conference information papers by session … · conference information papers by session papers by...
TRANSCRIPT
Published by
ARES ConferenceThe International Dependability Conference
ARES 200916-19 March 2009
Fukuoka Institute of TechnologyFukuoka, Japan
CONFERENCE INFORMATION
PAPERS BY SESSION
PAPERS BY AUTHOR
SEARCH
GETTING STARTED
TRADEMARKS
Conference Information
2009 International Conference on Availability, Reliabilityand Security
q Message from General Co-chairs
q Message from ARES Workshop Co-chairs
q Conference Officers
q Program Committee
q Message from DAWAM Workshop hairs
q DAWAM Organization Co-chairs
q DAWAM Program Committee
q DAWAM Reviewers
q Message from FARES Workshop Co-chairs
q FARES Organiz Committee
q FARES Program Committee
Co-c
ation
s'
Conference Information (cont.)
2009 International Conference on Availability, Reliabilityand Security
q FARES Reviewers
q Message from GloSec Workshop C
q GloSec Organization Committee
q GloSec Program Committee
q GloSec Reviewers
q Message from IWSS Workshop
q IWSS Organization Committee
q IWSS Program Committee
q IWSS Reviewers
q Message from OSA Workshop
q OSA Organization Committee
hair
Co-chairs
C hairso-c
Conference Information (cont.)
2009 International Conference on Availability, Reliabilityand Security
q OSA Program Committee
q OSA Reviewers
q Message from RIBC Workshop Co-chairs
q RIBC Organization Committee
q RIBC Program Committee
q RIBC Reviewers
q Message from SecSE Workshop C hairs
q SecSE Organiz Committee
q SecSE Program Committee
q SecSE Reviewers
q Message from SECUSAB Workshop Co-chair
o-c
ation
s
Conference Information (cont.)
2009 International Conference on Availability, Reliabilityand Security
q SECUSAB Organiz Committee
q SECUSAB Program Committee
q SECUSAB Reviewers
q Message from WAIS Workshop C hairs
q WAIS Organization Committee
q WAIS Program Committee
q WAIS Reviewers
q Message from WSDF Workshop Co-chairs
q WSDF Organization Committee
q WSDF Program Committee
q WSDF Reviewers
ation
o-c
Conference Information (cont.)
2009 International Conference on Availability, Reliabilityand Security
q Keynote 1: Pairing Based Cryptography - Theory, Implementationsand Applications
q Keynote 2: Digital Identity Protection - Concepts and Issues
q Keynote 3: Topological Analysis of Network Attack Vulnerability
q Invited Talk: Integrative Security Approach as a Key Success Factorof Dependability
q Title Page (Book version)
q Copyright Page (Book version)
q Table of Contents (Book version)
q Author Index (Book version)
q Publisher's Information (Book version)
Sessions
q Distributed Systems and Grid (ARES Full Papers)
q SOA Security (ARES Full Papers)
q Enterprise Security 1 (ARES Full Papers)
q Intrusion and Fraud Detection (ARES Full Papers)
q Enterprise Security 2 (ARES Full Papers)
q Digital Forensics and Security in Communication (ARES FullPapers)
q Availability and Reliability 1 (ARES Full Papers)
q Cryptography (ARES Full Papers)
q Software Security 1 (ARES Full Papers)
q Software Security 2 (ARES Full Papers)
q Availability and Reliability 2 (ARES Full Papers)
q Privacy and Trust (ARES Full Papers)
Sessions (cont.)
q Dependable Systems and Trusted Computing 1 (ARES ShortPapers)
q Dependable Systems and Trusted Computing 2 (ARES ShortPapers)
q Software Security (ARES Short Papers)
q Privacy and Trust (ARES Short Papers)
q Enterprise Security and Security Evaluation 1 (ARES Short Papers)
q Enterprise Security and Security Evaluation 2 (ARES Short Papers)
q Availability and Reliability (ARES Short Papers)
q Authentication and Authorization (ARES Short Papers)
q Cryptography 1 (ARES Short Papers)
q Cryptography 2 (ARES Short Papers)
q DAWAM 2009 - Security & Privacy Enhancement in DWHs
Sessions (cont.)
q DAWAM 2009 - Intrusion and Network Attack Prevention
q DAWAM 2009 - Dependability, Failure Analysis & Detection
q FARES 2009 - Authentication and Authorization
q FARES 2009 - Security in Distributed Systems
q FARES 2009 - Software Security and Digital Forensics
q FARES 2009 - Dependability Aspects
q GloSec 2009 - Session 1
q GloSec 2009 - Session 2
q IWSS 2009 - Security in Ad Hoc and Mesh Networks
q IWSS 2009 - Security in Contactless Systems
q OSA 2009 - Risk Management
q OSA 2009 - Security Management and Education
Sessions (cont.)
q OSA 2009 - Security Mangement
q RIBC 2009 - Authentication, Watermarking and Steganography
q RIBC 2009 - Authentication, Watermarking and Cryptosystems
q SecSE 2009 - Education and Other Vulnerabilities
q SecSE 2009 - Secure Software-Development Lifecycles and Reuse
q SecSE 2009 - Model-Driven Development and Checklists
q SecUSAB 2009 - Session 1
q SecUSAB 2009 - Session 2
q WAIS 2009 - Security Analysis
q WAIS 2009 - Network Security
q WAIS 2009 - Signature and Protection
q WAIS 2009 - Secure Systems
Sessions (cont.)
q WAIS 2009 - Information Security
q WSDF 2009 - Digital Forensics 1
q WSDF 2009 - Digital Forensics 2
Papers by Session
Distributed Systems and Grid (ARES Full Papers)
q A Pluggable Domain Management Approach for BuildingPractical Distributed CoalitionsYasuharu Katsuno, Yuji Watanabe, Michiharu Kudo, and Eiji Okamoto
q Retaining Data Control to the Client in Infrastructure CloudsMarco Descher, Philip Masser, Thomas Feilhauer, A. Min Tjoa, and David Huemer
q Workflows in Dynamic and Restricted DelegationMehran Ahsant and Jim Basney
Papers by Session
SOA Security (ARES Full Papers)
q The Accountability Problem of Flooding Attacks in Service-Oriented ArchitecturesMeiko Jensen and Jörg Schwenk
q Web Service Trust: Towards a Dynamic Assessment FrameworkGeorge Spanoudakis and Stephane LoPresti
q Security Requirements Specification in Service-OrientedBusiness Process ManagementMichael Menzel, Ivonne Thomas, and Christoph Meinel
Papers by Session
Enterprise Security 1 (ARES Full Papers)
q Quantitative Analysis of Secure Information Flow via Probabilistic SemanticsChunyan Mu and David Clark
q Deploying Security Policy in Intra and Inter WorkflowManagement SystemsSamiha Ayed, Nora Cuppens-Boulahia, and Frédéric Cuppens
q An Empirically Derived Loss Taxonomy Based on PubliclyKnown Security IncidentsFrank Innerhofer-Oberperfler and Ruth Breu
Papers by Session
Intrusion and Fraud Detection (ARES Full Papers)
q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent MonitoringJunghwan Rhee, Ryan Riley, Dongyan Xu, and Xuxian Jiang
q Server-Side Prediction of Source IP Addresses Using DensityEstimationMarkus Goldstein, Matthias Reif, Armin Stahl, and Thomas Breuel
q Detecting Stepping-Stone Connection Using Association RuleMiningYing-wei Kuo and Shou-Hsuan Stephen Huang
Papers by Session
Enterprise Security 2 (ARES Full Papers)
q Formal Analyses of Usage Control PoliciesAlexander Pretschner, Judith Rüesch, Christian Schaefer, and Thomas Walter
q A First Step towards Characterizing Stealthy BotnetsJustin Leonard, Shouhuai Xu, and Ravi Sandhu
q Intrusion Process Modeling for Security QuantificationJaafar Almasizadeh and Mohammad Abdollahi Azgomi
q Different Approaches to In-House Identity Management -Justification of an AssumptionL. Fuchs, C. Broser, and G. Pernul
Papers by Session
Digital Forensics and Security in Communication (ARES FullPapers)
q An LPN-Problem-Based Lightweight Authentication Protocol for Wireless CommunicationsYa-Fen Chang and Yen-Cheng Lai
q Revealing the Calling History of SIP VoIP Systems by TimingAttacksGe Zhang, Simone Fischer-Huebner, Leonardo A. Martucci, and Sven Ehlert
q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime DataBenjamin Turnbull, Robert Taylor, and Barry Blundell
q A Robust Image Watermarking Using Two Level DCT and Wavelet Packets DenoisingA.H. Taherinia and M. Jamzad
Papers by Session
Availability and Reliability 1 (ARES Full Papers)
q On Equilibrium Distribution Properties in Software ReliabilityModelingXiao Xiao and Tadashi Dohi
q An Analysis of Fault Effects and Propagations in AVRMicrocontroller ATmega103(L)Alireza Rohani and Hamid. R. Zarandi
q Blue Gene/L Log Analysis and Time to Interrupt EstimationNarate Taerat, Nichamon Naksinehaboon, Clayton Chandler, James Elliott,Chokchai Leangsuksun, George Ostrouchov, Stephen L. Scott, and Christian Engelmann
Papers by Session
Cryptography (ARES Full Papers)
q A New Approach for Implementing the MPL Method toward Higher SPA ResistanceMasami Izumi, Kazuo Sakiyama, and Kazuo Ohta
q On Privacy Preserving Convex HullSandeep Hans, Sarat C. Addepalli, Anuj Gupta, and Kannan Srinathan
q Routing Protocol Security Using Symmetric Key BasedTechniquesBezawada Bruhadeshwar, Kishore Kothapalli, M. Poornima, and M. Divya
Papers by Session
Software Security 1 (ARES Full Papers)
q Prioritisation and Selection of Software Security ActivitiesDavid Byers and Nahid Shahmehri
