default search action
7. ARES 2012: Prague, Czech Republic
- Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2244-7
Full Papers
Security as Quality Property
- Jason L. Wright, Miles McQueen, Lawrence Wellman:
Analyses of Two End-User Software Vulnerability Exposure Metrics. 1-10 - Yue Ma, Wei Jiang, Nan Sang, Ziguo Zhong:
An Adaptive Risk Control and Security Management for Embedded Real-Time System. 11-17 - Mourad Elhadef:
Using Linear Support Vector Machines to Solve the Asymmetric Comparison-Based Fault Diagnosis Problem. 18-27
Aspects of Privacy
- Stanislaus Stelle, Mark Manulis, Matthias Hollick:
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach. 28-37 - Thomas Plos, Christian Maierhofer:
On Measuring the Parasitic Backscatter of Sensor-Enabled UHF RFID Tags. 38-46 - Raja Khurram Shahzad, Niklas Lavesson:
Veto-based Malware Detection. 47-54
Cryptography
- Noura Al Ebri, Joonsang Baek, Abdulhadi Shoufan, Quang Hieu Vu:
Efficient Generic Construction of Forward-Secure Identity-Based Signature. 55-64 - David Cadé, Bruno Blanchet:
From Computationally-proved Protocol Specifications to Implementations. 65-74 - Amir Herzberg, Haya Schulmann:
Oblivious and Fair Server-Aided Two-Party Computation. 75-84
Privacy Enhancing Technologies
- Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. 85-93 - Stefan Rass, Peter Schartner, Raphael Wigoutschnigg, Christian Kollmitzer:
Anonymous Communication by Branch-and-Bound. 94-102 - Moritz Riesner, Michael Netter, Günther Pernul:
An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites. 103-112
Authorization and Authentication
- Anne Baumgrass, Mark Strembeck:
An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides. 113-122 - Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro:
Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications. 123-132 - Stefan Craß, Tobias Dönz, Gerson Joskowicz, Eva Kühn:
A Coordination-Driven Authorization Framework for Space Containers. 133-142
Short Papers
Software Security
- Rui Wu, Ping Chen, Bing Mao, Li Xie:
RIM: A Method to Defend from JIT Spraying Attack. 143-148 - Anja Strunk, Marc Mosch, Stephan Groß, Yvonne Thoß, Alexander Schill:
Building a Flexible Service Architecture for User Controlled Hybrid Clouds. 149-154 - Marijke Coetzee:
Towards a Holistic Information Security Governance Framework for SOA. 155-160
Security and Usability
- Bernard Stepien, Stan Matwin, Amy P. Felty:
An Algorithm for Compression of XACML Access Control Policy Sets by Recursive Subsumption. 161-167 - Anton Borg, Niklas Lavesson:
E-mail Classification Using Social Network Information. 168-173 - Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain:
Two-Pronged Phish Snagging. 174-179
Security in Electronic Services and Mobile Services
- Stephan Neumann, Melanie Volkamer:
Civitas and the Real World: Problems and Solutions from a Practical Point of View. 180-185 - Ali Fawzi Najm Al-Shammari, Adolfo Villafiorita, Komminist Weldemariam:
Understanding the Development Trends of Electronic Voting Systems. 186-195 - Federico Mancini, Samson Gejibo, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr:
Secure Mobile Data Collection Systems for Low-Budget Settings. 196-205
Security Control
- Jean Michel Combes, Ghada Arfaoui, Maryline Laurent:
Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration Context. 206-211 - Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone:
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. 212-217 - Zonghua Zhang, Shuzhen Wang:
Boosting Logical Attack Graph for Efficient Security Control. 218-223 - Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande:
High Level Model of Control Flow Attacks for Smart Card Functional Security. 224-229
Security Studies
- Jostein Jensen:
Federated Identity Management Challenges. 230-235 - Amanda Sávio Nascimento, Fernando Castor, Cecília M. F. Rubira, Rachel Burrows:
