Conferences in DBLP
(IEEEares) 2008 (conf/IEEEares/2008)
Securing Telehealth Applications in a Web-Based e-Health Portal. [Citation Graph (, )][DBLP ] Multi-Level Reputation-Based Greylisting. [Citation Graph (, )][DBLP ] Hardening XDS-Based Architectures. [Citation Graph (, )][DBLP ] Finding Evidence of Antedating in Digital Investigations. [Citation Graph (, )][DBLP ] FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program Interruption. [Citation Graph (, )][DBLP ] Economic and Security Aspects of Applying a Threshold Scheme in e-Health. [Citation Graph (, )][DBLP ] Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. [Citation Graph (, )][DBLP ] On the Possibility of Small, Service-Free Disk Based Storage Systems. [Citation Graph (, )][DBLP ] Efficient High Availability Commit Processing. [Citation Graph (, )][DBLP ] Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. [Citation Graph (, )][DBLP ] Towards Formal Specification of Abstract Security Properties. [Citation Graph (, )][DBLP ] A Behavioral Model of Ideologically-motivated Snowball Attacks. [Citation Graph (, )][DBLP ] Property Specification and Static Verification of UML Models. [Citation Graph (, )][DBLP ] Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. [Citation Graph (, )][DBLP ] A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. [Citation Graph (, )][DBLP ] A Database Replication Protocol Where Multicast Writesets Are Always Committed. [Citation Graph (, )][DBLP ] Matching Policies with Security Claims of Mobile Applications. [Citation Graph (, )][DBLP ] PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. [Citation Graph (, )][DBLP ] WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. [Citation Graph (, )][DBLP ] Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. [Citation Graph (, )][DBLP ] Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. [Citation Graph (, )][DBLP ] Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems. [Citation Graph (, )][DBLP ] Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology. [Citation Graph (, )][DBLP ] Defining Secure Business Processes with Respect to Multiple Objectives. [Citation Graph (, )][DBLP ] Analysis and Component-based Realization of Security Requirements. [Citation Graph (, )][DBLP ] A Framework for Detecting Anomalies in VoIP Networks. [Citation Graph (, )][DBLP ] Rapid Detection of Constant-Packet-Rate Flows. [Citation Graph (, )][DBLP ] Performance Analysis of Anonymous Communication Channels Provided by Tor. [Citation Graph (, )][DBLP ] Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets. [Citation Graph (, )][DBLP ] Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. [Citation Graph (, )][DBLP ] A Distributed Defense Framework for Flooding-Based DDoS Attacks. [Citation Graph (, )][DBLP ] Pure MPLS Technology. [Citation Graph (, )][DBLP ] Symmetric Active/Active Replication for Dependent Services. [Citation Graph (, )][DBLP ] Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. [Citation Graph (, )][DBLP ] A Cause-Based Approach to Preventing Software Vulnerabilities. [Citation Graph (, )][DBLP ] Integrating a Security Plug-in with the OpenUP/Basic Development Process. [Citation Graph (, )][DBLP ] A Novel Testbed for Detection of Malicious Software Functionality. [Citation Graph (, )][DBLP ] Type and Effect Annotations for Safe Memory Access in C. [Citation Graph (, )][DBLP ] Adaptabilty of a GP Based IDS on Wireless Networks. [Citation Graph (, )][DBLP ] An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. [Citation Graph (, )][DBLP ] Fuzzy Private Matching (Extended Abstract). [Citation Graph (, )][DBLP ] Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge. [Citation Graph (, )][DBLP ] Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. [Citation Graph (, )][DBLP ] Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. [Citation Graph (, )][DBLP ] CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. [Citation Graph (, )][DBLP ] Extending Mixed Serialisation Graphs to Replicated Environments. [Citation Graph (, )][DBLP ] Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. [Citation Graph (, )][DBLP ] Fuzzy Belief-Based Supervision. [Citation Graph (, )][DBLP ] Ensuring Progress in Amnesiac Replicated Systems. [Citation Graph (, )][DBLP ] Enhancing Face Recognition with Location Information. [Citation Graph (, )][DBLP ] A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors. [Citation Graph (, )][DBLP ] Defending On-Line Web Application Security