q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based VulnerabilityPing Chen, Yi Wang, Zhi Xin, Bing Mao, and Li Xie
q Enhancing Automated Detection of Vulnerabilities in JavaComponentsPierre Parrend
Papers by Session
Software Security 2 (ARES Full Papers)
q Automated Support for Security Requirements Engineering in Software Product Line Domain EngineeringDaniel Mellado, Jesus Rodríguez, Eduardo Fernández-Medina, and Mario Piattini
q Identifying and Resolving Least Privilege Violations in SoftwareArchitecturesKoen Buyens, Bart De Win, and Wouter Joosen
q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational DatabasesGerardo Canfora, Corrado Aaron Visaggio, and Vito Paradiso
Papers by Session
Availability and Reliability 2 (ARES Full Papers)
q Improving Reliability for Multi-home Inbound Traffic: MHLB/IPacket-Level Inter-domain Load-BalancingHiroshi Fujinoki
q Proactive Resource Management for Failure Resilient HighPerformance Computing ClustersSong Fu and Cheng-Zhong Xu
q A Perceptron Neural Network for AsymmetricComparison-Based System-Level Fault DiagnosisMourad Elhadef
q Perfect Failure Detection in the Partitioned SynchronousDistributed System ModelRaimundo José de Araújo Macêdo and Sérgio Gorender
Papers by Session
Privacy and Trust (ARES Full Papers)
q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting ProtocolsMehdi Talbi, Valérie Viet Triem Tong, and Adel Bouhoula
q Measuring Voter-Controlled PrivacyHugo Jonker, Sjouke Mauw, and Jun Pang
q Generating User-Understandable Privacy PreferencesJan Kolter and Günther Pernul
q An Automatic Privacy Policy Agreement Checker for E-servicesGeorge O.M. Yee
Papers by Session
Dependable Systems and Trusted Computing 1 (ARES ShortPapers)
q A Micro-FT-UART for Safety-Critical SoC-Based ApplicationsMohammad-Hamed Razmkhah, Seyed Ghassem Miremadi, and Alireza Ejlali
q MixVM - An Approach to Service Isolation and Data Protectionin Mobile Context-Sensitive ApplicationsThomas Butter and Markus Aleksy
q On the Security of Untrusted MemoryJörn-Marc Schmidt and Stefan Tillich
Papers by Session
Dependable Systems and Trusted Computing 2 (ARES ShortPapers)
q Detecting Image Tampering Using Feature FusionPin Zhang and Xiangwei Kong
q SecMiLiA: An Approach in the Agent ProtectionAntonio Muñoz, Antonio Maña, and Daniel Serrano
q Traffic Controller: A Practical Approach to Block Network CovertTiming ChannelYi Wang, Ping Chen, Yi Ge, Bing Mao, and Li Xie
Papers by Session
Software Security (ARES Short Papers)
q Capturing Information Flow with Concatenated Dynamic TaintAnalysisHyung Chan Kim, Angelos D. Keromytis, Michael Covington, and Ravi Sahita
q Risk-Driven Architectural DecompositionThomas Heyman, Riccardo Scandariato, and Wouter Joosen
q Reducing the Cost of Session Key EstablishmentBezawada Bruhadeshwar, Kishore Kothapalli, and Maddi Sree Deepya
Papers by Session
Privacy and Trust (ARES Short Papers)
q Accuracy: The Fundamental Requirement for Voting SystemsTim Storer and Russell Lock
q Reusable Security Requirements for Healthcare ApplicationsJostein Jensen, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, and Herbjørn Andresen
q P2F: A User-Centric Privacy Protection FrameworkMaryam Jafari-lafti, Chin-Tser Huang, and Csilla Farkas
Papers by Session
Enterprise Security and Security Evaluation 1 (ARES ShortPapers)
q Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001Wolfgang Boehmer
q Methodology for Experimental ICT Industrial and CriticalInfrastructure Security TestsMarcelo Masera and Igor Nai Fovino
q Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo MethodOmar Hussain and Tharam Dillon
Papers by Session
Enterprise Security and Security Evaluation 2 (ARES ShortPapers)
q Building a Responsibility Model Including Accountability,Capability and CommitmentChristophe Feltus and Michaël Petit
q AVISPA in the Validation of Ambient Intelligence ScenariosAntonio Muñoz, Antonio Maña, and Daniel Serrano
q Security Evaluation of an Intrusion Tolerant System with MRSPNsRyutaro Fujimoto, Hiroyuki Okamura, and Tadashi Dohi
q Algebraic Properties in Alice and Bob NotationSebastian Mödersheim
Papers by Session
Availability and Reliability (ARES Short Papers)
q Scrubbing in Storage Virtualization Platform for Long-TermBackup ApplicationAo Ma, Yang Yin, Wenwu Na, Xiaoxuan Meng, Qingzhong Bu, and Lu Xu
q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM TechnologiesMehrtash Manoochehri, Alireza Ejlali, and Seyed Ghassem Miremadi
q Generating AMF Configurations from Software VendorConstraints and User RequirementsA. Kanso, M. Toeroe, A. Hamou-Lhadj, and F. Khendek
Papers by Session
Authentication and Authorization (ARES Short Papers)
q Using XACML for Embedded and Fine-Grained Access ControlPolicyGeorge Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, and Lisa Marvel
q A-COLD: Access Control of Web OLAP over Multi-dataWarehouseSomchart Fugkeaw, Piyawit Manpanpanich, and Sekpon Juntapremjitt
q Package-Role Based Authorization Control Model for WirelessNetwork ServicesHuy Hoang Ngo, Xianping Wu, Phu Dung Le, and Campbell Wilson
q Security Credential Mapping in GridsMehran Ahsant, Esteban Talavera Gonzalez, and Jim Basney
Papers by Session
Cryptography 1 (ARES Short Papers)
q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute StatisticsKeita Emura, Atsuko Miyaji, and Kazumasa Omote
q Security in Quantum Networks as an Optimization ProblemStefan Rass and Peter Schartner
q Finding Preimages of Multiple Passwords Secured with VSHKimmo Halunen, Pauli Rikula, and Juha Röning
Papers by Session
Cryptography 2 (ARES Short Papers)
q Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off AttackNurdan Saran and Ali Doğanaksoy
q Generalized Robust Combiners for Oblivious TransferGanugula Umadevi, Sarat C. Addepalli, and Kannan Srinathan
Papers by Session
DAWAM 2009 - Security & Privacy Enhancement in DWHs
q Including Security Rules Support in an MDA Approach for Secure DWsCarlos Blanco, Ignacio García-Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo,and Mario Piattini
q A System of Privacy Preserving Distributed Spatial DataWarehouse Using Relation DecompositionMarcin Gorawski and Szymon Panfil
q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWsCarlos Blanco, Ignacio García-Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo,and Mario Piattini
Papers by Session
DAWAM 2009 - Intrusion and Network Attack Prevention
q Identity-Based Hybrid SigncryptionFagen Li, Masaaki Shirase, and Tsuyoshi Takagi
q Towards Intrusion Detection for Encrypted NetworksVik Tor Goh, Jacob Zimmermann, and Mark Looi
q A Mobile Ambients-Based Approach for Network AttackModelling and SimulationVirginia N.L. Franqueira, Pascal van Eck, Roel Wieringa, and Raul H.C. Lopes
Papers by Session
DAWAM 2009 - Dependability, Failure Analysis & Detection
q Statistical Failure Analysis of a Web Server SystemToshiya Fujii and Tadashi Dohi
q A Policy Framework for Data Management in ServicesMarketplacesJun Li, Bryan Stephenson, and Sharad Singhal
q Modeling Misuse PatternsEduardo B. Fernandez, Nobukazu Yoshioka, and Hironori Washizaki
q Novel Algorithms for Subgroup Detection in Terrorist NetworksNasrullah Memon, Abdul Rasool Qureshi, Uffe Kock Wiil, and David L. Hicks
Papers by Session
FARES 2009 - Authentication and Authorization
q QR-TAN: Secure Mobile Transaction AuthenticationGuenther Starnberger, Lorenz Froihofer, and Karl M. Goeschka
q An Authentication Watermark Algorithm for JPEG imagesXiaowei Shi, Fenlin Liu, Daofu Gong, and Jing Jing
q A New Watermarking Attack Using Long-Range CorrelationImage RestorationA.H. Taherinia, M. Fotouhi, and M. Jamzad
Papers by Session
FARES 2009 - Security in Distributed Systems
q The Case for a Simpler Security Model in Grid ComputingFrederik Orellana, Christian Ulrik Søttrup, Anders Wäänänen, Daniel Kalici, and Michael Grønager
q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobotsSarat C. Addepalli, Piyush Bansal, Kannan Srinathan, and K. Madhava Krishna
q Position Paper: Secure Infrastructure for Scientific Data LifeCycle ManagementM. Descher, T. Feilhauer, T. Ludescher, P. Masser, B. Wenzel, P. Brezany, I. Elsayed, A. Woehrer,A.M. Tjoa, and D. Huemer
Papers by Session
FARES 2009 - Software Security and Digital Forensics
q A Robust Image Watermarking Method in Wavelet DomainUsing Genetic AlgorithmS. Hamid Amiri and Mansour Jamzad
q An Efficient Measurement of Object Oriented DesignVulnerabilityAlka Agrawal, Shalini Chandra, and Raees Ahmad Khan
q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408Kenichi Yajima, Shoichi Morimoto, Daisuke Horie, Noor Sheila Azreen, Yuichi Goto, and Jingde Cheng
Papers by Session
FARES 2009 - Dependability Aspects
q Using Hybrid Trust Model for Handling Inaccurate ResourceBagher Rahimpour Cami and Mohammad Reza Matash Brujerdi