An Empirical Study on Design Diversity of Functionally Equivalent Web Services. 236-241 - Kristian Beckers, Stephan Faßbender, Maritta Heisel, Holger Schmidt:
Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation. 242-248
Network Analysis and Security
- Amine Belabed, Esma Aïmeur, Mohammed Amine Chikh:
A Personalized Whitelist Approach for Phishing Webpage Detection. 249-254 - Christian Winter, Markus Schneider, York Yannikos:
Model-Based Digit Analysis for Fraud Detection Overcomes Limitations of Benford Analysis. 255-261 - Amir Herzberg, Haya Schulmann:
Antidotes for DNS Poisoning by Off-Path Adversaries. 262-267
Cloud Security and Analysis
- Itziar Arrieta-Salinas, José Enrique Armendáriz-Iñigo, Joan Navarro:
Classic Replication Techniques on the Cloud. 268-273 - Thanadech Thanakornworakij, Raja Nassar, Chokchai Leangsuksun, Mihaela Paun:
An Economic Model for Maximizing Profit of a Cloud Service Provider. 274-279 - Thomas Ludescher, Thomas Feilhauer, Peter Brezany:
Security Concept and Implementation for a Cloud Based E-science Infrastructure. 280-285
Seventh International Workshop on Frontiers in Availability, Reliability, and Security (FARES 2012)
Risk Assessment, Security Measurement, and Embedded Security
- Marianne Azer, Ahmed Shaker, Sherif Nagy, Ahmed Raafat, Mohamad M. Abuzaid:
Organizational Risk Assessment Based on Attacks Repetition. 286-290 - Manuel Rudolph, Reinhard Schwarz:
A Critical Survey of Security Indicator Approaches. 291-300 - Hossein Khezripour, Saadat Pourmozaffari:
Fault Tolerance and Power Consumption Analysis on Chip-Multi Processors Architectures. 301-306
Privacy
- Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr:
A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems. 307-316 - Karin Bernsmed, Inger Anne Tøndel, Åsmund Ahlmann Nyre:
Design and Implementation of a CBR-based Privacy Agent. 317-326 - Kirsi Helkala:
Disabilities and Authentication Methods: Usability and Security. 327-334 - Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci:
Privacy Policy Preferences Enforced by SPARQL Query Rewriting. 335-342
Cloud Computing and Social Networks
- Canh Ngo, Peter Membrey, Yuri Demchenko, Cees de Laat:
Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud Infrastructures. 343-349 - Peter Membrey, Keith C. C. Chan, Canh Ngo, Yuri Demchenko, Cees de Laat:
Trusted Virtual Infrastructure Bootstrapping for On Demand Services. 350-357 - Hoang-Quoc Nguyen-Son, Quoc-Binh Nguyen, Minh-Triet Tran, Dinh-Thuc Nguyen, Hiroshi Yoshiura, Isao Echizen:
Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure. 358-364
First International Workshop on Security of Mobile Applications (IWSMA 2012)
- Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui, Maryline Laurent:
E2E: An Optimized IPsec Architecture for Secure and Fast Offload. 365-374 - Lin Yao, Chi Lin, Guangya Liu, Fangyu Deng, Guowei Wu:
Location Anonymity Based on Fake Queries in Continuous Location-Based Services. 375-382 - Mohamad M. Abuzaid, Marianne A. Azer:
Janitor, Certificate and Jury (JCJ) Trust Scheme for Wireless Ad-hoc Networks. 383-387 - Pascal Berthomé, Thomas Fécherolle, Nicolas Guilloteau, Jean-François Lalande:
Repackaging Android Applications for Auditing Access to Private Data. 388-396
First International Workshop on Modern Cryptography and Security Engineering (MoCrySEN 2012)
Modern Cryptography
- Aleksandar Kircanski, Amr M. Youssef:
On the Weak State in GGHN-like Ciphers. 397-401
Security Engineering
- Abdel Alim Kamal, Amr M. Youssef:
A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem. 402-409 - Anca Jurcut, Tom Coffey, Reiner Dojen:
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks. 410-416 - Nan Guo, Tianhan Gao, Bin Zhang:
BPVrfy: Hybrid Cryptographic Scheme Based - Federate Identity Attributes Verification Model for Business Processes. 417-424
Fourth International Workshop on Organizational Security Aspects (OSA 2012)
- Juhani Anttila, Kari Jussila, Jorma Kajava, Ilkka Kamaja:
