The SCEAS System
Navigation Menu

Conferences in DBLP

(IEEEares)
2009 (conf/IEEEares/2009)


  1. A Pluggable Domain Management Approach for Building Practical Distributed Coalitions. [Citation Graph (, )][DBLP]


  2. Retaining Data Control to the Client in Infrastructure Clouds. [Citation Graph (, )][DBLP]


  3. Workflows in Dynamic and Restricted Delegation. [Citation Graph (, )][DBLP]


  4. The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. [Citation Graph (, )][DBLP]


  5. Web Service Trust: Towards a Dynamic Assessment Framework. [Citation Graph (, )][DBLP]


  6. Security Requirements Specification in Service-Oriented Business Process Management. [Citation Graph (, )][DBLP]


  7. Quantitative Analysis of Secure Information Flow via Probabilistic Semantics. [Citation Graph (, )][DBLP]


  8. Deploying Security Policy in Intra and Inter Workflow Management Systems. [Citation Graph (, )][DBLP]


  9. An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents. [Citation Graph (, )][DBLP]


  10. Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. [Citation Graph (, )][DBLP]


  11. Server-Side Prediction of Source IP Addresses Using Density Estimation. [Citation Graph (, )][DBLP]


  12. Detecting Stepping-Stone Connection Using Association Rule Mining. [Citation Graph (, )][DBLP]


  13. Formal Analyses of Usage Control Policies. [Citation Graph (, )][DBLP]


  14. A First Step towards Characterizing Stealthy Botnets. [Citation Graph (, )][DBLP]


  15. Intrusion Process Modeling for Security Quantification. [Citation Graph (, )][DBLP]


  16. Different Approaches to In-House Identity Management - Justification of an Assumption. [Citation Graph (, )][DBLP]


  17. An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications. [Citation Graph (, )][DBLP]


  18. Revealing the Calling History of SIP VoIP Systems by Timing Attacks. [Citation Graph (, )][DBLP]


  19. The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime Data. [Citation Graph (, )][DBLP]


  20. A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising. [Citation Graph (, )][DBLP]


  21. On Equilibrium Distribution Properties in Software Reliability Modeling. [Citation Graph (, )][DBLP]


  22. An Analysis of Fault Effects and Propagations in AVR Microcontroller ATmega103(L). [Citation Graph (, )][DBLP]


  23. Blue Gene/L Log Analysis and Time to Interrupt Estimation. [Citation Graph (, )][DBLP]


  24. A New Approach for Implementing the MPL Method toward Higher SPA Resistance. [Citation Graph (, )][DBLP]


  25. On Privacy Preserving Convex Hull. [Citation Graph (, )][DBLP]


  26. Routing Protocol Security Using Symmetric Key Based Techniques. [Citation Graph (, )][DBLP]


  27. Prioritisation and Selection of Software Security Activities. [Citation Graph (, )][DBLP]


  28. BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. [Citation Graph (, )][DBLP]


  29. Enhancing Automated Detection of Vulnerabilities in Java Components. [Citation Graph (, )][DBLP]


  30. Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. [Citation Graph (, )][DBLP]


  31. Identifying and Resolving Least Privilege Violations in Software Architectures. [Citation Graph (, )][DBLP]


  32. A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases. [Citation Graph (, )][DBLP]


  33. Improving Reliability for Multi-home Inbound Traffic: MHLB/I Packet-Level Inter-domain Load-Balancing. [Citation Graph (, )][DBLP]


  34. Proactive Resource Management for Failure Resilient High Performance Computing Clusters. [Citation Graph (, )][DBLP]


  35. A Perceptron Neural Network for Asymmetric Comparison-Based System-Level Fault Diagnosis. [Citation Graph (, )][DBLP]


  36. Perfect Failure Detection in the Partitioned Synchronous Distributed System Model. [Citation Graph (, )][DBLP]


  37. Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols. [Citation Graph (, )][DBLP]


