


default search action
ARES 2006: Vienna, Austria
- Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria. IEEE Computer Society 2006, ISBN 0-7695-2567-9

Introduction
- Message from the Organizing Committee.

- ARES and Workshops Committees.

Invited Talks
- Louis Marinos:

Risk Management and Risk Assessment at ENISA: Issues and Challenges. 2-3 - David A. Basin:

Model Driven Security. 4
Session 1: Trust Management
- Ching Lin, Vijay Varadharajan:

Trust Based Risk Management for Distributed System Security - A New Approach. 6-13 - Rajarajan Sampath, Deepak Goel:

RATING: Rigorous Assessment of Trust in Identity Management. 14-23 - Kilho Shin, Hiroshi Yasuda:

Provably Secure Anonymous Access Control for Heterogeneous Trusts. 24-33
Session 2: P2P Systems
- Amy Beth Corman

, Scott Douglas, Peter Schachte
, Vanessa Teague:
A Secure Event Agreement (SEA) protocol for peer-to-peer games. 34-41 - Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa

, Tomoya Enokido, S. Misbah Deen:
Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay Networks. 42-49 - Alexander Zangerl:

Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures. 50-57 - Regine Endsuleit, Thilo Mie:

Censorship-Resistant and Anonymous P2P Filesharing. 58-65
Session 3: Mobile Network and Pervasive Systems
- Sheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri:

A Dependable Device Discovery Approach for Pervasive Computing Middleware. 66-73 - Saber Zrelli, Yoichi Shinoda:

Single sign-on framework for AAA operations within commercial mobile networks. 74-81 - Junyang Zhou

, Joseph Kee-Yin Ng:
A Selector Method for Providing Mobile Location Estimation Services within a Radio Cellular Network. 82-89 - Leon Grabensek, Sasa Divjak:

Guidelines for Biometric Recognition in Wireless System for Payment Confirmation. 90-99
Session 4: Protocol and Communication
- V. H. Gupta, K. Gopinath:

An Extended Verifiable Secret Redistribution Protocol for Archival Systems. 100-107 - Thomas Berger:

Analysis of Current VPN Technologies. 108-115 - Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie:

Integration of Quantum Cryptography in 802.11 Networks. 116-123 - Alban Gabillon, Laurent Gallon:

Availability Constraints for Avionic Data Buses. 124-131
Session 5: Security as Quality of Service
- Yih Huang, David Arsenault, Arun Sood:

Securing DNS Services through System Self Cleansing and Hardware Enhancements. 132-139 - George Yee:

Personalized Security for E-Services. 140-147 - Juan Vera del Campo, Josep Pegueroles, Miguel Soriano

:
Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. 148-155 - Karin Sallhammar, Bjarne E. Helvik

, Svein J. Knapskog:
Towards a Stochastic Model for Integrated Security and Dependability Evaluation. 156-165
Session 6: Networking and Fault Tolerance
- Mourad Elhadef

, Shantanu Das, Amiya Nayak
:
A Novel Artificial-Immune-Based Approach for System-Level Fault Diagnosis. 166-173 - René Rydhof Hansen

, Christian W. Probst
, Flemming Nielson
:
Sandboxing in myKlaim. 174-181 - Frank Yeong-Sung Lin, Po-Hao Tsang, C.-H. Chen, Chung-Lien Tseng, Y.-L. Lin:

Evaluation of Network Robustness for Given Defense Resource Allocation Strategies. 182-189 - Gang Yao, Dengguo Feng:

Proxy Oblivious Transfer Protocol. 190-197
Session 7: Identification and Authentication
- Feng Cao, Cullen Jennings:

Providing Response Identity and Authentication in IP Telephony. 198-205 - Judith E. Y. Rossebø, Rolv Bræk:

Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition. 206-215 - Maurizio Adriano Strangio:

An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol. 216-223 - Hugo Proença

, Luís A. Alexandre
:
A Method for the Identification of Inaccuracies in Pupil Segmentation. 224-228 - Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard:

Availability Enforcement by Obligations and Aspects Identification. 229-239
Session 8: High Availability and Dependability
- Remko W. Helms