Integrating ISO/IEC 27001 and other Managerial Discipline Standards with Processes of Management in Organizations. 425-436 - Ali Fawzi Najm Al-Shammari, Adolfo Villafiorita, Komminist Weldemariam:
Towards an Open Standard Vote Verification Framework in Electronic Voting Systems. 437-444 - Wen Zeng, Kaiyu Liu:
Sensitivity Analysis of Loss of Corporate Efficiency and Productivity Associated with Enterprise DRM Technology. 445-453 - Elmar Kiesling, Christine Strauss, Christian Stummer:
A Multi-objective Decision Support Framework for Simulation-Based Security Control Selection. 454-462
Second International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2012)
On Security and Patterns
- Kristian Beckers, Stephan Faßbender, Holger Schmidt:
An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example. 463-472 - Midori Hirose, Akira Utsumi, Isao Echizen, Hiroshi Yoshiura:
A Private Information Detector for Controlling Circulation of Private Information through Social Networks. 473-478
On Isolation and Secure Systems
- Baozeng Ding, Yanjun Wu, Yeping He, Shuo Tian, Bei Guan, Guowei Wu:
Return-Oriented Programming Attack on the Xen Hypervisor. 479-484 - Kristian Beckers, Stephan Faßbender:
Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and Performance. 485-494 - Tomoko Kajiyama, Isao Echizen:
Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites. 495-498
First International Workshop on Security Ontologies and Taxonomies (SecOnT 2012)
Knowledge Base Development
- Widura Schwittek, Holger Schmidt, Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel:
A Common Body of Knowledge for Engineering Secure Software and Services. 499-506 - David A. Mundie, Robin Ruefle:
Building an Incident Management Body of Knowledge. 507-513 - Daniel Feledi, Stefan Fenz:
Challenges of Web-Based Information Security Knowledge Sharing. 514-521
Applications
- Lee V. Mangold:
Using Ontologies for Adaptive Information Security Training. 522-524 - Stefania D'Agostini, Valentina Di Giacomo, Claudia Pandolfo, Domenico Presenza:
An Ontology for Run-Time Verification of Security Certificates for SOA. 525-533 - Henk Birkholz, Ingo Sieverdingbeck, Karsten Sohr, Carsten Bormann:
IO: An Interconnected Asset Ontology in Support of Risk Management Processes. 534-541
Sixth International Workshop on Secure Software Engineering (SecSE 2012)
Threats and Approaches
- Per Håkon Meland, Erlend Andreas Gjære:
Representing Threats in BPMN 2.0. 542-550 - Jean Dubreuil, Guillaume Bouffard, Jean-Louis Lanet, Julien Cartigny:
Type Classification against Fault Enabled Mutant in Java Based Smart Card. 551-556 - Mark M. Seeger, Stephen D. Wolthusen:
Towards Concurrent Data Sampling Using GPU Coprocessing. 557-563
Taxonomies and Comparisons
- Horia V. Corcalciuc:
A Taxonomy of Time and State Attacks. 564-573 - Kristian Beckers:
Comparing Privacy Requirements Engineering Approaches. 574-581 - Aleem Khalid Alvi, Mohammad Zulkernine:
A Comparative Study of Software Security Pattern Classifications. 582-589
Fifth International Workshop on Digital Forensics (WSDF 2012)
Theoretical Methods and Statistics for Forensics
- Richard E. Overill, Jantje A. M. Silomon:
Uncertainty Bounds for Digital Forensic Evidence and Hypotheses. 590-595 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Using Attack Graphs in Forensic Examinations. 596-603 - Mateus de Castro Polastro, Pedro Monteiro da Silva Eleuterio:
A Statistical Approach for Identifying Videos of Child Pornography at Crime Scenes. 604-612
Applied Forensics and Data Generation
- York Yannikos, Christian Winter, Markus Schneider:
Synthetic Data Creation for Forensic Tool Testing: Improving Performance of the 3LSPG Framework. 613-619 - Steffen Logen, Hans Höfken, Marko Schuba:
Simplifying RAM Forensics: A GUI and Extensions for the Volatility Framework. 620-624 - Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. 625-633
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.