  38. Measuring Voter-Controlled Privacy. [Citation Graph (, )][DBLP]


  39. Generating User-Understandable Privacy Preferences. [Citation Graph (, )][DBLP]


  40. An Automatic Privacy Policy Agreement Checker for E-services. [Citation Graph (, )][DBLP]


  41. A Micro-FT-UART for Safety-Critical SoC-Based Applications. [Citation Graph (, )][DBLP]


  42. MixVM - An Approach to Service Isolation and Data Protection in Mobile Context-Sensitive Applications. [Citation Graph (, )][DBLP]


  43. On the Security of Untrusted Memory. [Citation Graph (, )][DBLP]


  44. Detecting Image Tampering Using Feature Fusion. [Citation Graph (, )][DBLP]


  45. SecMiLiA: An Approach in the Agent Protection. [Citation Graph (, )][DBLP]


  46. Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. [Citation Graph (, )][DBLP]


  47. Capturing Information Flow with Concatenated Dynamic Taint Analysis. [Citation Graph (, )][DBLP]


  48. Risk-Driven Architectural Decomposition. [Citation Graph (, )][DBLP]


  49. Reducing the Cost of Session Key Establishment. [Citation Graph (, )][DBLP]


  50. Accuracy: The Fundamental Requirement for Voting Systems. [Citation Graph (, )][DBLP]


  51. Reusable Security Requirements for Healthcare Applications. [Citation Graph (, )][DBLP]


  52. P2F: A User-Centric Privacy Protection Framework. [Citation Graph (, )][DBLP]


  53. Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001. [Citation Graph (, )][DBLP]


  54. Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. [Citation Graph (, )][DBLP]


  55. Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method. [Citation Graph (, )][DBLP]


  56. Building a Responsibility Model Including Accountability, Capability and Commitment. [Citation Graph (, )][DBLP]


  57. AVISPA in the Validation of Ambient Intelligence Scenarios. [Citation Graph (, )][DBLP]


  58. Security Evaluation of an Intrusion Tolerant System with MRSPNs. [Citation Graph (, )][DBLP]


  59. Algebraic Properties in Alice and Bob Notation. [Citation Graph (, )][DBLP]


  60. Scrubbing in Storage Virtualization Platform for Long-Term Backup Application. [Citation Graph (, )][DBLP]


  61. Fault Tolerant and Low Energy Write-Back Heterogeneous Set Associative Cache for DSM Technologies. [Citation Graph (, )][DBLP]


  62. Generating AMF Configurations from Software Vendor Constraints and User Requirements. [Citation Graph (, )][DBLP]


  63. Using XACML for Embedded and Fine-Grained Access Control Policy. [Citation Graph (, )][DBLP]


  64. A-COLD: Access Control of Web OLAP over Multi-data Warehouse. [Citation Graph (, )][DBLP]


  65. Package-Role Based Authorization Control Model for Wireless Network Services. [Citation Graph (, )][DBLP]


  66. Security Credential Mapping in Grids. [Citation Graph (, )][DBLP]


  67. A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. [Citation Graph (, )][DBLP]


  68. Security in Quantum Networks as an Optimization Problem. [Citation Graph (, )][DBLP]


  69. Finding Preimages of Multiple Passwords Secured with VSH. [Citation Graph (, )][DBLP]


  70. Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack. [Citation Graph (, )][DBLP]


  71. Generalized Robust Combiners for Oblivious Transfer. [Citation Graph (, )][DBLP]


  72. Including Security Rules Support in an MDA Approach for Secure DWs. [Citation Graph (, )][DBLP]


  73. A System of Privacy Preserving Distributed Spatial Data Warehouse Using Relation Decomposition. [Citation Graph (, )][DBLP]


  74. Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. [Citation Graph (, )][DBLP]