, S. Van Oorschot, J. Herweijer, M. Plas:
An integral IT continuity framework for undisrupted business operations. 240-244 - Christian Storm, Oliver E. Theel:

Highly Adaptable Dynamic Quorum Schemes for Managing Replicated Data. 245-253 - Pablo Neira Ayuso

, Laurent Lefèvre, Rafael M. Gasca
:
High Availability support for the design of stateful networking equipments. 254-261 - Jiong Zhang, Mohammad Zulkernine:

A Hybrid Network Intrusion Detection Technique Using Random Forests. 262-269 - Wei Wang, Roberto Battiti

:
Identifying Intrusions in Computer Networks with Principal Component Analysis. 270-279
Session 9: Reliability and Availability
- Sozo Inoue, Hiroto Yasuura

, Daisuke Hagiwara:
Systematic Error Detection for RFID Reliability. 280-286 - Cas Cremers:

Feasibility of Multi-Protocol Attacks. 287-294 - Michael Jarrett, Rudolph E. Seviora:

Diversity to Enhance Autonomic Computing Self-Protection. 295-299 - Javier Cano-Montero

, David Ríos Insua
:
Reliability Forecasting in Complex Hardware/Software Systems. 300-304 - Hertong Song, Chokchai Leangsuksun, Raja Nassar:

Availability Modeling and Analysis on High Performance Cluster Computing Systems. 305-313
Session 10: Security and Privacy Issue
- Man Lin, Laurence Tianruo Yang:

Schedulability Driven Security Optimization in Real-time Systems. 314-320 - George Yee, Larry Korba, Ronggong Song:

Ensuring Privacy for E-Health Services. 321-328 - Nevena Stolba, Marko Banek, A Min Tjoa

:
The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. 329-339 - Melanie Volkamer, Robert Krimmer

:
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols. 340-347 - Zhiqiang Lin, Bing Mao, Li Xie:

A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. 348-357
Session 11: Security Management
- David Garcia Rosado

, Eduardo Fernández-Medina
, Mario Piattini
, Carlos Gutiérrez:
A Study of Security Architectural Patterns. 358-365 - Thomas Neubauer, Christian Stummer

, Edgar R. Weippl
:
Workshop-based Multiobjective Security Safeguard Selection. 366-373 - Klaus Plößl, Thomas Nowey, Christian Mletzko:

Towards a Security Architecture for Vehicular Ad Hoc Networks. 374-381 - Yohann Thomas, Hervé Debar

, Benjamin Morin:
Improving Security Management through Passive Network Observation. 382-389 - Serge Abiteboul, Bogdan Cautis, Amos Fiat, Tova Milo:

Digital Signatures for Modifiable Collections. 390-399
Session 12: Distributed Systems
- Johannes Osrael, Lorenz Froihofer, Karl M. Göschka, Stefan Beyer, Pablo Galdámez, Francesc D. Muñoz-Escoí:

A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems. 400-407 - Stefan Beyer, Alexander Sánchez

, Francesc D. Muñoz-Escoí
, Pablo Galdámez:
DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems. 408-415 - Stefano Bistarelli

, Fabio Fioravanti
, Pamela Peretti:
Defense trees for economic evaluation of security investments. 416-423 - Amir Hayat, Thomas Rössler, Muhammad Alam:

Proposed Framework for Achieving Interoperable Services Between European Public Administrations. 424-431 - Davrondzhon Gafurov, Kirsi Helkala

, Torkjel Søndrol:
Gait Recognition Using Acceleration from MEMS. 432-439
Session 13: Software Security and Dependability
- Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao:

Making Web Services Dependable. 440-448 - Rasa Remenyte, John D. Andrews

:
A Simple Component Connection Approach for Fault Tree Conversion to Binary Decision Diagram. 449-457 - Thomas Neubauer, Markus D. Klemen, Stefan Biffl:

Secure Business Process Management: A Roadmap. 457-464 - Torsten Priebe

, Wolfgang Dobmeier, Nora Kamprath:
Supporting Attribute-based Access Control with Ontologies. 465-472 - Calin Ciufudean

