The SCEAS System
Navigation Menu

Conferences in DBLP

2008 (conf/IEEEares/2008)

  1. Securing Telehealth Applications in a Web-Based e-Health Portal. [Citation Graph (, )][DBLP]

  2. Multi-Level Reputation-Based Greylisting. [Citation Graph (, )][DBLP]

  3. Hardening XDS-Based Architectures. [Citation Graph (, )][DBLP]

  4. Finding Evidence of Antedating in Digital Investigations. [Citation Graph (, )][DBLP]

  5. FEDC: Control Flow Error Detection and Correction for Embedded Systems without Program Interruption. [Citation Graph (, )][DBLP]

  6. Economic and Security Aspects of Applying a Threshold Scheme in e-Health. [Citation Graph (, )][DBLP]

  7. Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. [Citation Graph (, )][DBLP]

  8. On the Possibility of Small, Service-Free Disk Based Storage Systems. [Citation Graph (, )][DBLP]

  9. Efficient High Availability Commit Processing. [Citation Graph (, )][DBLP]

  10. Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. [Citation Graph (, )][DBLP]

  11. Towards Formal Specification of Abstract Security Properties. [Citation Graph (, )][DBLP]

  12. A Behavioral Model of Ideologically-motivated “Snowball” Attacks. [Citation Graph (, )][DBLP]

  13. Property Specification and Static Verification of UML Models. [Citation Graph (, )][DBLP]

  14. Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. [Citation Graph (, )][DBLP]

  15. A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. [Citation Graph (, )][DBLP]

  16. A Database Replication Protocol Where Multicast Writesets Are Always Committed. [Citation Graph (, )][DBLP]

  17. Matching Policies with Security Claims of Mobile Applications. [Citation Graph (, )][DBLP]

  18. PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. [Citation Graph (, )][DBLP]

  19. WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. [Citation Graph (, )][DBLP]

  20. Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. [Citation Graph (, )][DBLP]

  21. Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. [Citation Graph (, )][DBLP]

  22. Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems. [Citation Graph (, )][DBLP]

  23. Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology. [Citation Graph (, )][DBLP]

  24. Defining Secure Business Processes with Respect to Multiple Objectives. [Citation Graph (, )][DBLP]

  25. Analysis and Component-based Realization of Security Requirements. [Citation Graph (, )][DBLP]

  26. A Framework for Detecting Anomalies in VoIP Networks. [Citation Graph (, )][DBLP]

  27. Rapid Detection of Constant-Packet-Rate Flows. [Citation Graph (, )][DBLP]

  28. Performance Analysis of Anonymous Communication Channels Provided by Tor. [Citation Graph (, )][DBLP]

  29. Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets. [Citation Graph (, )][DBLP]

  30. Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. [Citation Graph (, )][DBLP]

  31. A Distributed Defense Framework for Flooding-Based DDoS Attacks. [Citation Graph (, )][DBLP]

  32. Pure MPLS Technology. [Citation Graph (, )][DBLP]

  33. Symmetric Active/Active Replication for Dependent Services. [Citation Graph (, )][DBLP]

  34. Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. [Citation Graph (, )][DBLP]

  35. A Cause-Based Approach to Preventing Software Vulnerabilities. [Citation Graph (, )][DBLP]

  36. Integrating a Security Plug-in with the OpenUP/Basic Development Process. [Citation Graph (, )][DBLP]

  37. A Novel Testbed for Detection of Malicious Software Functionality. [Citation Graph (, )][DBLP]

  38. Type and Effect Annotations for Safe Memory Access in C. [Citation Graph (, )][DBLP]

  39. Adaptabilty of a GP Based IDS on Wireless Networks. [Citation Graph (, )][DBLP]

  40. An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. [Citation Graph (, )][DBLP]

  41. Fuzzy Private Matching (Extended Abstract). [Citation Graph (, )][DBLP]

  42. Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge. [Citation Graph (, )][DBLP]

  43. Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. [Citation Graph (, )][DBLP]

  44. Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. [Citation Graph (, )][DBLP]

  45. CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. [Citation Graph (, )][DBLP]

  46. Extending Mixed Serialisation Graphs to Replicated Environments. [Citation Graph (, )][DBLP]

  47. Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. [Citation Graph (, )][DBLP]

