,
Rauli Puuper?
,
Pekka Pietik?inen
,
Juhani Eronen
,
Marko Laakso
,
Kimmo Halunen
,
Juha R?ning
Papers
ToLeRating UR-STD
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-293
by
Jan Feyereisl
,
Uwe Aickelin
Event-Driven Architecture for Intrusion Detection Systems Based on Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-396
by
Jesuss J. Martínez Molina
,
Miguel A. Hernandez Ruiz
,
Manuel Gil Perez
,
Gregorio Martinez Perez
,
Antonio F. Gomez Skarmeta
Papers
Collaborative Approach to Automatic Classification of Heterogeneous Information Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-299
by
Fatiha Benali
,
St?phane Ub?da
,
V?ronique Legrand
Papers
Infusing Information Assurance into an Undergraduate CS Curriculum
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-305
by
Cynthia Y. Lester
,
Hira Narang
,
Chung-Han Chen
Papers
On the Portability of Trained Machine Learning Classifiers for Early Application Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-310
by
Giacomo Verticale
Papers
Activity- and Inactivity-Based Approaches to Analyze an Assisted Living Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-316
by
Martin Floeck
,
Lothar Litz
Papers
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-325
by
Yannick Carlinet
,
Ludovic M?
,
Herv? Debar
,
Yvon Gourhant
Papers
Design-Time Learning for Operational Planning Improvement
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-331
by
Daniel J. Martinez
,
Juan M. Marin
,
Jorge Bernal
,
Manuel Gil
,
Antonio F. Gomez-Skarmeta
Papers
Molecular Approach Paves the Way towards High Resilience for Large Mission-Critical Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-337
by
Andr? Cotton
,
Maurice Isra?
,
Julien Borgel
Papers
Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-343
by
Maurice Israel
,
Julien Borgel
,
Andre Cotton
Papers
Generation of Diagnostic Plans for Large ICT Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-349
by
Marco D. Aime
,
Andrea Atzeni
Papers
Dependability Analysis of Information Systems with Hierarchical Reconfiguration of Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-355
by
Dariusz Caban
,
Wojciech Zamojski
Papers
Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-361
by
Katarzyna Michalska
,
Tomasz Walkowiak
Papers
Dependability and Security Metrics in Controlling Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-374
by
Imre Kocsis
,
Gy?rgy Csert?
,
P?ter L?szl? P?sztor
,
Andr? Pataricza
Papers
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-390
by
S. Pozo
,
R. Ceballos
,
R. M. Gasca
,
A. J. Varela-Vaca
Papers
Agent Based Approach to Events Monitoring in Complex Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-402
by
Marek Woda
,
Tomasz Walkowiak
Papers
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-411
by
Xiaoming Lu
,
Matt Spear
,
Karl Levitt
,
Norman S. Matloff
,
S. Felix Wu
Papers
On System Security Metrics and the Definition Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-419
by
Artur Hecker
Papers
Policy-Driven System Configuration for Dependability
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Marco D. Aime
,
Paolo C. Pomi
,
Marco Vallini
Papers
A Dependability Case Approach to the Assessment of IP Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-432
by
Ilkka Norros
,
Pirkko Kuusela
,
Pekka Savola
Papers
Author Index
Freely available from IEEE.
pp. 433-435
Showing 73 out of 73