, Adrian Graur, Constantin Filote
, Cornel Turcu, Valentin Popa
:
Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets. 473-481
International Symposium on Frontiers in Availability, Reliability and Security (FARES)
Session 1: IP Network and Adhoc Network
- Marc Conrad, Tim French, Wei Huang, Carsten Maple:

A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter?. 482-487 - Arjan Durresi, Lyn Evans, Vamsi Paruchuri

, Leonard Barolli:
Secure 3G User Authentication in Adhoc Serving Networks. 488-495 - Feng Cao, Saadat Malik:

Security Analysis for IP-based Government Emergency Telephony Service. 496-501 - Muhammad Sher

, Thomas Magedanz, Walter T. Penzhorn:
Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS). 502-509 - Hyangjin Lee, Jeeyeon Kim:

Privacy threats and issues in mobile RFID. 510-514
Session 2: Wireless and Sensor Network
- Dong Seong Kim, Khaja Mohammad Shazzad, Jong Sou Park:

A Framework of Survivability Model for Wireless Sensor Network. 515-522 - Valer Bocan

, Vladimir Cretu:
Mitigating Denial of Service Threats in GSM Networks. 523-528 - Amirhosein Taherkordi, Majid Alkaee Taleghan, Mohsen Sharifi

:
Achieving Availability and Reliability in Wireless Sensor Networks Applications. 529-535 - Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang:

Secure Enhanced Wireless Transfer Protocol. 536-543
Session 3: Authentication and Authorization
- Carlos Villarrubia, Eduardo Fernández-Medina

, Mario Piattini
:
Quality of Password Management Policy. 544-550 - Yoshio Kakizaki

, Hiroshi Yamamoto, Hidekazu Tsuji:
A Proposal of An Anonymous Authentication Method For Flat-rate Service. 551-557 - Mingchu Li, Hongyan Yao, Jianbo Ma:

Recovery Mechanism of Online Certification Chain in Grid Computing. 558-562
Session 4: Trust Management and Recovery
- Cristina Satizábal

, Rafael Páez
, Jordi Forné
:
PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model. 563-570 - Mingchu Li, Hongyan Yao:

Recovery Mechanism of Cooperative Process Chain in Grid. 571-576 - Naoyuki Nagatou

, Takuo Watanabe:
Run-Time Detection of Covert Channels. 577-584
Session 5: Secure Information System
- Luis Enrique Sánchez

, Daniel Villafranca, Eduardo Fernández-Medina
, Mario Piattini
:
Practical Approach of a Secure Management System based on ISO/IEC 17799. 585-592 - Gerd Saurer, Alexander Schatten:

Testing Complex Business Process Solutions. 593-600 - Jingde Cheng, Junichi Miura:

Deontic Relevant Logic as the Logical Basis for Specifying, Verifying, and Reasoning about Information Security and Information Assurance. 601-608 - Zude Li, Guoqiang Zhan, Xiaojun Ye:

Resource Management Continuity With Constraint Inheritance Relation. 609-616
Session 6: Availability
- José Daniel García

, Jesús Carretero
, Javier Fernández
, Félix García, David E. Singh, Alejandro Calderón:
On the Reliability of Web Clusters with Partial Replication of Contents. 617-624 - Syed M. Rizwan

, K. P. Ramachandran
:
Reliability Modeling Strategy of an Industrial System. 625-630 - Jingde Cheng:

Persistent Computing Systems as Continuously Available, Reliable, and Secure Systems. 631-638 - Christian Engelmann

, Stephen L. Scott, Chokchai Leangsuksun, Xubin (Ben) He:
Active/Active Replication for Highly Available HPC System Services. 639-645
Session 7: Software Security 1
- Erland Jonsson:

Towards an Integrated Conceptual Model of Security and Dependability. 646-653 - Daniel Mellado, Eduardo Fernández-Medina

, Mario Piattini
:
A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements. 654-661 - Walter Binder

:
Secure and Reliable Java-Based Middleware - Challenges and Solutions. 662-669
Session 8: Software Security 2
- Alfonso Rodríguez

, Eduardo Fernández-Medina
, Mario Piattini
:
Security Requirement with a UML 2.0 Profile. 670-677 - Rodolfo Villarroel