  48. Fuzzy Belief-Based Supervision. [Citation Graph (, )][DBLP]

  49. Ensuring Progress in Amnesiac Replicated Systems. [Citation Graph (, )][DBLP]

  50. Enhancing Face Recognition with Location Information. [Citation Graph (, )][DBLP]

  51. A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors. [Citation Graph (, )][DBLP]

  52. Defending On-Line Web Application Security with User-Behavior Surveillance. [Citation Graph (, )][DBLP]

  53. A Pattern-Driven Security Process for SOA Applications. [Citation Graph (, )][DBLP]

  54. Towards a Dependable Architecture for Highly Available Internet Services. [Citation Graph (, )][DBLP]

  55. Assessing the Reliability and Cost of Web and Grid Orchestrations. [Citation Graph (, )][DBLP]

  56. Application-Oriented Trust in Distributed Computing. [Citation Graph (, )][DBLP]

  57. BlueTrust in a Real World. [Citation Graph (, )][DBLP]

  58. Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles. [Citation Graph (, )][DBLP]

  59. Privacy Protected ELF for Private Computing on Public Platforms. [Citation Graph (, )][DBLP]

  60. haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism. [Citation Graph (, )][DBLP]

  61. An Improved Zonal Safety Analysis Method and Its Application on Aircraft CRJ200. [Citation Graph (, )][DBLP]

  62. A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case. [Citation Graph (, )][DBLP]

  63. SPIT Detection and Prevention Method in VoIP Environment. [Citation Graph (, )][DBLP]

  64. A New Approach to Analysis of Interval Availability. [Citation Graph (, )][DBLP]

  65. SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol. [Citation Graph (, )][DBLP]

  66. Fault Effects in FlexRay-Based Networks with Hybrid Topology. [Citation Graph (, )][DBLP]

  67. Secure Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  68. SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  69. The Impact of Flooding Attacks on Network-based Services. [Citation Graph (, )][DBLP]

  70. Managing Priorities in Atomic Multicast Protocols. [Citation Graph (, )][DBLP]

  71. Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. [Citation Graph (, )][DBLP]

  72. An End-to-End Security Solution for SCTP. [Citation Graph (, )][DBLP]

  73. An Identity-Based Group Key Agreement Protocol from Pairing. [Citation Graph (, )][DBLP]

  74. An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. [Citation Graph (, )][DBLP]

  75. High Capacity Steganographic Method Based Upon JPEG. [Citation Graph (, )][DBLP]

  76. Cluster-based Group Key Agreement for Wireless Ad hoc Networks. [Citation Graph (, )][DBLP]

  77. A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. [Citation Graph (, )][DBLP]

  78. RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks. [Citation Graph (, )][DBLP]

  79. A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. [Citation Graph (, )][DBLP]

  80. A Security Model and its Application to a Distributed Decision Support System for Healthcare. [Citation Graph (, )][DBLP]

  81. Run-time Information Flow Monitoring based on Dynamic Dependence Graphs. [Citation Graph (, )][DBLP]

  82. Automated Process Classi?cation Framework using SELinux Security Context. [Citation Graph (, )][DBLP]

  83. Using Composition Policies to Manage Authentication and Authorization Patterns and Services. [Citation Graph (, )][DBLP]

  84. Providing Fault Tolerance in Wireless Backhaul Network Design with Path Restoration. [Citation Graph (, )][DBLP]

  85. Histogram Matrix: Log File Visualization for Anomaly Detection. [Citation Graph (, )][DBLP]

  86. Context-based Profiling for Anomaly Intrusion Detection with Diagnosis. [Citation Graph (, )][DBLP]

  87. A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection. [Citation Graph (, )][DBLP]

  88. IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI. [Citation Graph (, )][DBLP]

  89. Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. [Citation Graph (, )][DBLP]

  90. NFC Devices: Security and Privacy. [Citation Graph (, )][DBLP]

  91. Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessor. [Citation Graph (, )][DBLP]

  92. Increasing the Performability of Computer Clusters Using RADIC II. [Citation Graph (, )][DBLP]

  93. A Framework for Proactive Fault Tolerance. [Citation Graph (, )][DBLP]

  94. Anti-DDoS Virtualized Operating System. [Citation Graph (, )][DBLP]

  95. A Case for High Availability in a Virtualized Environment (HAVEN). [Citation Graph (, )][DBLP]

  96. A Federated Physical and Logical Access Control Enforcement Model. [Citation Graph (, )][DBLP]

  97. Fostering the Uptake of Secure Multiparty Computation in E-Commerce. [Citation Graph (, )][DBLP]

  98. Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols. [Citation Graph (, )][DBLP]