with User-Behavior Surveillance. [Citation Graph (, )][DBLP ] A Pattern-Driven Security Process for SOA Applications. [Citation Graph (, )][DBLP ] Towards a Dependable Architecture for Highly Available Internet Services. [Citation Graph (, )][DBLP ] Assessing the Reliability and Cost of Web and Grid Orchestrations. [Citation Graph (, )][DBLP ] Application-Oriented Trust in Distributed Computing. [Citation Graph (, )][DBLP ] BlueTrust in a Real World. [Citation Graph (, )][DBLP ] Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles. [Citation Graph (, )][DBLP ] Privacy Protected ELF for Private Computing on Public Platforms. [Citation Graph (, )][DBLP ] haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism. [Citation Graph (, )][DBLP ] An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200. [Citation Graph (, )][DBLP ] A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case. [Citation Graph (, )][DBLP ] SPIT Detection and Prevention Method in VoIP Environment. [Citation Graph (, )][DBLP ] A New Approach to Analysis of Interval Availability. [Citation Graph (, )][DBLP ] SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol. [Citation Graph (, )][DBLP ] Fault Effects in FlexRay-Based Networks with Hybrid Topology. [Citation Graph (, )][DBLP ] Secure Wireless Sensor Networks. [Citation Graph (, )][DBLP ] SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] The Impact of Flooding Attacks on Network-based Services. [Citation Graph (, )][DBLP ] Managing Priorities in Atomic Multicast Protocols. [Citation Graph (, )][DBLP ] Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. [Citation Graph (, )][DBLP ] An End-to-End Security Solution for SCTP. [Citation Graph (, )][DBLP ] An Identity-Based Group Key Agreement Protocol from Pairing. [Citation Graph (, )][DBLP ] An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. [Citation Graph (, )][DBLP ] High Capacity Steganographic Method Based Upon JPEG. [Citation Graph (, )][DBLP ] Cluster-based Group Key Agreement for Wireless Ad hoc Networks. [Citation Graph (, )][DBLP ] A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. [Citation Graph (, )][DBLP ] RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks. [Citation Graph (, )][DBLP ] A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. [Citation Graph (, )][DBLP ] A Security Model and its Application to a Distributed Decision Support System for Healthcare. [Citation Graph (, )][DBLP ] Run-time Information Flow Monitoring based on Dynamic Dependence Graphs. [Citation Graph (, )][DBLP ] Automated Process Classi?cation Framework using SELinux Security Context. [Citation Graph (, )][DBLP ] Using Composition Policies to Manage Authentication and Authorization Patterns and Services. [Citation Graph (, )][DBLP ] Providing Fault Tolerance in Wireless Backhaul Network Design with Path Restoration. [Citation Graph (, )][DBLP ] Histogram Matrix: Log File Visualization for Anomaly Detection. [Citation Graph (, )][DBLP ] Context-based Profiling for Anomaly Intrusion Detection with Diagnosis. [Citation Graph (, )][DBLP ] A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection. [Citation Graph (, )][DBLP ] IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI. [Citation Graph (, )][DBLP ] Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. [Citation Graph (, )][DBLP ] NFC Devices: Security and Privacy. [Citation Graph (, )][DBLP ] Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessor. [Citation Graph (, )][DBLP ] Increasing the Performability of Computer Clusters Using RADIC II. [Citation Graph (, )][DBLP ] A Framework for Proactive Fault Tolerance. [Citation Graph (, )][DBLP ] Anti-DDoS Virtualized Operating System. [Citation Graph (, )][DBLP ] A Case for High Availability in a Virtualized Environment (HAVEN). [Citation Graph (, )][DBLP ] A Federated Physical and Logical Access Control Enforcement Model. [Citation Graph (, )][DBLP ] Fostering the Uptake of Secure Multiparty Computation in E-Commerce. [Citation Graph (, )][DBLP ] Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols. [Citation Graph (, )][DBLP ] Avoiding Policy-based Deadlocks in Business Processes. [Citation Graph (, )][DBLP ] A Secure High-Speed Identification Scheme for RFID Using Bloom Filters. [Citation Graph (, )][DBLP ] New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. [Citation Graph (, )][DBLP ] Privacy-preserving Protocols for Finding the Convex Hulls. [Citation Graph (, )][DBLP ] A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. [Citation Graph (, )][DBLP ] Cryptographic Properties of Second-Order Memory Elementary Cellular Automata. [Citation Graph (, )][DBLP ] New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group. [Citation Graph (, )][DBLP ] Intensive Programme on Information and Communication Security. [Citation Graph (, )][DBLP ] Applications for IT-Risk Management Requirements and Practical Evaluation. [Citation Graph (, )][DBLP ] Security Analysis of Role-based Separation of Duty with Workflows. [Citation Graph (, )][DBLP ] Detecting Suspicious Relational Database Queries. [Citation Graph (, )][DBLP ] Assessing the Value of Enterprise Identity Management (EIdM) Towards a Generic Evaluation Approach. [Citation Graph (, )][DBLP ] An Ontological Approach to Secure MANET Management. [Citation Graph (, )][DBLP ] Reliability Analysis using Graphical Duration Models. [Citation Graph (, )][DBLP ] From Omega to ?P in the Crash-Recovery Failure Model with Unknown Membership. [Citation Graph (, )][DBLP ] Policy-based Group Organizational Structure Management using an Ontological Approach. [Citation Graph (, )][DBLP ] A Systematic Review and Comparison of Security Ontologies. [Citation Graph (, )][DBLP ] Context Ontology for Secure Interoperability. [Citation Graph (, )][DBLP ] On the Security of VSH in Password Schemes. [Citation Graph (, )][DBLP ] Sustaining Web Services High-Availability Using Communities. [Citation Graph (, )][DBLP ] Distributed Information Retrieval Service for Ubiquitous Services. [Citation Graph (, )][DBLP ] A Lightweight Security Analyzer inside GCC. [Citation Graph (, )][DBLP ] Dynamic Maintenance of Software Systems at Runtime. [Citation Graph (, )][DBLP ] Software Security; A Vulnerability Activity Revisit. [Citation Graph (, )][DBLP ] Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations. [Citation Graph (, )][DBLP ] A Survey on Trust and Reputation Schemes in Ad Hoc Networks. [Citation Graph (, )][DBLP ] Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. [Citation Graph (, )][DBLP ] Detecting Bots Based on Keylogging Activities. [Citation Graph (, )][DBLP ] A Comprehensive Approach for Context-dependent Privacy Management. [Citation Graph (, )][DBLP ] Traceable Quantitative Risk Assessment Applied to Investment Decision for Local Backups. [Citation Graph (, )][DBLP ] Quantitative Assessment of Enterprise Security System. [Citation Graph (, )][DBLP ] Clustering Oriented Architectures in Medical Sensor Environments. [Citation Graph (, )][DBLP ] An Initial Model and a Discussion of Access Control in Patient Controlled Health Records. [Citation Graph (, )][DBLP ] Secure Team-Based EPR Access Acquisition in Wireless Networks. [Citation Graph (, )][DBLP ] VEA-bility Security Metric: A Network Security Analysis Tool. [Citation Graph (, )][DBLP ] Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments. [Citation Graph (, )][DBLP ] GOST-28147 Encryption Implementation on Graphics Processing Units. [Citation Graph (, )][DBLP ] Intelligent Video Surveillance Networks: Data Protection Challenges. [Citation Graph (, )][DBLP ] Intrusion Detection with Data Correlation Relation Graph. [Citation Graph (, )][DBLP ] A Critique of k-Anonymity and Some of Its Enhancements. [Citation Graph (, )][DBLP ] Cluster-Specific Information Loss Measures in Data Privacy: A Review. [Citation Graph (, )][DBLP ] Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. [Citation Graph (, )][DBLP ] Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach. [Citation Graph (, )][DBLP ] Using Non-adaptive Group Testing to Construct Spy Agent Routes. [Citation Graph (, )][DBLP ] A Bayesian Approach for on-Line Max Auditing. [Citation Graph (, )][DBLP ] Detection of Malcodes by Packet Classification. [Citation Graph (, )][DBLP ] Performance of a Strategy Based Packets Forwarding in Ad Hoc Networks. [Citation Graph (, )][DBLP ] Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy. [Citation Graph (, )][DBLP ] AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes. [Citation Graph (, )][DBLP ] A Post-processing Method to Lessen k-Anonymity Dissimilarities. [Citation Graph (, )][DBLP ] Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols. [Citation Graph (, )][DBLP ] A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set. [Citation Graph (, )][DBLP ] Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries. [Citation Graph (, )][DBLP ] Secure and Privacy-Friendly Logging for eGovernment Services. [Citation Graph (, )][DBLP ] The REM Framework for Security Evaluation. [Citation Graph (, )][DBLP ] Static Validation of Licence Conformance Policies. [Citation Graph (, )][DBLP ] Towards Practical Security Monitors of UML Policies for Mobile Applications. [Citation Graph (, )][DBLP ] Synthesis of Local Controller Programs for Enforcing Global Security Properties. [Citation Graph (, )][DBLP ] Weighted Datalog and Levels of Trust. [Citation Graph (, )][DBLP ] Negotiation of Usage Control Policies - Simply the Best? [Citation Graph (, )][DBLP ] Security Requirement Engineering at a Telecom Provider. [Citation Graph (, )][DBLP ] Identifying Security Aspects in Early Development Stages. [Citation Graph (, )][DBLP ] Using Security Patterns to Combine Security Metrics. [Citation Graph (, )][DBLP ] Secure Software Design in Practice. [Citation Graph (, )][DBLP ] Covering Your Assets in Software Engineering. [Citation Graph (, )][DBLP ] A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. [Citation Graph (, )][DBLP ] Towards Incorporating Discrete-Event Systems in Secure Software Development. [Citation Graph (, )][DBLP ] How to Open a File and Not Get Hacked. [Citation Graph (, )][DBLP ] Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of Rules. [Citation Graph (, )][DBLP ] Adaptive Data Integrity through Dynamically Redundant Data Structures. [Citation Graph (, )][DBLP ] ISEDS: An Information Security Engineering Database System Based on ISO Standards. [Citation Graph (, )][DBLP ] Privacy Aspects of eHealth. [Citation Graph (, )][DBLP ] Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks. [Citation Graph (, )][DBLP ] Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. [Citation Graph (, )][DBLP ] Implementing Multidimensional Security into OLAP Tools. [Citation Graph (, )][DBLP ] Detecting Key Players in 11-M Terrorist Network: A Case Study. [Citation Graph (, )][DBLP ] Privacy Preserving Support Vector Machines in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] An Image Encryption System by Cellular Automata with Memory. [Citation Graph (, )][DBLP ] Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. [Citation Graph (, )][DBLP ] Internet Observation with ISDAS: How Long Does a Worm Perform Scanning? [Citation Graph (, )][DBLP ] Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes. [Citation Graph (, )][DBLP ] Enocoro-80: A Hardware Oriented Stream Cipher. [Citation Graph (, )][DBLP ] Cryptanalysis and Improvement of an Improved Remote Authentication Scheme with Smart Card. [Citation Graph (, )][DBLP ] Effective Monitoring of a Survivable Distributed Networked Information System. [Citation Graph (, )][DBLP ] Design of an FDB based Intra-domain Packet Traceback System. [Citation Graph (, )][DBLP ] An Independent Evaluation of Web Timing Attack and its Countermeasure. [Citation Graph (, )][DBLP ] Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks. [Citation Graph (, )][DBLP ] Privacy-Preserving Distributed Set Intersection. [Citation Graph (, )][DBLP ] Examination of Forwarding Obstruction Attacks in Structured Overlay Networks. [Citation Graph (, )][DBLP ] A Novel Approach for Multiplication over GF(2m) in Polynomial Basis Representation. [Citation Graph (, )][DBLP ] Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. [Citation Graph (, )][DBLP ] Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. [Citation Graph (, )][DBLP ] Recovery of Encryption Keys from Memory Using a Linear Scan. [Citation Graph (, )][DBLP ] Proposal for Efficient Searching and Presentation in Digital Forensics. [Citation Graph (, )][DBLP ] Secure Steganography in Compressed Video Bitstreams. [Citation Graph (, )][DBLP ] Considerations Towards a Cyber Crime Profiling System. [Citation Graph (, )][DBLP ] Alignment of Misuse Cases with Security Risk Management. [Citation Graph (, )][DBLP ] Information Stream Based Model for Organizing Security. [Citation Graph (, )][DBLP ] Security Requirements Variability for Software Product Lines. [Citation Graph (, )][DBLP ] Transforming Security Requirements into Architecture. [Citation Graph (, )][DBLP ] Modelling Security Properties in a Grid-based Operating System with Anti-Goals. [Citation Graph (, )][DBLP ] Annotating Regulations Using Cerno: An Application to Italian Documents - Extended Abstract. [Citation Graph (, )][DBLP ] Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements. [Citation Graph (, )][DBLP ] Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract). [Citation Graph (, )][DBLP ]