, Emilio Soler
, Eduardo Fernández-Medina
, Mario Piattini
, Juan Trujillo
:
Representing levels of abstraction to facilitate the Secure Multidimensional Modeling. 678-684 - Muhammad Alam, Ruth Breu, Michael Hafner:

Modeling permissions in a (U/X)ML world. 685-692
Session 9: Safety and Security
- E. M. Kelly, Lisa M. Bartlett:

Application of the Digraph Method in System Fault Diagnostics. 693-700 - Kenji Saito

, Eiichi Morino, Jun Murai:
No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies. 701-708
Session 10: E-commerce and E-Government
- Christian Schläger, Thomas Nowey, José A. Montenegro:

A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. 709-716 - Magdalena Payeras-Capellà

, Josep-Lluís Ferrer-Gomila
, Llorenç Huguet i Rotger:
Achieving Fairness and Timeliness in a Previous Electronic Contract Signing Protocol. 717-722 - Thomas Neubauer, Edgar R. Weippl, Stefan Biffl:

Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. 723-731
Workshop on Dependable and Sustainable Peer-to-Peer Systems (DAS-P2P 2006)
Session 1: Construction of Dependable Overlay Networks
- Barbara Emmert, Andreas Binzenhöfer:

Efficient Link Failure Detection and Localization using P2P-Overlay Networks. 732-739 - Matthew John Leslie, Jim Davies

, Todd Huffman:
Replication Strategies for Reliable Decentralised Storage. 740-747
Session 2: Security
- Yuuki Takano, Naoki Isozaki, Yoichi Shinoda:

Multipath Key Exchange on P2P Networks. 748-755 - Jochen Dinger, Hannes Hartenstein:

Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration. 756-763
Session 3: Social Front
- Kenji Saito

, Eiichi Morino, Jun Murai:
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems. 764-771 - Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Tomohiro Ishihara, Yojiro Uo:

Ecosystem of Naming Systems: Discussions on a Framework to Induce Smart Space Naming Systems Development. 772-778 - Hameeda Alshabib, Omer F. Rana

, Ali Shaikh Ali:
Deriving Ratings Through Social Network Structures. 779-787
Workshop on Bayesian Networks in Dependability (BND2006)
- Christophe Simon

, Philippe Weber
:
Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability Uncertainty. 788-793 - Sam Maes, Philippe Leray

:
Multi-Agent Causal Models for Dependability Analysis. 794-798 - Véronique Delcroix

, Mohamed-Amine Maalej, Sylvain Piechowiak:
Computing Multiple Diagnoses in Large Devices Using Bayesian Networks. 799-803 - Stefania Montani

, Luigi Portinale, Andrea Bobbio
, Daniele Codetta Raiteri
:
Automatically Translating Dynamic Fault Trees into Dynamic Bayesian Networks by Means of a Software Tool. 804-809 - Ashley Russell, John Quigley

, Robert Van der Meer
:
Modeling the Reliability of Search and Rescue Operations within the UK Through Bayesian Belief Networks. 810-816 - Martin Neil

, Manesh Tailor, Norman E. Fenton
, David Marquez, Peter Stewart Hearty:
Modeling Dependable Systems using Hybrid Bayesian Networks. 817-823
Workshop on Dependability in Large-scale Service-oriented Systems (DILSOS)
- Jaka Mocnik, Piotr Karwaczynski:

An Architecture for Service Discovery Based on Capability Matching. 824-831 - Alexander Böhm, Carl-Christian Kanne

, Guido Moerkotte:
A Declarative Control Language for Dependable XML Message Queues. 832-839 - Raman Kazhamiakin, Paritosh K. Pandya, Marco Pistore

:
Timed Modelling and Analysis in Web Service Compositions. 840-846 - Lukasz Juszczyk, Jaroslaw Lazowski, Schahram Dustdar

:
Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks. 847-854 - António Luís Sousa

, Alfrânio Correia Jr., Francisco Moura
, José Pereira
, Rui Oliveira
:
Evaluating Certification Protocols in the Partial Database State Machine. 855-863
Workshop: Security in E-Learning (SEL)
- Jordi Castellà-Roca