  99. Avoiding Policy-based Deadlocks in Business Processes. [Citation Graph (, )][DBLP]

  100. A Secure High-Speed Identification Scheme for RFID Using Bloom Filters. [Citation Graph (, )][DBLP]

  101. New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. [Citation Graph (, )][DBLP]

  102. Privacy-preserving Protocols for Finding the Convex Hulls. [Citation Graph (, )][DBLP]

  103. A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. [Citation Graph (, )][DBLP]

  104. Cryptographic Properties of Second-Order Memory Elementary Cellular Automata. [Citation Graph (, )][DBLP]

  105. New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group. [Citation Graph (, )][DBLP]

  106. Intensive Programme on Information and Communication Security. [Citation Graph (, )][DBLP]

  107. Applications for IT-Risk Management – Requirements and Practical Evaluation. [Citation Graph (, )][DBLP]

  108. Security Analysis of Role-based Separation of Duty with Workflows. [Citation Graph (, )][DBLP]

  109. Detecting Suspicious Relational Database Queries. [Citation Graph (, )][DBLP]

  110. Assessing the Value of Enterprise Identity Management (EIdM) – Towards a Generic Evaluation Approach. [Citation Graph (, )][DBLP]

  111. An Ontological Approach to Secure MANET Management. [Citation Graph (, )][DBLP]

  112. Reliability Analysis using Graphical Duration Models. [Citation Graph (, )][DBLP]

  113. From Omega to ?P in the Crash-Recovery Failure Model with Unknown Membership. [Citation Graph (, )][DBLP]

  114. Policy-based Group Organizational Structure Management using an Ontological Approach. [Citation Graph (, )][DBLP]

  115. A Systematic Review and Comparison of Security Ontologies. [Citation Graph (, )][DBLP]

  116. Context Ontology for Secure Interoperability. [Citation Graph (, )][DBLP]

  117. On the Security of VSH in Password Schemes. [Citation Graph (, )][DBLP]

  118. Sustaining Web Services High-Availability Using Communities. [Citation Graph (, )][DBLP]

  119. Distributed Information Retrieval Service for Ubiquitous Services. [Citation Graph (, )][DBLP]

  120. A Lightweight Security Analyzer inside GCC. [Citation Graph (, )][DBLP]

  121. Dynamic Maintenance of Software Systems at Runtime. [Citation Graph (, )][DBLP]

  122. Software Security; A Vulnerability Activity Revisit. [Citation Graph (, )][DBLP]

  123. Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations. [Citation Graph (, )][DBLP]

  124. A Survey on Trust and Reputation Schemes in Ad Hoc Networks. [Citation Graph (, )][DBLP]

  125. Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. [Citation Graph (, )][DBLP]

  126. Detecting Bots Based on Keylogging Activities. [Citation Graph (, )][DBLP]

  127. A Comprehensive Approach for Context-dependent Privacy Management. [Citation Graph (, )][DBLP]

  128. Traceable Quantitative Risk Assessment Applied to Investment Decision for Local Backups. [Citation Graph (, )][DBLP]

  129. Quantitative Assessment of Enterprise Security System. [Citation Graph (, )][DBLP]

  130. Clustering Oriented Architectures in Medical Sensor Environments. [Citation Graph (, )][DBLP]

  131. An Initial Model and a Discussion of Access Control in Patient Controlled Health Records. [Citation Graph (, )][DBLP]

  132. Secure Team-Based EPR Access Acquisition in Wireless Networks. [Citation Graph (, )][DBLP]

  133. VEA-bility Security Metric: A Network Security Analysis Tool. [Citation Graph (, )][DBLP]

  134. Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments. [Citation Graph (, )][DBLP]

  135. GOST-28147 Encryption Implementation on Graphics Processing Units. [Citation Graph (, )][DBLP]

  136. Intelligent Video Surveillance Networks: Data Protection Challenges. [Citation Graph (, )][DBLP]

  137. Intrusion Detection with Data Correlation Relation Graph. [Citation Graph (, )][DBLP]

  138. A Critique of k-Anonymity and Some of Its Enhancements. [Citation Graph (, )][DBLP]

  139. Cluster-Specific Information Loss Measures in Data Privacy: A Review. [Citation Graph (, )][DBLP]

  140. Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. [Citation Graph (, )][DBLP]

  141. Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach. [Citation Graph (, )][DBLP]

  142. Using Non-adaptive Group Testing to Construct Spy Agent Routes. [Citation Graph (, )][DBLP]

  143. A Bayesian Approach for on-Line Max Auditing. [Citation Graph (, )][DBLP]

  144. Detection of Malcodes by Packet Classification. [Citation Graph (, )][DBLP]

  145. Performance of a Strategy Based Packets Forwarding in Ad Hoc Networks. [Citation Graph (, )][DBLP]

  146. Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy. [Citation Graph (, )][DBLP]

  147. AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes. [Citation Graph (, )][DBLP]

  148. A Post-processing Method to Lessen k-Anonymity Dissimilarities. [Citation Graph (, )][DBLP]

  149. Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols. [Citation Graph (, )][DBLP]

  150. A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set. [Citation Graph (, )][DBLP]

  151. Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries. [Citation Graph (, )][DBLP]