  75. Identity-Based Hybrid Signcryption. [Citation Graph (, )][DBLP]


  76. Towards Intrusion Detection for Encrypted Networks. [Citation Graph (, )][DBLP]


  77. A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation. [Citation Graph (, )][DBLP]


  78. Statistical Failure Analysis of a Web Server System. [Citation Graph (, )][DBLP]


  79. A Policy Framework for Data Management in Services Marketplaces. [Citation Graph (, )][DBLP]


  80. Modeling Misuse Patterns. [Citation Graph (, )][DBLP]


  81. Novel Algorithms for Subgroup Detection in Terrorist Networks. [Citation Graph (, )][DBLP]


  82. QR-TAN: Secure Mobile Transaction Authentication. [Citation Graph (, )][DBLP]


  83. An Authentication Watermark Algorithm for JPEG images. [Citation Graph (, )][DBLP]


  84. A New Watermarking Attack Using Long-Range Correlation Image Restoration. [Citation Graph (, )][DBLP]


  85. The Case for a Simpler Security Model in Grid Computing. [Citation Graph (, )][DBLP]


  86. Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots. [Citation Graph (, )][DBLP]


  87. Position Paper: Secure Infrastructure for Scientific Data Life Cycle Management. [Citation Graph (, )][DBLP]


  88. A Robust Image Watermarking Method in Wavelet Domain Using Genetic Algorithm. [Citation Graph (, )][DBLP]


  89. An Efficient Measurement of Object Oriented Design Vulnerability. [Citation Graph (, )][DBLP]


  90. FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408. [Citation Graph (, )][DBLP]


  91. Using Hybrid Trust Model for Handling Inaccurate Resource. [Citation Graph (, )][DBLP]


  92. A High Speed and Low Cost Error Correction Technique for the Carry Select Adder. [Citation Graph (, )][DBLP]


  93. An Improvement of REM: A Replication Oriented Event-Based Middleware. [Citation Graph (, )][DBLP]


  94. Advanced Flooding Attack on a SIP Server. [Citation Graph (, )][DBLP]


  95. State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia. [Citation Graph (, )][DBLP]


  96. An Inclusive Information Society Needs a Global Approach of Information Security. [Citation Graph (, )][DBLP]


  97. Measuring Peer-to-Peer Botnets Using Control Flow Stability. [Citation Graph (, )][DBLP]


  98. Regulatory Compliance and Information Security Assurance. [Citation Graph (, )][DBLP]


  99. Information Security Optimization: From Theory to Practice. [Citation Graph (, )][DBLP]


  100. Trusting User Defined Context in MANETs: Experience from the MIDAS Approach. [Citation Graph (, )][DBLP]


  101. Deconvolving Protected Signals. [Citation Graph (, )][DBLP]


  102. Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones. [Citation Graph (, )][DBLP]


  103. Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element. [Citation Graph (, )][DBLP]


  104. A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems. [Citation Graph (, )][DBLP]


  105. A New Approach for the Construction of Fault Trees from System Simulink. [Citation Graph (, )][DBLP]


  106. Estimating ToE Risk Level Using CVSS. [Citation Graph (, )][DBLP]


  107. Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. [Citation Graph (, )][DBLP]


  108. Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments. [Citation Graph (, )][DBLP]


  109. Standards-Based Cyber Exercises. [Citation Graph (, )][DBLP]


  110. Patterns to Support the Development of Privacy Policies. [Citation Graph (, )][DBLP]


  111. Multidimensional Management of Information Security - A Metrics Based Approach Merging Business and Information Security Topics. [Citation Graph (, )][DBLP]


  112. A Security Management Assurance Model to Holistically Assess the Information Security Posture. [Citation Graph (, )][DBLP]


  113. Methodology to Align Business and IT Policies: Use Case from an IT Company. [Citation Graph (, )][DBLP]


  114. On the Higher Order Nonlinearities of Boolean Functions and S-boxes. [Citation Graph (, )][DBLP]


  115. A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. [Citation Graph (, )][DBLP]


  116. A Standard MIDI File Steganography Based on Fluctuation of Duration. [Citation Graph (, )][DBLP]


  117. A Signature Scheme Associated with Universal Re-signcryption. [Citation Graph (, )][DBLP]


  118. Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument. [Citation Graph (, )][DBLP]