q A High Speed and Low Cost Error Correction Technique for the Carry Select AdderAlireza Namazi, Seyed Ghassem Miremadi, and Alireza Ejlali
q An Improvement of REM: A Replication Oriented Event-BasedMiddlewareYoucheng Chen, Mohammad Reza Selim, Yuichi Goto, and Jingde Cheng
Papers by Session
GloSec 2009 - Session 1
q Advanced Flooding Attack on a SIP ServerXianglin Deng and Malcolm Shore
q State of Cybersecurity and the Roadmap to Secure CyberCommunity in CambodiaSopheak Cheang and Sinawong Sang
q An Inclusive Information Society Needs a Global Approach of Information SecuritySolange Ghernaouti-Hélie
Papers by Session
GloSec 2009 - Session 2
q Measuring Peer-to-Peer Botnets Using Control Flow StabilityBinbin Wang, Zhitang Li, Hao Tu, and Jie Ma
q Regulatory Compliance and Information Security AssuranceIgli Tashi
q Information Security Optimization: From Theory to PracticeDavid John Simms
Papers by Session
IWSS 2009 - Security in Ad Hoc and Mesh Networks
q Trusting User Defined Context in MANETs: Experience from the MIDAS ApproachVegar Westerlund, Thomas Pronstad, Inger Anne Tøndel, and Leendert Wienhofen
q Deconvolving Protected SignalsMohaned Kafi and Sylvain Guilley
Papers by Session
IWSS 2009 - Security in Contactless Systems
q Vulnerability Analysis and Attacks on NFC-Enabled MobilePhonesCollin Mulliner
q Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure ElementVincent Alimi and Marc Pasquet
q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID SystemsGeorge Poulopoulos, Konstantinos Markantonakis, and Keith Mayes
Papers by Session
OSA 2009 - Risk Management
q A New Approach for the Construction of Fault Trees from System SimulinkG. Latif-Shabgahi and F. Tajarrod
q Estimating ToE Risk Level Using CVSSSiv Hilde Houmb and Virginia N.L. Franqueira
q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management GuideAmril Syalim, Yoshiaki Hori, and Kouichi Sakurai
Papers by Session
OSA 2009 - Security Management and Education
q Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business EnvironmentsJuhani Anttila and Jorma Kajava
q Standards-Based Cyber ExercisesRonald Dodge, Brian Hay, and Kara Nance
q Patterns to Support the Development of Privacy PoliciesLuanna Lopes Lobato, Eduardo B. Fernandez, and Sergio Donizetti Zorzo
Papers by Session
OSA 2009 - Security Mangement
q Multidimensional Management of Information Security – AMetrics Based Approach Merging Business and InformationSecurity TopicsSebastian Sowa and Roland Gabriel
q A Security Management Assurance Model to Holistically Assessthe Information Security PostureIgli Tashi and Solange Ghernaouti-Hélie
q Methodology to Align Business and IT Policies: Use Case from an IT CompanyChristophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gateau, André Adelsbach,and Marc Camy
Papers by Session
RIBC 2009 - Authentication, Watermarking and Steganography
q On the Higher Order Nonlinearities of Boolean Functions and S-boxesClaude Carlet
q A Certificate Revocable Anonymous Authentication Schemewith Designated VerifierKeita Emura, Atsuko Miyaji, and Kazumasa Omote
q A Standard MIDI File Steganography Based on Fluctuation of DurationKotaro Yamamoto and Munetoshi Iwakiri
q A Signature Scheme Associated with Universal Re-signcryptionKohei Tatara and Kouichi Sakurai
Papers by Session
RIBC 2009 - Authentication, Watermarking and Cryptosystems
q Real-Time Audio Watermarking with Wavetable Alternation in Digital InstrumentKotaro Yamamoto and Munetoshi Iwakiri
q A Reconfigurable-Permutation Algorithm for M_S-BoxHiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, and Yoshio Yoshioka
Papers by Session
SecSE 2009 - Education and Other Vulnerabilities
q Protecting Global and Static Variables from Buffer OverflowAttacksYves Younan, Frank Piessens, and Wouter Joosen
q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?Dejan Baca, Kai Petersen, Bengt Carlsson, and Lars Lundberg
q hACMEgame: A Tool for Teaching Software SecurityØyvind Nerbråten and Lillian Røstad
Papers by Session
SecSE 2009 - Secure Software-Development Lifecycles and Reuse
q Towards Evaluation of Security Assurance during the SoftwareDevelopment LifecycleIlkka Uusitalo, Kaarina Karppinen, Pasi Ahonen, and Heimo Pentikäinen
q An Architectural Foundation for Security Model Sharing and ReusePer Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri,and Inger Anne Tøndel
q A Knowledge Management Approach to Support a SecureSoftware DevelopmentFrancisco José Barreto Nunes, Arnaldo Dias Belchior, and Adriano Bessa Albuquerque
Papers by Session
SecSE 2009 - Model-Driven Development and Checklists
q A Practical Framework for the Dataflow Pointcut in AspectJAmine Boukhtouta, Dima Alhadidi, and Mourad Debbabi
q SecureMDD: A Model-Driven Development Method for SecureSmart Card ApplicationsNina Moebius, Kurt Stenzel, Holger Grandy, and Wolfgang Reif
q Linking Privacy Solutions to Developer GoalsKim Wuyts, Riccardo Scandariato, Bart De Decker, and Wouter Joosen
q Software Inspections Using Guided Checklists to EnsureSecurity GoalsFrank Elberzhager, Alexander Klaus, and Marek Jawurek
Papers by Session
SecUSAB 2009 - Session 1
q Managing Rights and Value of Digital MediaFilippo Chiariglione, Giacomo Cosenza, and Sergio Matone
q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMSCharlott Eliasson, Markus Fiedler, and Ivar Jørstad
q The User-Centric Vision Matches Credentials ExchangesMikaël Ates, Jacques Fayolle, Christophe Gravier, and Jeremy Lardon
Papers by Session
SecUSAB 2009 - Session 2
q Patient-Administered Access Control: A Usability StudyLillian Røstad and Ole Andreas Alsos
q An Experimental System for Studying the Tradeoff between Usability and SecurityNoam Ben-Asher, Joachim Meyer, Sebastian Möller, and Roman Englert
Papers by Session
WAIS 2009 - Security Analysis
q Rank Swapping for Partial Orders and Continuous VariablesVicenç Torra
q An Improved Authentication Protocol Based on One-Way HashFunctions and Diffie-Hellman Key ExchangeMarko Hölbl and Tatjana Welzer
q Security Analysis for P2P Routing ProtocolsTatsuro Fujii, Yizhi Ren, Yoshiaki Hori, and Kouichi Sakurai
Papers by Session
WAIS 2009 - Network Security
q Secrecy Capacity of Wireless LANRyuzou Nishi, Yoshiaki Hori, and Kouichi Sakurai
q Privacy-Preserving Collaborative Filtering SchemesHiroaki Kikuchi, Hiroyasu Kizawa, and Minako Tada
q A Framework for Understanding BotnetsJustin Leonard, Shouhuai Xu, and Ravi Sandhu
Papers by Session
WAIS 2009 - Signature and Protection
q Enterprise-Oriented Digital Rights Management Mechanism:eDRMChia-Chen Lin, Shih-Chi Wu, Po-Hsuan Chiang, and Chang-Chi Chen
q Utility and Risk of JPEG-Based Continuous Microdata ProtectionMethodsJavier Jiménez and Vicenç Torra
q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear PairingsYuh-Min Tseng, Tsu-Yang Wu, and Jui-Di Wu
q Yet Another Sanitizable Signature from Bilinear MapsTetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, and Masahiko Takenaka
Papers by Session
WAIS 2009 - Secure Systems
q Generation of Prototypes for Masking Sequences of EventsAida Valls, Cristina Gómez-Alonso, and Vicenç Torra
q Enhancing Control of Service Compositions in Service-OrientedArchitecturesChristian Schneider, Frederic Stumpf, and Claudia Eckert
q Truly Anonymous Paper Submission and Review SchemeChun-I Fan, Ming-Te Chen, and Lung-Hsien Chen
q An Implementation of the Binding Mechanism in the WebBrowser for Preventing XSS Attacks: Introducing the Bind-Value HeadersGenta Iha and Hiroshi Doi
Papers by Session
WAIS 2009 - Information Security
q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network PacketsKohei Tatara, Yoshiaki Hori, and Kouichi Sakurai
q Automated Instruction-Set Randomization for WebApplications in Diversified Redundant SystemsFrédéric Majorczyk and Jonathan-Christofer Demay
q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute InformationYoshio Kakizaki, Yoshiaki Yoshida, and Hidekazu Tsuji
q Making Use of Human Visual Capability to Improve InformationSecurityMasakatsu Nishigaki and Takumi Yamamoto
Papers by Session
WSDF 2009 - Digital Forensics 1
q Enhancement of Forensic Computing Investigations through Memory Forensic TechniquesMatthew Simon and Jill Slay
q Improving Performance in Digital Forensics: A Case UsingPattern Matching BoardJooyoung Lee, Sungkyung Un, and Dowon Hong
q Computer Forensics in Japan: A Preliminary StudyJigang Liu and Tetsutaro Uehara
Papers by Session
WSDF 2009 - Digital Forensics 2
q Enhancing Computer Forensics Investigation through Visualisation and Data ExploitationGrant Osborne and Benjamin Turnbull
q A Post-Mortem Incident Modeling MethodShanai Ardi and Nahid Shahmehri
q Investigating the Implications of Virtual Machine Introspectionfor Digital ForensicsKara Nance, Matt Bishop, and Brian Hay
Papers by Author
A
q Addepalli, Sarat C.