, Jordi Herrera-Joancomartí
, Aleix Dorca-Josa
:
A Secure E-Exam Management System. 864-871 - Elke Franz, Katrin Borcea-Pfitzmann:

Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects. 872-878 - Elke Franz, Hagen Wahrig, Alexander Böttcher, Katrin Borcea-Pfitzmann:

Access Control in a Privacy-Aware eLearning Environment. 879-886 - Carine G. Webber

, Maria de Fátima Webber do Prado Lima, Marcos E. Casa, Alexandre M. Ribeiro:
Adding Security to a Multiagent Learning Platform. 887-894 - Marek Hatala, Ty Mey Eap, Ashok Shah:

Unlocking Repositories: Federated Security Solution for Attribute and Policy Based Access to Repositories via Web Services. 895-903
Workshop - Dependability Aspects on Data WArehousing and Mining Applications (DAWAM 2006)
- Vasilis Aggelis:

Offline Internet Banking Fraud Detection. 904-905 - (Withdrawn) Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. 906-913

- Emilio Soler

, Rodolfo Villarroel
, Juan Trujillo
, Eduardo Fernández-Medina
, Mario Piattini
:
Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel. 914-921 - Agusti Solanas

, Antoni Martínez-Ballesté
, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz
:
A 2d-Tree-Based Blocking Method for Microaggregating Very Large Data Sets. 922-928 - Carsten Maple, Vitaly Schetinin:

Using A Bayesian Averaging Model for Estimating the Reliability of Decisions in Multimodal Biometrics. 929-935 - Marcin Gorawski, Karol Stachurski:

On Efficiency and Data Privacy Level of Association Rules Mining Algorithms within Parallel Spatial Data Warehouse. 936-943 - H. Michael Chung:

Dependability in Data Mining: A Perspective from the Cost of Making Decisions. 944-949
Workshop on Bioinformatics and Security (BIOS 06)
- Richard O. Sinnott

, Micha Bayer
, A. J. Stell, Jos Koetsier:
Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project. 950-957 - Carsten Maple, Peter Norrington

:
The Usability and Practicality of Biometric Authentication in the Workplace. 958-964 - Christophe Blanchet, Rémi Mollon, Gilbert Deléage:

Building an Encrypted File System on the EGEE grid: Application to Protein Sequence Analysis. 965-973
Workshop: Information Security Risk Management (ISRM)
- Christer Magnusson, Heidi Ola, Camilla Silversjo Holmqvist:

The knowledge pressure on Risk and Security managers is increasing. 974-979 - Ruedi Baer, Martin Dietrich:

Validation of IT-Security Measurement Tools. 980-981 - Sabine Delaître:

Risk Management approach on identity theft in biometric systems context. 982
Workshop - Dependability and Security in e-Government (DeSeGov 2006)
- Jeremy W. Bryans

, Bev Littlewood, Peter Y. A. Ryan
, Lorenzo Strigini:
E-voting: Dependability Requirements and Design for Dependability. 988-995 - Omar Batarfi, Lindsay F. Marshall

:
Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy. 996-1003 - Daniel Beer, Raphael Kunis, Gudula Rünger:

A Component Based Software Architecture for E-Government Applications. 1004-1011 - Akiko Orita

:
Designing mutual-aid model for RAQ (Rarely Asked Question) in e-Government: Practical use of anonymity. 1012-1016 - Rob Peters, Pim Jorg, Marco Meesters, Marcel Hoogwout, Edwin Stuart:

Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address. 1017-1024 - Carsten Maple, Helen Jacobs, Matthew Reeve:

Choosing the Right Wireless LAN Security Protocol for the Home and Business User. 1025-1032 - Maria Karyda

, Theodoros Balopoulos, Lazaros Gymnopoulos
, Spyros Kokolakis, Costas Lambrinoudakis
, Stefanos Gritzalis
, Stelios Dritsas:
An ontology for secure e-government applications. 1033-1037 - Semir Daskapan:

Building governments in e-government: settlement of trusted e-oligarchy. 1038-1044

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