  119. A Reconfigurable-Permutation Algorithm for M_S-Box. [Citation Graph (, )][DBLP]


  120. Protecting Global and Static Variables from Buffer Overflow Attacks. [Citation Graph (, )][DBLP]


  121. Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter? [Citation Graph (, )][DBLP]


  122. hACMEgame: A Tool for Teaching Software Security. [Citation Graph (, )][DBLP]


  123. Towards Evaluation of Security Assurance during the Software Development Lifecycle. [Citation Graph (, )][DBLP]


  124. An Architectural Foundation for Security Model Sharing and Reuse. [Citation Graph (, )][DBLP]


  125. A Knowledge Management Approach to Support a Secure Software Development. [Citation Graph (, )][DBLP]


  126. A Practical Framework for the Dataflow Pointcut in AspectJ. [Citation Graph (, )][DBLP]


  127. SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. [Citation Graph (, )][DBLP]


  128. Linking Privacy Solutions to Developer Goals. [Citation Graph (, )][DBLP]


  129. Software Inspections Using Guided Checklists to Ensure Security Goals. [Citation Graph (, )][DBLP]


  130. Managing Rights and Value of Digital Media. [Citation Graph (, )][DBLP]


  131. A Criteria-Based Evaluation Framework for Authentication Schemes in IMS. [Citation Graph (, )][DBLP]


  132. The User-Centric Vision Matches Credentials Exchanges. [Citation Graph (, )][DBLP]


  133. Patient-Administered Access Control: A Usability Study. [Citation Graph (, )][DBLP]


  134. An Experimental System for Studying the Tradeoff between Usability and Security. [Citation Graph (, )][DBLP]


  135. Rank Swapping for Partial Orders and Continuous Variables. [Citation Graph (, )][DBLP]


  136. An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange. [Citation Graph (, )][DBLP]


  137. Security Analysis for P2P Routing Protocols. [Citation Graph (, )][DBLP]


  138. Secrecy Capacity of Wireless LAN. [Citation Graph (, )][DBLP]


  139. Privacy-Preserving Collaborative Filtering Schemes. [Citation Graph (, )][DBLP]


  140. A Framework for Understanding Botnets. [Citation Graph (, )][DBLP]


  141. Enterprise-Oriented Digital Rights Management Mechanism: eDRM. [Citation Graph (, )][DBLP]


  142. Utility and Risk of JPEG-Based Continuous Microdata Protection Methods. [Citation Graph (, )][DBLP]


  143. Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings. [Citation Graph (, )][DBLP]


  144. Yet Another Sanitizable Signature from Bilinear Maps. [Citation Graph (, )][DBLP]


  145. Generation of Prototypes for Masking Sequences of Events. [Citation Graph (, )][DBLP]


  146. Enhancing Control of Service Compositions in Service-Oriented Architectures. [Citation Graph (, )][DBLP]


  147. Truly Anonymous Paper Submission and Review Scheme. [Citation Graph (, )][DBLP]


  148. An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers. [Citation Graph (, )][DBLP]


  149. Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. [Citation Graph (, )][DBLP]


  150. Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems. [Citation Graph (, )][DBLP]


  151. An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information. [Citation Graph (, )][DBLP]


  152. Making Use of Human Visual Capability to Improve Information Security. [Citation Graph (, )][DBLP]


  153. Enhancement of Forensic Computing Investigations through Memory Forensic Techniques. [Citation Graph (, )][DBLP]


  154. Improving Performance in Digital Forensics: A Case Using Pattern Matching Board. [Citation Graph (, )][DBLP]


  155. Computer Forensics in Japan: A Preliminary Study. [Citation Graph (, )][DBLP]


  156. Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. [Citation Graph (, )][DBLP]


  157. A Post-Mortem Incident Modeling Method. [Citation Graph (, )][DBLP]


  158. Investigating the Implications of Virtual Machine Introspection for Digital Forensics. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002