q Adelsbach, André
q Agrawal, Alka
q Ahonen, Pasi
q Ahsant, Mehran
q Albuquerque, Adriano Bessa
q Aleksy, Markus
q Alhadidi, Dima
q Alimi, Vincent
q Almasizadeh, Jaafar
q Alsos, Ole Andreas
q Amiri, S. Hamid
q Andresen, Herbjørn
q Anttila, Juhani
q Ardi, Shanai
q Ates, Mikaël
q Aubert, Jocelyn
q Ayed, Samiha
q Azgomi, MohammadAbdollahi
q Azreen, Noor Sheila
B
q Baca, Dejan
Papers by Author
q Bansal, Piyush
q Basney, Jim
q Belchior, Arnaldo Dias
q Ben-Asher, Noam
q Bishop, Matt
q Blanco, Carlos
q Blundell, Barry
q Boehmer, Wolfgang
q Bouhoula, Adel
q Boukhtouta, Amine
q Breu, Ruth
q Breuel, Thomas
q Brezany, P.
q Broser, C.
q Bruhadeshwar, Bezawada
q Brujerdi, Mohammad RezaMatash
q Bu, Qingzhong
q Butter, Thomas
q Buyens, Koen
q Byers, David
C
q Cami, Bagher Rahimpour
q Camy, Marc
q Canfora, Gerardo
Papers by Author
q Carlet, Claude
q Carlsson, Bengt
q Chandler, Clayton
q Chandra, Shalini
q Chang, Ya-Fen
q Cheang, Sopheak
q Chen, Chang-Chi
q Chen, Lung-Hsien
q Chen, Ming-Te
q Chen, Ping
q Chen, Youcheng
q Cheng, Jingde
q Chiang, Po-Hsuan
q Chiariglione, Filippo
q Clark, David
q Cosenza, Giacomo
q Covington, Michael
q Cuppens, Frédéric
q Cuppens-Boulahia, Nora
d
q de Guzmán, IgnacioGarcía-Rodríguez
D
q De Decker, Bart
q Debbabi, Mourad
Papers by Author
q Deepya, Maddi Sree
q Demay, Jonathan-Christofer
q Deng, Xianglin
q Descher, M.
q Descher, Marco
q Dillon, Tharam
q Divya, M.
q Dodge, Ronald
q Doğanaksoy, Ali
q Dohi, Tadashi
q Doi, Hiroshi
E
q Eckert, Claudia
q Ehlert, Sven
q Ejlali, Alireza
q Elberzhager, Frank
q Elhadef, Mourad
q Eliasson, Charlott
q Elliott, James
q Elsayed, I.
q Emamali, Gerald
q Emura, Keita
q Engelmann, Christian
Papers by Author
q Englert, Roman
F
q Fan, Chun-I
q Farkas, Csilla
q Fayolle, Jacques
q Feilhauer, T.
q Feilhauer, Thomas
q Feltus, Christophe
q Fernandez, Eduardo B.
q Fernández-Medina, Eduardo
q Fiedler, Markus
q Fischer-Huebner, Simone
q Foster, Keith
q Fotouhi, M.
q Fovino, Igor Nai
q Franqueira, Virginia N.L.
q Froihofer, Lorenz
q Fu, Song
q Fuchs, L.
q Fugkeaw, Somchart
q Fujii, Tatsuro
q Fujii, Toshiya
q Fujimoto, Ryutaro
q Fujinoki, Hiroshi
Papers by Author
G
q Gabriel, Roland
q Gateau, Benjamin
q Ge, Yi
q Ghernaouti-Hélie, Solange
q Goeschka, Karl M.
q Goh, Vik Tor
q Goldstein, Markus
q Gómez-Alonso, Cristina
q Gong, Daofu
q Gonzalez, Esteban Talavera
q Gorawski, Marcin
q Gorender, Sérgio
q Goto, Yuichi
q Grandy, Holger
q Gravier, Christophe
q Grønager, Michael
q Guilley, Sylvain
q Gupta, Anuj
H
q Halunen, Kimmo
q Hamou-Lhadj, A.
q Hans, Sandeep
q Hay, Brian
Papers by Author
q Heyman, Thomas
q Hicks, David L.
q Hölbl, Marko
q Hong, Dowon
q Hori, Yoshiaki
q Horie, Daisuke
q Houmb, Siv Hilde
q Hsieh, George
q Huang, Chin-Tser
q Huang, Shou-Hsuan Stephen
q Huemer, D.
q Huemer, David
q Hussain, Omar
I
q Iha, Genta
q Incoul, Christophe
q Innerhofer-Oberperfler, Frank
q Iwakiri, Munetoshi
q Izu, Tetsuya
q Izumi, Masami
J
q Jaatun, Martin Gilje
q Jafari-lafti, Maryam
q Jamzad, M.
q Jamzad, Mansour
Papers by Author
q Jawurek, Marek
q Jensen, Jostein
q Jensen, Meiko
q Jiang, Xuxian
q Jiménez, Javier
q Jing, Jing
q Jonker, Hugo
q Joosen, Wouter
q Jørstad, Ivar
q Juntapremjitt, Sekpon
K
q Kafi, Mohaned
q Kajava, Jorma
q Kakizaki, Yoshio
q Kalici, Daniel
q Kanso, A.
q Karppinen, Kaarina
q Katsuno, Yasuharu
q Keromytis, Angelos D.
q Khan, Raees Ahmad
q Khendek, F.
q Kikuchi, Hiroaki
q Kim, Hyung Chan
q Kizawa, Hiroyasu
q Klaus, Alexander
Papers by Author
q Kolter, Jan
q Kong, Xiangwei
q Kothapalli, Kishore
q Krishna, K. Madhava
q Kudo, Michiharu
q Kudou, Hiroshi
q Kunihiro, Noboru
q Kuo, Ying-wei
L
q Lai, Yen-Cheng
q Lardon, Jeremy
q Latif-Shabgahi, G.
q Le, Phu Dung
q Leangsuksun, Chokchai
q Lee, Jooyoung
q Leonard, Justin
q Li, Fagen
q Li, Jun
q Li, Zhitang
q Lin, Chia-Chen
q Liu, Fenlin
q Liu, Jigang
q Lobato, Luanna Lopes
q Lock, Russell
q Looi, Mark
Papers by Author
q Lopes, Raul H.C.
q LoPresti, Stephane
q Ludescher, T.
q Lundberg, Lars
M
q Ma, Ao
q Ma, Jie
q Macêdo, Raimundo José de Araújo
q Majorczyk, Frédéric
q Maña, Antonio
q Manoochehri, Mehrtash
q Manpanpanich, Piyawit
q Mao, Bing
q Markantonakis, Konstantinos
q Martucci, Leonardo A.
q Marvel, Lisa
q Masera, Marcelo
q Masser, P.
q Masser, Philip
q Matone, Sergio
q Mauw, Sjouke
q Mayes, Keith
q Meinel, Christoph
q Meland, Per Håkon
Papers by Author
q Mellado, Daniel
q Memon, Nasrullah
q Meng, Xiaoxuan
q Menzel, Michael
q Meyer, Joachim
q Miremadi, Seyed Ghassem
q Miyaji, Atsuko
q Mödersheim, Sebastian
q Moebius, Nina
q Möller, Sebastian
q Morimoto, Shoichi
q Mu, Chunyan
q Mulliner, Collin
q Muñoz, Antonio
N
q Na, Wenwu
q Nagase, Tomoyuki
q Nakayama, Shunn-ichiro
q Naksinehaboon, Nichamon
q Namazi, Alireza
q Nance, Kara
q Nerbråten, Øyvind
q Ngo, Huy Hoang
q Nishi, Ryuzou
q Nishigaki, Masakatsu
Papers by Author
q Nunes, Francisco José Barreto
O
q Ohta, Kazuo
q Okamoto, Eiji
q Okamura, Hiroyuki
q Omote, Kazumasa
q Orellana, Frederik
q Osborne, Grant
q Ostrouchov, George
P
q Panfil, Szymon
q Pang, Jun
q Paradiso, Vito
q Parrend, Pierre
q Pasquet, Marc
q Patrick, Gregory
q Pentikäinen, Heimo
q Pernul, G.
q Pernul, Günther
q Petersen, Kai
q Petit, Michaël
q Piattini, Mario
q Piessens, Frank
q Poornima, M.
q Poulopoulos, George
Papers by Author
q Pretschner, Alexander
q Pronstad, Thomas
Q
q Qureshi, Abdul Rasool
R
q Rass, Stefan
q Razmkhah,Mohammad-Hamed
q Reif, Matthias
q Reif, Wolfgang
q Ren, Yizhi
q Rhee, Junghwan
q Rikula, Pauli
q Riley, Ryan
q Rios, Erkuden
q Rodríguez, Jesus
q Rohani, Alireza
q Röning, Juha
q Røstad, Lillian
q Rüesch, Judith
S
q Sahita, Ravi
q Sakiyama, Kazuo
q Sakurai, Kouichi
Papers by Author
q Sanchez, Txus
q Sandhu, Ravi
q Sang, Sinawong
q Sano, Makoto
q Saran, Nurdan
q Scandariato, Riccardo
q Schaefer, Christian
q Schartner, Peter
q Schmidt, Jörn-Marc
q Schneider, Christian
q Schwenk, Jörg
q Scott, Stephen L.
