Conferences in DBLP
(IEEEares) 2006 (conf/IEEEares/2006)
Message from the Organizing Committee. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:- [Conf ] ARES and Workshops Committees. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:- [Conf ] Louis Marinos Risk Management and Risk Assessment at ENISA: Issues and Challenges. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:2-3 [Conf ] David A. Basin Model Driven Security. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:4- [Conf ] Ching Lin , Vijay Varadharajan Trust Based Risk Management for Distributed System Security - A New Approach. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:6-13 [Conf ] Rajarajan Sampath , Deepak Goel RATING: Rigorous Assessment of Trust in Identity Management. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:14-23 [Conf ] Kilho Shin , Hiroshi Yasuda Provably Secure Anonymous Access Control for Heterogeneous Trusts. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:24-33 [Conf ] Amy Beth Corman , Scott Douglas , Peter Schachte , Vanessa Teague A Secure Event Agreement (SEA) protocol for peer-to-peer games. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:34-41 [Conf ] Yoshio Nakajima , Kenichi Watanabe , Naohiro Hayashibara , Makoto Takizawa , Tomoya Enokido , S. Misbah Deen Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:42-49 [Conf ] Alexander Zangerl Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:50-57 [Conf ] Regine Endsuleit , Thilo Mie Censorship-Resistant and Anonymous P2P Filesharing. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:58-65 [Conf ] Sheikh Iqbal Ahamed , Mohammad Zulkernine , Suresh Anamanamuri A Dependable Device Discovery Approach for Pervasive Computing Middleware. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:66-73 [Conf ] Saber Zrelli , Yoichi Shinoda Single sign-on framework for AAA operations within commercial mobile networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:74-81 [Conf ] Junyang Zhou , Joseph Kee-Yin Ng A Selector Method for Providing Mobile Location Estimation Services within a Radio Cellular Network. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:82-89 [Conf ] Leon Grabensek , Sasa Divjak Guidelines for Biometric Recognition in Wireless System for Payment Confirmation. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:90-99 [Conf ] V. H. Gupta , K. Gopinath An Extended Verifiable Secret Redistribution Protocol for Archival Systems. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:100-107 [Conf ] Thomas Berger Analysis of Current VPN Technologies. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:108-115 [Conf ] Thi Mai Trang Nguyen , Mohamed Ali Sfaxi , Solange Ghernaouti-Helie Integration of Quantum Cryptography in 802.11 Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:116-123 [Conf ] Alban Gabillon , Laurent Gallon Availability Constraints for Avionic Data Buses. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:124-131 [Conf ] Yih Huang , David Arsenault , Arun Sood Securing DNS Services through System Self Cleansing and Hardware Enhancements. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:132-139 [Conf ] George Yee Personalized Security for E-Services. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:140-147 [Conf ] Juan Vera del Campo , Josep Pegueroles , Miguel Soriano Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:148-155 [Conf ] Karin Sallhammar , Bjarne E. Helvik , Svein J. Knapskog Towards a Stochastic Model for Integrated Security and Dependability Evaluation. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:156-165 [Conf ] Mourad Elhadef , Shantanu Das , Amiya Nayak A Novel Artificial-Immune-Based Approach for System-Level Fault Diagnosis. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:166-173 [Conf ] René Rydhof Hansen , Christian W. Probst , Flemming Nielson Sandboxing in myKlaim. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:174-181 [Conf ] Y.-S. Lin , P.-H. Tsang , C.-H. Chen , C.-L. Tseng , Y.-L. Lin Evaluation of Network Robustness for Given Defense Resource Allocation Strategies. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:182-189 [Conf ] Gang Yao , Dengguo Feng Proxy Oblivious Transfer Protocol. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:190-197 [Conf ] Feng Cao , Cullen Jennings Providing Response Identity and Authentication in IP Telephony. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:198-205 [Conf ] Judith E. Y. Rossebø , Rolv Bræk Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:206-215 [Conf ] Maurizio Adriano Strangio An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:216-223 [Conf ] Hugo Proença , Luís A. Alexandre A Method for the Identification of Inaccuracies in Pupil Segmentation. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:224-228 [Conf ] Frédéric Cuppens , Nora Cuppens-Boulahia , Tony Ramard Availability Enforcement by Obligations and Aspects Identification. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:229-239 [Conf ] R. W. Helms , S. Van Oorschot , J. Herweijer , M. Plas An integral IT continuity framework for undisrupted business operations. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:240-244 [Conf ] Christian Storm , Oliver E. Theel , Carl von Ossietzky Highly Adaptable Dynamic Quorum Schemes for Managing Replicated Data. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:245-253 [Conf ] P. Neira , Laurent Lefèvre , R. M. Gasca High Availability support for the design of stateful networking equipments. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:254-261 [Conf ] Jiong Zhang , Mohammad Zulkernine A Hybrid Network Intrusion Detection Technique Using Random Forests. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:262-269 [Conf ] Wei Wang , Roberto Battiti Identifying Intrusions in Computer Networks with Principal Component Analysis. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:270-279 [Conf ] Sozo Inoue , Hiroto Yasuura , Daisuke Hagiwara Systematic Error Detection for RFID Reliability. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:280-286 [Conf ] Cas J. F. Cremers Feasibility of Multi-Protocol Attacks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:287-294 [Conf ] Michael Jarrett , Rudolph E. Seviora Diversity to Enhance Autonomic Computing Self-Protection. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:295-299 [Conf ] Javier Cano , David Rios Reliability Forecasting in Complex Hardware/Software Systems. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:300-304 [Conf ] Hertong Song , Chokchai Leangsuksun , Raja Nassar Availability Modeling and Analysis on High Performance Cluster Computing Systems. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:305-313 [Conf ] Man Lin , Laurence Tianruo Yang Schedulability Driven Security Optimization in Real-time Systems. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:314-320 [Conf ] George Yee , Larry Korba , Ronggong Song Ensuring Privacy for E-Health Services. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:321-328 [Conf ] Nevena Stolba , Marko Banek , A. Min Tjoa The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:329-339 [Conf ] Melanie Volkamer , Robert Krimmer Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:340-347 [Conf ] Zhiqiang Lin , Bing Mao , Li Xie A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:348-357 [Conf ] David G. Rosado , Eduardo Fernández-Medina , Mario Piattini , Carlos Gutiérrez A Study of Security Architectural Patterns. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:358-365 [Conf ] Thomas Neubauer , Christian Stummer , Edgar Weippl Workshop-based Multiobjective Security Safeguard Selection. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:366-373 [Conf ] Klaus Plößl , Thomas Nowey , Christian Mletzko Towards a Security Architecture for Vehicular Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:374-381 [Conf ] Yohann Thomas , Hervé Debar , Benjamin Morin Improving Security Management through Passive Network Observation. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:382-389 [Conf ] Serge Abiteboul , Bogdan Cautis , Amos Fiat , Tova Milo Digital Signatures for Modifiable Collections. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:390-399 [Conf ] Johannes Osrael , Lorenz Froihofer , Karl M. Göschka , Stefan Beyer , Pablo Galdámez , Francesc D. Muñoz-Escoí A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:400-407 [Conf ] Stefan Beyer , Alexander Sanchez , Francesc D. Muñoz-Escoí , Pablo Galdámez DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:408-415 [Conf ] Stefano Bistarelli , Fabio Fioravanti , Pamela Peretti Defense trees for economic evaluation of security investments. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:416-423 [Conf ] Amir Hayat , Thomas Rossler , Muhammad Alam Proposed Framework for Achieving Interoperable Services Between European Public Administrations. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:424-431 [Conf ] Davrondzhon Gafurov , Kirsi Helkala , Torkjel Sondrol Gait Recognition Using Acceleration from MEMS. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:432-439 [Conf ] Louise E. Moser , P. M. Melliar-Smith , Wenbing Zhao Making Web Services Dependable. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:440-448 [Conf ] R. Remenyte , J. D. Andrews A Simple Component Connection Approach for Fault Tree Conversion to Binary Decision Diagram. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:449-457 [Conf ] Thomas Neubauer , Markus D. Klemen , Stefan Biffl Secure Business Process Management: A Roadmap. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:457-464 [Conf ] Torsten Priebe , Wolfgang Dobmeier , Nora Kamprath Supporting Attribute-based Access Control with Ontologies. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:465-472 [Conf ] Calin Ciufudean , Adrian Graur , Constantin Filote , Cornel Turcu , Valentin Popa Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:473-481 [Conf ] Marc Conrad , Tim French , Wei Huang , Carsten Maple A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter?. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:482-487 [Conf ] Arjan Durresi , Lyn Evans , Vamsi Paruchuri , Leonard Barolli Secure 3G User Authentication in Adhoc Serving Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:488-495 [Conf ] Feng Cao , Saadat Malik Security Analysis for IP-based Government Emergency Telephony Service. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:496-501 [Conf ] Muhammad Sher , Thomas Magedanz , Walter T. Penzhorn Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS). [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:502-509 [Conf ] Hyangjin Lee , Jeeyeon Kim Privacy threats and issues in mobile RFID. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:510-514 [Conf ] Dong Seong Kim , Khaja Mohammad Shazzad , Jong Sou Park A Framework of Survivability Model for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:515-522 [Conf ] Valer Bocan , Vladimir Cretu Mitigating Denial of Service Threats in GSM Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:523-528 [Conf ] Amirhosein Taherkordi , Majid Alkaee Taleghan , Mohsen Sharifi Achieving Availability and Reliability in Wireless Sensor Networks Applications. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:529-535 [Conf ] Jin-Cherng Lin , Yu-Hsin Kao , Chen-Wei Yang Secure Enhanced Wireless Transfer Protocol. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:536-543 [Conf ] Carlos Villarrubia , Eduardo Fernández-Medina , Mario Piattini Quality of Password Management Policy. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:544-550 [Conf ] Yoshio Kakizaki , Hiroshi Yamamoto , Hidekazu Tsuji A Proposal of An Anonymous Authentication Method For Flat-rate Service. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:551-557 [Conf ] MingChu Li , Hongyan Yao , Jianbo Ma Recovery Mechanism of Online Certification Chain in Grid Computing. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:558-562 [Conf ] Cristina Satizábal , Rafael Páez , Jordi Forné PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:563-570 [Conf ] MingChu Li , Hongyan Yao Recovery Mechanism of Cooperative Process Chain in Grid. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:571-576 [Conf ] Naoyuki Nagatou , Takuo Watanabe Run-Time Detection of Covert Channels. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:577-584 [Conf ] Luís Enrique Sanchez , Daniel Villafranca , Eduardo Fernández-Medina , Mario Piattini Practical Approach of a Secure Management System based on ISO/IEC 17799. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:585-592 [Conf ] Gerd Saurer , Alexander Schatten Testing Complex Business Process Solutions. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:593-600 [Conf ] Jingde Cheng , Junichi Miura Deontic Relevant Logic as the Logical Basis for Specifying, Verifying, and Reasoning about Information Security and Information Assurance. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:601-608 [Conf ] Zude Li , Guoqiang Zhan , Xiaojun Ye Resource Management Continuity With Constraint Inheritance Relation. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:609-616 [Conf ] José Daniel García , Jesús Carretero , Javier Fernández , Félix García , David E. Singh , Alejandro Calderón On the Reliability of Web Clusters with Partial Replication of Contents. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:617-624 [Conf ] S. M. Rizwan , K. P. Ramachandran Reliability Modeling Strategy of an Industrial System. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:625-630 [Conf ] Jingde Cheng Persistent Computing Systems as Continuously Available, Reliable, and Secure Systems. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:631-638 [Conf ] Christian Engelmann , Stephen L. Scott , Chokchai Leangsuksun , Xubin (Ben) He Active/Active Replication for Highly Available HPC System Services. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:639-645 [Conf ] Erland Jonsson Towards an Integrated Conceptual Model of Security and Dependability. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:646-653 [Conf ] Daniel Mellado , Eduardo Fernández-Medina , Mario Piattini A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:654-661 [Conf ] Walter Binder Secure and Reliable Java-Based Middleware - Challenges and Solutions. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:662-669 [Conf ] Alfonso Rodríguez , Eduardo Fernández-Medina , Mario Piattini Security Requirement with a UML 2.0 Profile. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:670-677 [Conf ] Rodolfo Villarroel , Emilio Soler , Eduardo Fernández-Medina , Mario Piattini , Juan Trujillo Representing levels of abstraction to facilitate the Secure Multidimensional Modeling. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:678-684 [Conf ] Muhammad Alam , Ruth Breu , Michael Hafner Modeling permissions in a (U/X)ML world. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:685-692 [Conf ] E. M. Kelly , L. M. Bartlett Application of the Digraph Method in System Fault Diagnostics. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:693-700 [Conf ] Kenji Saito , Eiichi Morino , Jun Murai No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:701-708 [Conf ] Christian Schläger , Thomas Nowey , José A. Montenegro A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:709-716 [Conf ] Magdalena Payeras-Capellà , Josep Lluís Ferrer-Gomila , Llorenc Huguet-Rotger Achieving Fairness and Timeliness in a Previous Electronic Contract Signing Protocol. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:717-722 [Conf ] Thomas Neubauer , Edgar Weippl , Stefan Biffl Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:723-731 [Conf ] Barbara Emmert , Andreas Binzenhöfer Efficient Link Failure Detection and Localization using P2P-Overlay Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:732-739 [Conf ] Matthew Leslie , Jim Davies , Todd Huffman Replication Strategies for Reliable Decentralised Storage. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:740-747 [Conf ] Yuuki Takano , Naoki Isozaki , Yoichi Shinoda Multipath Key Exchange on P2P Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:748-755 [Conf ] Jochen Dinger , Hannes Hartenstein Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:756-763 [Conf ] Kenji Saito , Eiichi Morino , Jun Murai Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:764-771 [Conf ] Yusuke Doi , Shirou Wakayama , Masahiro Ishiyama , Satoshi Ozaki , Tomohiro Ishihara , Yojiro Uo Ecosystem of Naming Systems: Discussions on a Framework to Induce Smart Space Naming Systems Development. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:772-778 [Conf ] Hameeda Alshabib , Omer F. Rana , Ali Shaikh Ali Deriving Ratings Through Social Network Structures. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:779-787 [Conf ] Christophe Simon , Philippe Weber Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability Uncertainty. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:788-793 [Conf ] Sam Maes , Philippe Leray Multi-Agent Causal Models for Dependability Analysis. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:794-798 [Conf ] Veronique Delcroix , Mohamed-Amine Maalej , Sylvain Piechowiak Computing Multiple Diagnoses in Large Devices Using Bayesian Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:799-803 [Conf ] Stefania Montani , Luigi Portinale , Andrea Bobbio , Daniele Codetta Raiteri Automatically Translating Dynamic Fault Trees into Dynamic Bayesian Networks by Means of a Software Tool. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:804-809 [Conf ] Ashley Russell , John Quigley , Robert Van der Meer Modeling the Reliability of Search and Rescue Operations within the UK Through Bayesian Belief Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:810-816 [Conf ] Martin Neil , Manesh Tailor , Norman E. Fenton , David Marquez , Peter Hearty Modeling Dependable Systems using Hybrid Bayesian Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:817-823 [Conf ] Jaka Mocnik , Piotr Karwaczynski An Architecture for Service Discovery Based on Capability Matching. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:824-831 [Conf ] Alexander Böhm 0002 , Carl-Christian Kanne , Guido Moerkotte A Declarative Control Language for Dependable XML Message Queues. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:832-839 [Conf ] Raman Kazhamiakin , Paritosh K. Pandya , Marco Pistore Timed Modelling and Analysis in Web Service Compositions. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:840-846 [Conf ] Lukasz Juszczyk , Jaroslaw Lazowski , Schahram Dustdar Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:847-854 [Conf ] A. Sousa , Afrânio Correia Jr. , Francisco Moura , José Pereira , Rui Carlos Oliveira Evaluating Certification Protocols in the Partial Database State Machine. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:855-863 [Conf ] Jordi Castellà-Roca , Jordi Herrera-Joancomartí , Aleix Dorca-Josa A Secure E-Exam Management System. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:864-871 [Conf ] Elke Franz , Katrin Borcea-Pfitzmann Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:872-878 [Conf ] Elke Franz , Hagen Wahrig , Alexander Boettcher , Katrin Borcea-Pfitzmann Access Control in a Privacy-Aware eLearning Environment. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:879-886 [Conf ] Carine Webber , Maria De Fatima , W. Do Prado Lima , Marcos E. Casa , Alexandre M. Ribeiro Adding Security to a Multiagent Learning Platform. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:887-894 [Conf ] Marek Hatala , Ty Mey Eap , Ashok Shah Unlocking Repositories: Federated Security Solution for Attribute and Policy Based Access to Repositories via Web Services. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:895-903 [Conf ] Vasilis Aggelis Offline Internet Banking Fraud Detection. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:904-905 [Conf ] Nasrullah Memon , Henrik Legind Larsen Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:906-913 [Conf ] Emilio Soler , Rodolfo Villarroel , Juan Trujillo , Eduardo Fernández-Medina , Mario Piattini Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:914-921 [Conf ] Agusti Solanas , Antoni Martínez-Ballesté , Josep Domingo-Ferrer , Josep Maria Mateo-Sanz A 2d -Tree-Based Blocking Method for Microaggregating Very Large Data Sets. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:922-928 [Conf ] Carsten Maple , Vitaly Schetinin Using A Bayesian Averaging Model for Estimating the Reliability of Decisions in Multimodal Biometrics. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:929-935 [Conf ] Marcin Gorawski , Karol Stachurski On Efficiency and Data Privacy Level of Association Rules Mining Algorithms within Parallel Spatial Data Warehouse. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:936-943 [Conf ] H. Michael Chung Dependability in Data Mining: A Perspective from the Cost of Making Decisions. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:944-949 [Conf ] Richard O. Sinnott , Micha Bayer , A. J. Stell , Jos Koetsier Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:950-957 [Conf ] Carsten Maple , Peter Norrington The Usability and Practicality of Biometric Authentication in the Workplace. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:958-964 [Conf ] Christophe Blanchet , Rémi Mollon , Gilbert Deléage Building an Encrypted File System on the EGEE grid: Application to Protein Sequence Analysis. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:965-973 [Conf ] Christer Magnusson , Heidi Ola , Camilla Silversjo Holmqvist The knowledge pressure on Risk and Security managers is increasing. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:974-979 [Conf ] Ruedi Baer , Martin Dietrich Validation of IT-Security Measurement Tools. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:980-981 [Conf ] Sabine Delaître Risk Management approach on identity theft in biometric systems context. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:982- [Conf ] J. W. Bryans , Bev Littlewood , Peter Y. A. Ryan , Lorenzo Strigini E-voting: Dependability Requirements and Design for Dependability. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:988-995 [Conf ] Omar Batarfi , Lindsay Marshall Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:996-1003 [Conf ] Daniel Beer , Raphael Kunis , Gudula Rünger A Component Based Software Architecture for E-Government Applications. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:1004-1011 [Conf ] Akiko Orita Designing mutual-aid model for RAQ (Rarely Asked Question) in e-Government: Practical use of anonymity. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:1012-1016 [Conf ] Rob Peters , Pim Jorg , Marco Meesters , Marcel Hoogwout , Edwin Stuart Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:1017-1024 [Conf ] Carsten Maple , Helen Jacobs , Matthew Reeve Choosing the Right Wireless LAN Security Protocol for the Home and Business User. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:1025-1032 [Conf ] Maria Karyda , Theodoros Balopoulos , Lazaros Gymnopoulos , Spyros Kokolakis , Costas Lambrinoudakis , Stefanos Gritzalis , Stelios Dritsas An ontology for secure e-government applications. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:1033-1037 [Conf ] Semir Daskapan Building governments in e-government: settlement of trusted e-oligarchy. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:1038-1044 [Conf ]