  152. Secure and Privacy-Friendly Logging for eGovernment Services. [Citation Graph (, )][DBLP]

  153. The REM Framework for Security Evaluation. [Citation Graph (, )][DBLP]

  154. Static Validation of Licence Conformance Policies. [Citation Graph (, )][DBLP]

  155. Towards Practical Security Monitors of UML Policies for Mobile Applications. [Citation Graph (, )][DBLP]

  156. Synthesis of Local Controller Programs for Enforcing Global Security Properties. [Citation Graph (, )][DBLP]

  157. Weighted Datalog and Levels of Trust. [Citation Graph (, )][DBLP]

  158. Negotiation of Usage Control Policies - Simply the Best? [Citation Graph (, )][DBLP]

  159. Security Requirement Engineering at a Telecom Provider. [Citation Graph (, )][DBLP]

  160. Identifying Security Aspects in Early Development Stages. [Citation Graph (, )][DBLP]

  161. Using Security Patterns to Combine Security Metrics. [Citation Graph (, )][DBLP]

  162. Secure Software Design in Practice. [Citation Graph (, )][DBLP]

  163. Covering Your Assets in Software Engineering. [Citation Graph (, )][DBLP]

  164. A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. [Citation Graph (, )][DBLP]

  165. Towards Incorporating Discrete-Event Systems in Secure Software Development. [Citation Graph (, )][DBLP]

  166. How to Open a File and Not Get Hacked. [Citation Graph (, )][DBLP]

  167. Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of Rules. [Citation Graph (, )][DBLP]

  168. Adaptive Data Integrity through Dynamically Redundant Data Structures. [Citation Graph (, )][DBLP]

  169. ISEDS: An Information Security Engineering Database System Based on ISO Standards. [Citation Graph (, )][DBLP]

  170. Privacy Aspects of eHealth. [Citation Graph (, )][DBLP]

  171. Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks. [Citation Graph (, )][DBLP]

  172. Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. [Citation Graph (, )][DBLP]

  173. Implementing Multidimensional Security into OLAP Tools. [Citation Graph (, )][DBLP]

  174. Detecting Key Players in 11-M Terrorist Network: A Case Study. [Citation Graph (, )][DBLP]

  175. Privacy Preserving Support Vector Machines in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  176. An Image Encryption System by Cellular Automata with Memory. [Citation Graph (, )][DBLP]

  177. Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. [Citation Graph (, )][DBLP]

  178. Internet Observation with ISDAS: How Long Does a Worm Perform Scanning? [Citation Graph (, )][DBLP]

  179. Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes. [Citation Graph (, )][DBLP]

  180. Enocoro-80: A Hardware Oriented Stream Cipher. [Citation Graph (, )][DBLP]

  181. Cryptanalysis and Improvement of an ‘Improved Remote Authentication Scheme with Smart Card’. [Citation Graph (, )][DBLP]

  182. Effective Monitoring of a Survivable Distributed Networked Information System. [Citation Graph (, )][DBLP]

  183. Design of an FDB based Intra-domain Packet Traceback System. [Citation Graph (, )][DBLP]

  184. An Independent Evaluation of Web Timing Attack and its Countermeasure. [Citation Graph (, )][DBLP]

  185. Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks. [Citation Graph (, )][DBLP]

  186. Privacy-Preserving Distributed Set Intersection. [Citation Graph (, )][DBLP]

  187. Examination of Forwarding Obstruction Attacks in Structured Overlay Networks. [Citation Graph (, )][DBLP]

  188. A Novel Approach for Multiplication over GF(2m) in Polynomial Basis Representation. [Citation Graph (, )][DBLP]

  189. Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. [Citation Graph (, )][DBLP]

  190. Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. [Citation Graph (, )][DBLP]

  191. Recovery of Encryption Keys from Memory Using a Linear Scan. [Citation Graph (, )][DBLP]

  192. Proposal for Efficient Searching and Presentation in Digital Forensics. [Citation Graph (, )][DBLP]

  193. Secure Steganography in Compressed Video Bitstreams. [Citation Graph (, )][DBLP]

  194. Considerations Towards a Cyber Crime Profiling System. [Citation Graph (, )][DBLP]

  195. Alignment of Misuse Cases with Security Risk Management. [Citation Graph (, )][DBLP]

  196. Information Stream Based Model for Organizing Security. [Citation Graph (, )][DBLP]

  197. Security Requirements Variability for Software Product Lines. [Citation Graph (, )][DBLP]

  198. Transforming Security Requirements into Architecture. [Citation Graph (, )][DBLP]

  199. Modelling Security Properties in a Grid-based Operating System with Anti-Goals. [Citation Graph (, )][DBLP]

  200. Annotating Regulations Using Cerno: An Application to Italian Documents - Extended Abstract. [Citation Graph (, )][DBLP]

  201. Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements. [Citation Graph (, )][DBLP]

  202. Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract). [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002