q Selim, Mohammad Reza
q Serrano, Daniel
q Shahmehri, Nahid
q Shi, Xiaowei
q Shirase, Masaaki
q Shore, Malcolm
q Simms, David John
q Simon, Matthew
q Singhal, Sharad
q Slay, Jill
q Søttrup, Christian Ulrik
q Sowa, Sebastian
q Spanoudakis, George
q Srinathan, Kannan
Papers by Author
q Stahl, Armin
q Starnberger, Guenther
q Stenzel, Kurt
q Stephenson, Bryan
q Storer, Tim
q Stumpf, Frederic
q Syalim, Amril
T
q Tada, Minako
q Taerat, Narate
q Taherinia, A.H.
q Tajarrod, F.
q Takagi, Tsuyoshi
q Takenaka, Masahiko
q Talbi, Mehdi
q Tashi, Igli
q Tatara, Kohei
q Taylor, Robert
q Thomas, Ivonne
q Tillich, Stefan
q Tjoa, A. Min
q Tjoa, A.M.
q Toeroe, M.
q Tøndel, Inger Anne
q Tong, Valérie Viet Triem
Papers by Author
q Torra, Vicenç
q Trujillo, Juan
q Tseng, Yuh-Min
q Tsuji, Hidekazu
q Tu, Hao
q Turnbull, Benjamin
U
q Uehara, Tetsutaro
q Umadevi, Ganugula
q Un, Sungkyung
q Uusitalo, Ilkka
v
q van Eck, Pascal
V
q Valls, Aida
q Visaggio, Corrado Aaron
W
q Wäänänen, Anders
q Walter, Thomas
q Wang, Binbin
q Wang, Yi
q Washizaki, Hironori
Papers by Author
q Watanabe, Atsushi
q Watanabe, Yuji
q Welzer, Tatjana
q Wenzel, B.
q Westerlund, Vegar
q Wienhofen, Leendert
q Wieringa, Roel
q Wiil, Uffe Kock
q Wilson, Campbell
q Win, Bart De
q Woehrer, A.
q Wu, Jui-Di
q Wu, Shih-Chi
q Wu, Tsu-Yang
q Wu, Xianping
q Wuyts, Kim
X
q Xiao, Xiao
q Xie, Li
q Xin, Zhi
q Xu, Cheng-Zhong
q Xu, Dongyan
q Xu, Lu
q Xu, Shouhuai
Papers by Author
Y
q Yajima, Kenichi
q Yamamoto, Kotaro
q Yamamoto, Takumi
q Yee, George O.M.
q Yin, Yang
q Yoshida, Yoshiaki
q Yoshioka, Nobukazu
q Yoshioka, Yoshio
q Younan, Yves
Z
q Zarandi, Hamid. R.
q Zhang, Ge
q Zhang, Pin
q Zimmermann, Jacob
q Zorzo, Sergio Donizetti
Papers by Author
Addepalli, Sarat C.
q On Privacy Preserving Convex Hull
q Generalized Robust Combiners for Oblivious Transfer
q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots
Adelsbach, André
q Methodology to Align Business and IT Policies: Use Case from an IT Company
Agrawal, Alka
q An Efficient Measurement of Object Oriented DesignVulnerability
Papers by Author
Ahonen, Pasi
q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle
Ahsant, Mehran
q Workflows in Dynamic and Restricted Delegation
q Security Credential Mapping in Grids
Albuquerque, Adriano Bessa
q A Knowledge Management Approach to Support a SecureSoftware Development
Papers by Author
Aleksy, Markus
q MixVM - An Approach to Service Isolation and Data Protectionin Mobile Context-Sensitive Applications
Alhadidi, Dima
q A Practical Framework for the Dataflow Pointcut in AspectJ
Alimi, Vincent
q Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element
Almasizadeh, Jaafar
q Intrusion Process Modeling for Security Quantification
Papers by Author
Alsos, Ole Andreas
q Patient-Administered Access Control: A Usability Study
Amiri, S. Hamid
q A Robust Image Watermarking Method in Wavelet DomainUsing Genetic Algorithm
Andresen, Herbjørn
q Reusable Security Requirements for Healthcare Applications
Anttila, Juhani
q Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments
Papers by Author
Ardi, Shanai
q An Architectural Foundation for Security Model Sharing and Reuse
q A Post-Mortem Incident Modeling Method
Ates, Mikaël
q The User-Centric Vision Matches Credentials Exchanges
Aubert, Jocelyn
q Methodology to Align Business and IT Policies: Use Case from an IT Company
Papers by Author
Ayed, Samiha
q Deploying Security Policy in Intra and Inter WorkflowManagement Systems
Azgomi, Mohammad Abdollahi
q Intrusion Process Modeling for Security Quantification
Azreen, Noor Sheila
q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408
Baca, Dejan
q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?
Papers by Author
Bansal, Piyush
q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots
Basney, Jim
q Workflows in Dynamic and Restricted Delegation
q Security Credential Mapping in Grids
Belchior, Arnaldo Dias
q A Knowledge Management Approach to Support a SecureSoftware Development
Papers by Author
Ben-Asher, Noam
q An Experimental System for Studying the Tradeoff between Usability and Security
Bishop, Matt
q Investigating the Implications of Virtual Machine Introspectionfor Digital Forensics
Blanco, Carlos
q Including Security Rules Support in an MDA Approach for Secure DWs
q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs
Papers by Author
Blundell, Barry
q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime Data
Boehmer, Wolfgang
q Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001
Bouhoula, Adel
q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting Protocols
Boukhtouta, Amine
q A Practical Framework for the Dataflow Pointcut in AspectJ
Papers by Author
Breu, Ruth
q An Empirically Derived Loss Taxonomy Based on PubliclyKnown Security Incidents
Breuel, Thomas
q Server-Side Prediction of Source IP Addresses Using DensityEstimation
Brezany, P.
q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management
Broser, C.
q Different Approaches to In-House Identity Management -Justification of an Assumption
Papers by Author
Bruhadeshwar, Bezawada
q Routing Protocol Security Using Symmetric Key BasedTechniques
q Reducing the Cost of Session Key Establishment
Brujerdi, Mohammad Reza Matash
q Using Hybrid Trust Model for Handling Inaccurate Resource
Bu, Qingzhong
q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application
Papers by Author
Butter, Thomas
q MixVM - An Approach to Service Isolation and Data Protectionin Mobile Context-Sensitive Applications
Buyens, Koen
q Identifying and Resolving Least Privilege Violations in SoftwareArchitectures
Byers, David
q Prioritisation and Selection of Software Security Activities
Cami, Bagher Rahimpour
q Using Hybrid Trust Model for Handling Inaccurate Resource
Papers by Author
Camy, Marc
q Methodology to Align Business and IT Policies: Use Case from an IT Company
Canfora, Gerardo
q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational Databases
Carlet, Claude
q On the Higher Order Nonlinearities of Boolean Functions and S-boxes
Carlsson, Bengt
q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?
Papers by Author
Chandler, Clayton
q Blue Gene/L Log Analysis and Time to Interrupt Estimation
Chandra, Shalini
q An Efficient Measurement of Object Oriented DesignVulnerability
Chang, Ya-Fen
q An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications
Cheang, Sopheak
q State of Cybersecurity and the Roadmap to Secure CyberCommunity in Cambodia
Papers by Author
Chen, Chang-Chi
q Enterprise-Oriented Digital Rights Management Mechanism:eDRM
Chen, Lung-Hsien
q Truly Anonymous Paper Submission and Review Scheme
Chen, Ming-Te
q Truly Anonymous Paper Submission and Review Scheme
Chen, Ping
q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability
q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel
Papers by Author
Chen, Youcheng
q An Improvement of REM: A Replication Oriented Event-BasedMiddleware
Cheng, Jingde
q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408
q An Improvement of REM: A Replication Oriented Event-BasedMiddleware
Chiang, Po-Hsuan
q Enterprise-Oriented Digital Rights Management Mechanism:eDRM
Papers by Author
Chiariglione, Filippo
q Managing Rights and Value of Digital Media
Clark, David
q Quantitative Analysis of Secure Information Flow via Probabilistic Semantics
Cosenza, Giacomo
q Managing Rights and Value of Digital Media
Covington, Michael
q Capturing Information Flow with Concatenated Dynamic TaintAnalysis
Papers by Author
Cuppens, Frédéric
q Deploying Security Policy in Intra and Inter WorkflowManagement Systems
Cuppens-Boulahia, Nora
q Deploying Security Policy in Intra and Inter WorkflowManagement Systems
De Decker, Bart
q Linking Privacy Solutions to Developer Goals
de Guzmán, Ignacio García-Rodríguez
q Including Security Rules Support in an MDA Approach for Secure DWs
Papers by Author
q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs
Debbabi, Mourad
q A Practical Framework for the Dataflow Pointcut in AspectJ
Deepya, Maddi Sree
q Reducing the Cost of Session Key Establishment
Demay, Jonathan-Christofer
q Automated Instruction-Set Randomization for WebApplications in Diversified Redundant Systems
Deng, Xianglin
q Advanced Flooding Attack on a SIP Server
Papers by Author
Descher, M.
q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management
Descher, Marco
q Retaining Data Control to the Client in Infrastructure Clouds
Dillon, Tharam
q Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method
Divya, M.
q Routing Protocol Security Using Symmetric Key BasedTechniques
Papers by Author
Dodge, Ronald
q Standards-Based Cyber Exercises
Doğanaksoy, Ali
q Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack
Dohi, Tadashi
q On Equilibrium Distribution Properties in Software ReliabilityModeling
q Security Evaluation of an Intrusion Tolerant System with MRSPNs
q Statistical Failure Analysis of a Web Server System
Papers by Author
Doi, Hiroshi
q An Implementation of the Binding Mechanism in the WebBrowser for Preventing XSS Attacks: Introducing the Bind-Value Headers
Eckert, Claudia
q Enhancing Control of Service Compositions in Service-OrientedArchitectures
Ehlert, Sven
q Revealing the Calling History of SIP VoIP Systems by TimingAttacks
Ejlali, Alireza
q A Micro-FT-UART for Safety-Critical SoC-Based Applications
Papers by Author
q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM Technologies
q A High Speed and Low Cost Error Correction Technique for the Carry Select Adder
Elberzhager, Frank
q Software Inspections Using Guided Checklists to EnsureSecurity Goals
Elhadef, Mourad
q A Perceptron Neural Network for AsymmetricComparison-Based System-Level Fault Diagnosis
Papers by Author
Eliasson, Charlott
q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMS
Elliott, James
q Blue Gene/L Log Analysis and Time to Interrupt Estimation
Elsayed, I.
q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management
Emamali, Gerald
q Using XACML for Embedded and Fine-Grained Access ControlPolicy
Papers by Author
Emura, Keita
q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics
q A Certificate Revocable Anonymous Authentication Schemewith Designated Verifier
Engelmann, Christian
q Blue Gene/L Log Analysis and Time to Interrupt Estimation
Englert, Roman
q An Experimental System for Studying the Tradeoff between Usability and Security
Papers by Author
Fan, Chun-I
q Truly Anonymous Paper Submission and Review Scheme
Farkas, Csilla
q P2F: A User-Centric Privacy Protection Framework
Fayolle, Jacques
q The User-Centric Vision Matches Credentials Exchanges
Feilhauer, T.
q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management
Feilhauer, Thomas
q Retaining Data Control to the Client in Infrastructure Clouds
Papers by Author
Feltus, Christophe
q Building a Responsibility Model Including Accountability,Capability and Commitment
q Methodology to Align Business and IT Policies: Use Case from an IT Company
Fernandez, Eduardo B.
q Modeling Misuse Patterns
q Patterns to Support the Development of Privacy Policies
Fernández-Medina, Eduardo
q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering
Papers by Author
q Including Security Rules Support in an MDA Approach for Secure DWs
q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs
Fiedler, Markus
q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMS
Fischer-Huebner, Simone
q Revealing the Calling History of SIP VoIP Systems by TimingAttacks
Papers by Author
Foster, Keith
q Using XACML for Embedded and Fine-Grained Access ControlPolicy
Fotouhi, M.
q A New Watermarking Attack Using Long-Range CorrelationImage Restoration
Fovino, Igor Nai
q Methodology for Experimental ICT Industrial and CriticalInfrastructure Security Tests
Franqueira, Virginia N.L.
q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation
Papers by Author
q Estimating ToE Risk Level Using CVSS
Froihofer, Lorenz
q QR-TAN: Secure Mobile Transaction Authentication
Fu, Song
q Proactive Resource Management for Failure Resilient HighPerformance Computing Clusters
Fuchs, L.
q Different Approaches to In-House Identity Management -Justification of an Assumption
Papers by Author
Fugkeaw, Somchart
q A-COLD: Access Control of Web OLAP over Multi-dataWarehouse
Fujii, Tatsuro
q Security Analysis for P2P Routing Protocols
Fujii, Toshiya
q Statistical Failure Analysis of a Web Server System
Fujimoto, Ryutaro
q Security Evaluation of an Intrusion Tolerant System with MRSPNs
Papers by Author
Fujinoki, Hiroshi
q Improving Reliability for Multi-home Inbound Traffic: MHLB/IPacket-Level Inter-domain Load-Balancing
Gabriel, Roland
q Multidimensional Management of Information Security – AMetrics Based Approach Merging Business and InformationSecurity Topics
Gateau, Benjamin
q Methodology to Align Business and IT Policies: Use Case from an IT Company
Papers by Author
Ge, Yi
q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel
Ghernaouti-Hélie, Solange
q An Inclusive Information Society Needs a Global Approach of Information Security
q A Security Management Assurance Model to Holistically Assessthe Information Security Posture
Goeschka, Karl M.
q QR-TAN: Secure Mobile Transaction Authentication
Goh, Vik Tor
q Towards Intrusion Detection for Encrypted Networks
Papers by Author
Goldstein, Markus
q Server-Side Prediction of Source IP Addresses Using DensityEstimation
Gómez-Alonso, Cristina
q Generation of Prototypes for Masking Sequences of Events
Gong, Daofu
q An Authentication Watermark Algorithm for JPEG images
Gonzalez, Esteban Talavera
q Security Credential Mapping in Grids
Papers by Author
Gorawski, Marcin
q A System of Privacy Preserving Distributed Spatial DataWarehouse Using Relation Decomposition
Gorender, Sérgio
q Perfect Failure Detection in the Partitioned SynchronousDistributed System Model
Goto, Yuichi
q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408
q An Improvement of REM: A Replication Oriented Event-BasedMiddleware
Papers by Author
Grandy, Holger
q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications
Gravier, Christophe
q The User-Centric Vision Matches Credentials Exchanges
Grønager, Michael
q The Case for a Simpler Security Model in Grid Computing
Guilley, Sylvain
q Deconvolving Protected Signals
Gupta, Anuj
q On Privacy Preserving Convex Hull
Papers by Author
Halunen, Kimmo
q Finding Preimages of Multiple Passwords Secured with VSH
Hamou-Lhadj, A.
q Generating AMF Configurations from Software VendorConstraints and User Requirements
Hans, Sandeep
q On Privacy Preserving Convex Hull
Hay, Brian
q Standards-Based Cyber Exercises
q Investigating the Implications of Virtual Machine Introspectionfor Digital Forensics
Papers by Author
Heyman, Thomas
q Risk-Driven Architectural Decomposition
Hicks, David L.
q Novel Algorithms for Subgroup Detection in Terrorist Networks
Hölbl, Marko
q An Improved Authentication Protocol Based on One-Way HashFunctions and Diffie-Hellman Key Exchange
Hong, Dowon
q Improving Performance in Digital Forensics: A Case UsingPattern Matching Board
Papers by Author
Hori, Yoshiaki
q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management Guide
q Security Analysis for P2P Routing Protocols
q Secrecy Capacity of Wireless LAN
q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets
Horie, Daisuke
q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408
Houmb, Siv Hilde
q Estimating ToE Risk Level Using CVSS
Papers by Author
Hsieh, George
q Using XACML for Embedded and Fine-Grained Access ControlPolicy
Huang, Chin-Tser
q P2F: A User-Centric Privacy Protection Framework
Huang, Shou-Hsuan Stephen
q Detecting Stepping-Stone Connection Using Association RuleMining
Huemer, D.
q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management
Papers by Author
Huemer, David
q Retaining Data Control to the Client in Infrastructure Clouds
Hussain, Omar
q Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method
Iha, Genta
q An Implementation of the Binding Mechanism in the WebBrowser for Preventing XSS Attacks: Introducing the Bind-Value Headers
Incoul, Christophe
q Methodology to Align Business and IT Policies: Use Case from an IT Company
Papers by Author
Innerhofer-Oberperfler, Frank
q An Empirically Derived Loss Taxonomy Based on PubliclyKnown Security Incidents
Iwakiri, Munetoshi
q A Standard MIDI File Steganography Based on Fluctuation of Duration
q Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument
Izu, Tetsuya
q Yet Another Sanitizable Signature from Bilinear Maps
Papers by Author
Izumi, Masami
q A New Approach for Implementing the MPL Method toward Higher SPA Resistance
Jaatun, Martin Gilje
q Reusable Security Requirements for Healthcare Applications
Jafari-lafti, Maryam
q P2F: A User-Centric Privacy Protection Framework
Jamzad, M.
q A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising
q A New Watermarking Attack Using Long-Range CorrelationImage Restoration
Papers by Author
Jamzad, Mansour
q A Robust Image Watermarking Method in Wavelet DomainUsing Genetic Algorithm
Jawurek, Marek
q Software Inspections Using Guided Checklists to EnsureSecurity Goals
Jensen, Jostein
q Reusable Security Requirements for Healthcare Applications
q An Architectural Foundation for Security Model Sharing and Reuse
Papers by Author
Jensen, Meiko
q The Accountability Problem of Flooding Attacks in Service-Oriented Architectures
Jiang, Xuxian
q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring
Jiménez, Javier
q Utility and Risk of JPEG-Based Continuous Microdata ProtectionMethods
Jing, Jing
q An Authentication Watermark Algorithm for JPEG images
Papers by Author
Jonker, Hugo
q Measuring Voter-Controlled Privacy
Joosen, Wouter
q Identifying and Resolving Least Privilege Violations in SoftwareArchitectures
q Risk-Driven Architectural Decomposition
q Protecting Global and Static Variables from Buffer OverflowAttacks
q Linking Privacy Solutions to Developer Goals
Jørstad, Ivar
q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMS
Papers by Author
Juntapremjitt, Sekpon
q A-COLD: Access Control of Web OLAP over Multi-dataWarehouse
Kafi, Mohaned
q Deconvolving Protected Signals
Kajava, Jorma
q Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments
Kakizaki, Yoshio
q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information
Papers by Author
Kalici, Daniel
q The Case for a Simpler Security Model in Grid Computing
Kanso, A.
q Generating AMF Configurations from Software VendorConstraints and User Requirements
Karppinen, Kaarina
q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle
Katsuno, Yasuharu
q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions
Papers by Author
Keromytis, Angelos D.
q Capturing Information Flow with Concatenated Dynamic TaintAnalysis
Khan, Raees Ahmad
q An Efficient Measurement of Object Oriented DesignVulnerability
Khendek, F.
q Generating AMF Configurations from Software VendorConstraints and User Requirements
Kikuchi, Hiroaki
q Privacy-Preserving Collaborative Filtering Schemes
Papers by Author
Kim, Hyung Chan
q Capturing Information Flow with Concatenated Dynamic TaintAnalysis
Kizawa, Hiroyasu
q Privacy-Preserving Collaborative Filtering Schemes
Klaus, Alexander
q Software Inspections Using Guided Checklists to EnsureSecurity Goals
Kolter, Jan
q Generating User-Understandable Privacy Preferences
Papers by Author
Kong, Xiangwei
q Detecting Image Tampering Using Feature Fusion
Kothapalli, Kishore
q Routing Protocol Security Using Symmetric Key BasedTechniques
q Reducing the Cost of Session Key Establishment
Krishna, K. Madhava
q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots
Papers by Author
Kudo, Michiharu
q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions
Kudou, Hiroshi
q A Reconfigurable-Permutation Algorithm for M_S-Box
Kunihiro, Noboru
q Yet Another Sanitizable Signature from Bilinear Maps
Kuo, Ying-wei
q Detecting Stepping-Stone Connection Using Association RuleMining
Papers by Author
Lai, Yen-Cheng
q An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications
Lardon, Jeremy
q The User-Centric Vision Matches Credentials Exchanges
Latif-Shabgahi, G.
q A New Approach for the Construction of Fault Trees from System Simulink
Le, Phu Dung
q Package-Role Based Authorization Control Model for WirelessNetwork Services
Papers by Author
Leangsuksun, Chokchai
q Blue Gene/L Log Analysis and Time to Interrupt Estimation
Lee, Jooyoung
q Improving Performance in Digital Forensics: A Case UsingPattern Matching Board
Leonard, Justin
q A First Step towards Characterizing Stealthy Botnets
q A Framework for Understanding Botnets
Li, Fagen
q Identity-Based Hybrid Signcryption
Papers by Author
Li, Jun
q A Policy Framework for Data Management in ServicesMarketplaces
Li, Zhitang
q Measuring Peer-to-Peer Botnets Using Control Flow Stability
Lin, Chia-Chen
q Enterprise-Oriented Digital Rights Management Mechanism:eDRM
Liu, Fenlin
q An Authentication Watermark Algorithm for JPEG images
Papers by Author
Liu, Jigang
q Computer Forensics in Japan: A Preliminary Study
Lobato, Luanna Lopes
q Patterns to Support the Development of Privacy Policies
Lock, Russell
q Accuracy: The Fundamental Requirement for Voting Systems
Looi, Mark
q Towards Intrusion Detection for Encrypted Networks
Papers by Author
Lopes, Raul H.C.
q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation
LoPresti, Stephane
q Web Service Trust: Towards a Dynamic Assessment Framework
Ludescher, T.
q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management
Lundberg, Lars
q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?
Papers by Author
Ma, Ao
q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application
Ma, Jie
q Measuring Peer-to-Peer Botnets Using Control Flow Stability
Macêdo, Raimundo José de Araújo
q Perfect Failure Detection in the Partitioned SynchronousDistributed System Model
Majorczyk, Frédéric
q Automated Instruction-Set Randomization for WebApplications in Diversified Redundant Systems
Papers by Author
Maña, Antonio
q SecMiLiA: An Approach in the Agent Protection
q AVISPA in the Validation of Ambient Intelligence Scenarios
Manoochehri, Mehrtash
q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM Technologies
Manpanpanich, Piyawit
q A-COLD: Access Control of Web OLAP over Multi-dataWarehouse
Papers by Author
Mao, Bing
q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability
q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel
Markantonakis, Konstantinos
q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems
Martucci, Leonardo A.
q Revealing the Calling History of SIP VoIP Systems by TimingAttacks
Papers by Author
Marvel, Lisa
q Using XACML for Embedded and Fine-Grained Access ControlPolicy
Masera, Marcelo
q Methodology for Experimental ICT Industrial and CriticalInfrastructure Security Tests
Masser, P.
q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management
Masser, Philip
q Retaining Data Control to the Client in Infrastructure Clouds
Papers by Author
Matone, Sergio
q Managing Rights and Value of Digital Media
Mauw, Sjouke
q Measuring Voter-Controlled Privacy
Mayes, Keith
q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems
Meinel, Christoph
q Security Requirements Specification in Service-OrientedBusiness Process Management
Papers by Author
Meland, Per Håkon
q Reusable Security Requirements for Healthcare Applications
q An Architectural Foundation for Security Model Sharing and Reuse
Mellado, Daniel
q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering
Memon, Nasrullah
q Novel Algorithms for Subgroup Detection in Terrorist Networks
Papers by Author
Meng, Xiaoxuan
q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application
Menzel, Michael
q Security Requirements Specification in Service-OrientedBusiness Process Management
Meyer, Joachim
q An Experimental System for Studying the Tradeoff between Usability and Security
Miremadi, Seyed Ghassem
q A Micro-FT-UART for Safety-Critical SoC-Based Applications
Papers by Author
q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM Technologies
q A High Speed and Low Cost Error Correction Technique for the Carry Select Adder
Miyaji, Atsuko
q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics
q A Certificate Revocable Anonymous Authentication Schemewith Designated Verifier
Mödersheim, Sebastian
q Algebraic Properties in Alice and Bob Notation
Papers by Author
Moebius, Nina
q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications
Möller, Sebastian
q An Experimental System for Studying the Tradeoff between Usability and Security
Morimoto, Shoichi
q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408
Mu, Chunyan
q Quantitative Analysis of Secure Information Flow via Probabilistic Semantics
Papers by Author
Mulliner, Collin
q Vulnerability Analysis and Attacks on NFC-Enabled MobilePhones
Muñoz, Antonio
q SecMiLiA: An Approach in the Agent Protection
q AVISPA in the Validation of Ambient Intelligence Scenarios
Na, Wenwu
q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application
Nagase, Tomoyuki
q A Reconfigurable-Permutation Algorithm for M_S-Box
Papers by Author
Nakayama, Shunn-ichiro
q A Reconfigurable-Permutation Algorithm for M_S-Box
Naksinehaboon, Nichamon
q Blue Gene/L Log Analysis and Time to Interrupt Estimation
Namazi, Alireza
q A High Speed and Low Cost Error Correction Technique for the Carry Select Adder
Nance, Kara
q Standards-Based Cyber Exercises
q Investigating the Implications of Virtual Machine Introspectionfor Digital Forensics
Papers by Author
Nerbråten, Øyvind
q hACMEgame: A Tool for Teaching Software Security
Ngo, Huy Hoang
q Package-Role Based Authorization Control Model for WirelessNetwork Services
Nishi, Ryuzou
q Secrecy Capacity of Wireless LAN
Nishigaki, Masakatsu
q Making Use of Human Visual Capability to Improve InformationSecurity
Papers by Author
Nunes, Francisco José Barreto
q A Knowledge Management Approach to Support a SecureSoftware Development
Ohta, Kazuo
q A New Approach for Implementing the MPL Method toward Higher SPA Resistance
q Yet Another Sanitizable Signature from Bilinear Maps
Okamoto, Eiji
q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions
Papers by Author
Okamura, Hiroyuki
q Security Evaluation of an Intrusion Tolerant System with MRSPNs
Omote, Kazumasa
q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics
q A Certificate Revocable Anonymous Authentication Schemewith Designated Verifier
Orellana, Frederik
q The Case for a Simpler Security Model in Grid Computing
Papers by Author
Osborne, Grant
q Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation
Ostrouchov, George
q Blue Gene/L Log Analysis and Time to Interrupt Estimation
Panfil, Szymon
q A System of Privacy Preserving Distributed Spatial DataWarehouse Using Relation Decomposition
Pang, Jun
q Measuring Voter-Controlled Privacy
Papers by Author
Paradiso, Vito
q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational Databases
Parrend, Pierre
q Enhancing Automated Detection of Vulnerabilities in JavaComponents
Pasquet, Marc
q Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element
Patrick, Gregory
q Using XACML for Embedded and Fine-Grained Access ControlPolicy
Papers by Author
Pentikäinen, Heimo
q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle
Pernul, G.
q Different Approaches to In-House Identity Management -Justification of an Assumption
Pernul, Günther
q Generating User-Understandable Privacy Preferences
Petersen, Kai
q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?
Papers by Author
Petit, Michaël
q Building a Responsibility Model Including Accountability,Capability and Commitment
Piattini, Mario
q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering
q Including Security Rules Support in an MDA Approach for Secure DWs
q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs
Papers by Author
Piessens, Frank
q Protecting Global and Static Variables from Buffer OverflowAttacks
Poornima, M.
q Routing Protocol Security Using Symmetric Key BasedTechniques
Poulopoulos, George
q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems
Pretschner, Alexander
q Formal Analyses of Usage Control Policies
Papers by Author
Pronstad, Thomas
q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach
Qureshi, Abdul Rasool
q Novel Algorithms for Subgroup Detection in Terrorist Networks
Rass, Stefan
q Security in Quantum Networks as an Optimization Problem
Razmkhah, Mohammad-Hamed
q A Micro-FT-UART for Safety-Critical SoC-Based Applications
Papers by Author
Reif, Matthias
q Server-Side Prediction of Source IP Addresses Using DensityEstimation
Reif, Wolfgang
q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications
Ren, Yizhi
q Security Analysis for P2P Routing Protocols
Rhee, Junghwan
q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring
Papers by Author
Rikula, Pauli
q Finding Preimages of Multiple Passwords Secured with VSH
Riley, Ryan
q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring
Rios, Erkuden
q An Architectural Foundation for Security Model Sharing and Reuse
Rodríguez, Jesus
q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering
Papers by Author
Rohani, Alireza
q An Analysis of Fault Effects and Propagations in AVRMicrocontroller ATmega103(L)
Röning, Juha
q Finding Preimages of Multiple Passwords Secured with VSH
Røstad, Lillian
q hACMEgame: A Tool for Teaching Software Security
q Patient-Administered Access Control: A Usability Study
Rüesch, Judith
q Formal Analyses of Usage Control Policies
Papers by Author
Sahita, Ravi
q Capturing Information Flow with Concatenated Dynamic TaintAnalysis
Sakiyama, Kazuo
q A New Approach for Implementing the MPL Method toward Higher SPA Resistance
Sakurai, Kouichi
q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management Guide
q A Signature Scheme Associated with Universal Re-signcryption
q Security Analysis for P2P Routing Protocols
q Secrecy Capacity of Wireless LAN
Papers by Author
q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets
Sanchez, Txus
q An Architectural Foundation for Security Model Sharing and Reuse
Sandhu, Ravi
q A First Step towards Characterizing Stealthy Botnets
q A Framework for Understanding Botnets
Sang, Sinawong
q State of Cybersecurity and the Roadmap to Secure CyberCommunity in Cambodia
Papers by Author
Sano, Makoto
q Yet Another Sanitizable Signature from Bilinear Maps
Saran, Nurdan
q Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack
Scandariato, Riccardo
q Risk-Driven Architectural Decomposition
q Linking Privacy Solutions to Developer Goals
Schaefer, Christian
q Formal Analyses of Usage Control Policies
Papers by Author
Schartner, Peter
q Security in Quantum Networks as an Optimization Problem
Schmidt, Jörn-Marc
q On the Security of Untrusted Memory
Schneider, Christian
q Enhancing Control of Service Compositions in Service-OrientedArchitectures
Schwenk, Jörg
q The Accountability Problem of Flooding Attacks in Service-Oriented Architectures
Papers by Author
Scott, Stephen L.
q Blue Gene/L Log Analysis and Time to Interrupt Estimation
Selim, Mohammad Reza
q An Improvement of REM: A Replication Oriented Event-BasedMiddleware
Serrano, Daniel
q SecMiLiA: An Approach in the Agent Protection
q AVISPA in the Validation of Ambient Intelligence Scenarios
Shahmehri, Nahid
q Prioritisation and Selection of Software Security Activities
Papers by Author
q An Architectural Foundation for Security Model Sharing and Reuse
q A Post-Mortem Incident Modeling Method
Shi, Xiaowei
q An Authentication Watermark Algorithm for JPEG images
Shirase, Masaaki
q Identity-Based Hybrid Signcryption
Shore, Malcolm
q Advanced Flooding Attack on a SIP Server
Simms, David John
q Information Security Optimization: From Theory to Practice
Papers by Author
Simon, Matthew
q Enhancement of Forensic Computing Investigations through Memory Forensic Techniques
Singhal, Sharad
q A Policy Framework for Data Management in ServicesMarketplaces
Slay, Jill
q Enhancement of Forensic Computing Investigations through Memory Forensic Techniques
Søttrup, Christian Ulrik
q The Case for a Simpler Security Model in Grid Computing
Papers by Author
Sowa, Sebastian
q Multidimensional Management of Information Security – AMetrics Based Approach Merging Business and InformationSecurity Topics
Spanoudakis, George
q Web Service Trust: Towards a Dynamic Assessment Framework
Srinathan, Kannan
q On Privacy Preserving Convex Hull
q Generalized Robust Combiners for Oblivious Transfer
q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots
Papers by Author
Stahl, Armin
q Server-Side Prediction of Source IP Addresses Using DensityEstimation
Starnberger, Guenther
q QR-TAN: Secure Mobile Transaction Authentication
Stenzel, Kurt
q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications
Stephenson, Bryan
q A Policy Framework for Data Management in ServicesMarketplaces
Papers by Author
Storer, Tim
q Accuracy: The Fundamental Requirement for Voting Systems
Stumpf, Frederic
q Enhancing Control of Service Compositions in Service-OrientedArchitectures
Syalim, Amril
q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management Guide
Tada, Minako
q Privacy-Preserving Collaborative Filtering Schemes
Papers by Author
Taerat, Narate
q Blue Gene/L Log Analysis and Time to Interrupt Estimation
Taherinia, A.H.
q A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising
q A New Watermarking Attack Using Long-Range CorrelationImage Restoration
Tajarrod, F.
q A New Approach for the Construction of Fault Trees from System Simulink
Takagi, Tsuyoshi
q Identity-Based Hybrid Signcryption
Papers by Author
Takenaka, Masahiko
q Yet Another Sanitizable Signature from Bilinear Maps
Talbi, Mehdi
q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting Protocols
Tashi, Igli
q Regulatory Compliance and Information Security Assurance
q A Security Management Assurance Model to Holistically Assessthe Information Security Posture
Tatara, Kohei
q A Signature Scheme Associated with Universal Re-signcryption
Papers by Author
q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets
Taylor, Robert
q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime Data
Thomas, Ivonne
q Security Requirements Specification in Service-OrientedBusiness Process Management
Tillich, Stefan
q On the Security of Untrusted Memory
Tjoa, A. Min
q Retaining Data Control to the Client in Infrastructure Clouds
Papers by Author
Tjoa, A.M.
q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management
Toeroe, M.
q Generating AMF Configurations from Software VendorConstraints and User Requirements
Tøndel, Inger Anne
q Reusable Security Requirements for Healthcare Applications
q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach
q An Architectural Foundation for Security Model Sharing and Reuse
Papers by Author
Tong, Valérie Viet Triem
q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting Protocols
Torra, Vicenç
q Rank Swapping for Partial Orders and Continuous Variables
q Utility and Risk of JPEG-Based Continuous Microdata ProtectionMethods
q Generation of Prototypes for Masking Sequences of Events
Trujillo, Juan
q Including Security Rules Support in an MDA Approach for Secure DWs
Papers by Author
q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs
Tseng, Yuh-Min
q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear Pairings
Tsuji, Hidekazu
q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information
Tu, Hao
q Measuring Peer-to-Peer Botnets Using Control Flow Stability
Papers by Author
Turnbull, Benjamin
q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime Data
q Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation
Uehara, Tetsutaro
q Computer Forensics in Japan: A Preliminary Study
Umadevi, Ganugula
q Generalized Robust Combiners for Oblivious Transfer
Papers by Author
Un, Sungkyung
q Improving Performance in Digital Forensics: A Case UsingPattern Matching Board
Uusitalo, Ilkka
q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle
Valls, Aida
q Generation of Prototypes for Masking Sequences of Events
van Eck, Pascal
q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation
Papers by Author
Visaggio, Corrado Aaron
q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational Databases
Wäänänen, Anders
q The Case for a Simpler Security Model in Grid Computing
Walter, Thomas
q Formal Analyses of Usage Control Policies
Wang, Binbin
q Measuring Peer-to-Peer Botnets Using Control Flow Stability
Papers by Author
Wang, Yi
q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability
q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel
Washizaki, Hironori
q Modeling Misuse Patterns
Watanabe, Atsushi
q A Reconfigurable-Permutation Algorithm for M_S-Box
Papers by Author
Watanabe, Yuji
q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions
Welzer, Tatjana
q An Improved Authentication Protocol Based on One-Way HashFunctions and Diffie-Hellman Key Exchange
Wenzel, B.
q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management
Westerlund, Vegar
q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach
Papers by Author
Wienhofen, Leendert
q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach
Wieringa, Roel
q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation
Wiil, Uffe Kock
q Novel Algorithms for Subgroup Detection in Terrorist Networks
Wilson, Campbell
q Package-Role Based Authorization Control Model for WirelessNetwork Services
Papers by Author
Win, Bart De
q Identifying and Resolving Least Privilege Violations in SoftwareArchitectures
Woehrer, A.
q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management
Wu, Jui-Di
q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear Pairings
Wu, Shih-Chi
q Enterprise-Oriented Digital Rights Management Mechanism:eDRM
Papers by Author
Wu, Tsu-Yang
q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear Pairings
Wu, Xianping
q Package-Role Based Authorization Control Model for WirelessNetwork Services
Wuyts, Kim
q Linking Privacy Solutions to Developer Goals
Xiao, Xiao
q On Equilibrium Distribution Properties in Software ReliabilityModeling
Papers by Author
Xie, Li
q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability
q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel
Xin, Zhi
q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability
Xu, Cheng-Zhong
q Proactive Resource Management for Failure Resilient HighPerformance Computing Clusters
Papers by Author
Xu, Dongyan
q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring
Xu, Lu
q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application
Xu, Shouhuai
q A First Step towards Characterizing Stealthy Botnets
q A Framework for Understanding Botnets
Papers by Author
Yajima, Kenichi
q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408
Yamamoto, Kotaro
q A Standard MIDI File Steganography Based on Fluctuation of Duration
q Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument
Yamamoto, Takumi
q Making Use of Human Visual Capability to Improve InformationSecurity
Papers by Author
Yee, George O.M.
q An Automatic Privacy Policy Agreement Checker for E-services
Yin, Yang
q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application
Yoshida, Yoshiaki
q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information
Yoshioka, Nobukazu
q Modeling Misuse Patterns
Papers by Author
Yoshioka, Yoshio
q A Reconfigurable-Permutation Algorithm for M_S-Box
Younan, Yves
q Protecting Global and Static Variables from Buffer OverflowAttacks
Zarandi, Hamid. R.
q An Analysis of Fault Effects and Propagations in AVRMicrocontroller ATmega103(L)
Zhang, Ge
q Revealing the Calling History of SIP VoIP Systems by TimingAttacks
Papers by Author
Zhang, Pin
q Detecting Image Tampering Using Feature Fusion
Zimmermann, Jacob
q Towards Intrusion Detection for Encrypted Networks
Zorzo, Sergio Donizetti
q Patterns to Support the Development of Privacy Policies
Papers by Author
A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z