The SCEAS System
Navigation Menu

Conferences in DBLP

(IEEEares)
2006 (conf/IEEEares/2006)


  1. Message from the Organizing Committee. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:- [Conf]

  2. ARES and Workshops Committees. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:- [Conf]
  3. Louis Marinos
    Risk Management and Risk Assessment at ENISA: Issues and Challenges. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:2-3 [Conf]
  4. David A. Basin
    Model Driven Security. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:4- [Conf]
  5. Ching Lin, Vijay Varadharajan
    Trust Based Risk Management for Distributed System Security - A New Approach. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:6-13 [Conf]
  6. Rajarajan Sampath, Deepak Goel
    RATING: Rigorous Assessment of Trust in Identity Management. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:14-23 [Conf]
  7. Kilho Shin, Hiroshi Yasuda
    Provably Secure Anonymous Access Control for Heterogeneous Trusts. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:24-33 [Conf]
  8. Amy Beth Corman, Scott Douglas, Peter Schachte, Vanessa Teague
    A Secure Event Agreement (SEA) protocol for peer-to-peer games. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:34-41 [Conf]
  9. Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido, S. Misbah Deen
    Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:42-49 [Conf]
  10. Alexander Zangerl
    Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:50-57 [Conf]
  11. Regine Endsuleit, Thilo Mie
    Censorship-Resistant and Anonymous P2P Filesharing. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:58-65 [Conf]
  12. Sheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri
    A Dependable Device Discovery Approach for Pervasive Computing Middleware. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:66-73 [Conf]
  13. Saber Zrelli, Yoichi Shinoda
    Single sign-on framework for AAA operations within commercial mobile networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:74-81 [Conf]
  14. Junyang Zhou, Joseph Kee-Yin Ng
    A Selector Method for Providing Mobile Location Estimation Services within a Radio Cellular Network. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:82-89 [Conf]
  15. Leon Grabensek, Sasa Divjak
    Guidelines for Biometric Recognition in Wireless System for Payment Confirmation. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:90-99 [Conf]
  16. V. H. Gupta, K. Gopinath
    An Extended Verifiable Secret Redistribution Protocol for Archival Systems. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:100-107 [Conf]
  17. Thomas Berger
    Analysis of Current VPN Technologies. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:108-115 [Conf]
  18. Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie
    Integration of Quantum Cryptography in 802.11 Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:116-123 [Conf]
  19. Alban Gabillon, Laurent Gallon
    Availability Constraints for Avionic Data Buses. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:124-131 [Conf]
  20. Yih Huang, David Arsenault, Arun Sood
    Securing DNS Services through System Self Cleansing and Hardware Enhancements. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:132-139 [Conf]
  21. George Yee
    Personalized Security for E-Services. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:140-147 [Conf]
  22. Juan Vera del Campo, Josep Pegueroles, Miguel Soriano
    Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:148-155 [Conf]
  23. Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog
    Towards a Stochastic Model for Integrated Security and Dependability Evaluation. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:156-165 [Conf]
  24. Mourad Elhadef, Shantanu Das, Amiya Nayak
    A Novel Artificial-Immune-Based Approach for System-Level Fault Diagnosis. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:166-173 [Conf]
  25. René Rydhof Hansen, Christian W. Probst, Flemming Nielson
    Sandboxing in myKlaim. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:174-181 [Conf]
  26. Y.-S. Lin, P.-H. Tsang, C.-H. Chen, C.-L. Tseng, Y.-L. Lin
    Evaluation of Network Robustness for Given Defense Resource Allocation Strategies. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:182-189 [Conf]
  27. Gang Yao, Dengguo Feng
    Proxy Oblivious Transfer Protocol. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:190-197 [Conf]
  28. Feng Cao, Cullen Jennings
    Providing Response Identity and Authentication in IP Telephony. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:198-205 [Conf]
  29. Judith E. Y. Rossebø, Rolv Bræk
    Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:206-215 [Conf]
  30. Maurizio Adriano Strangio
    An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:216-223 [Conf]
  31. Hugo Proença, Luís A. Alexandre
    A Method for the Identification of Inaccuracies in Pupil Segmentation. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:224-228 [Conf]
  32. Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard
    Availability Enforcement by Obligations and Aspects Identification. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:229-239 [Conf]
  33. R. W. Helms, S. Van Oorschot, J. Herweijer, M. Plas
    An integral IT continuity framework for undisrupted business operations. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:240-244 [Conf]
  34. Christian Storm, Oliver E. Theel, Carl von Ossietzky
    Highly Adaptable Dynamic Quorum Schemes for Managing Replicated Data. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:245-253 [Conf]
  35. P. Neira, Laurent Lefèvre, R. M. Gasca
    High Availability support for the design of stateful networking equipments. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:254-261 [Conf]
  36. Jiong Zhang, Mohammad Zulkernine
    A Hybrid Network Intrusion Detection Technique Using Random Forests. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:262-269 [Conf]
  37. Wei Wang, Roberto Battiti
    Identifying Intrusions in Computer Networks with Principal Component Analysis. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:270-279 [Conf]
  38. Sozo Inoue, Hiroto Yasuura, Daisuke Hagiwara
    Systematic Error Detection for RFID Reliability. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:280-286 [Conf]
  39. Cas J. F. Cremers
    Feasibility of Multi-Protocol Attacks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:287-294 [Conf]
  40. Michael Jarrett, Rudolph E. Seviora
    Diversity to Enhance Autonomic Computing Self-Protection. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:295-299 [Conf]
  41. Javier Cano, David Rios
    Reliability Forecasting in Complex Hardware/Software Systems. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:300-304 [Conf]
  42. Hertong Song, Chokchai Leangsuksun, Raja Nassar
    Availability Modeling and Analysis on High Performance Cluster Computing Systems. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:305-313 [Conf]
  43. Man Lin, Laurence Tianruo Yang
    Schedulability Driven Security Optimization in Real-time Systems. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:314-320 [Conf]
  44. George Yee, Larry Korba, Ronggong Song
    Ensuring Privacy for E-Health Services. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:321-328 [Conf]
  45. Nevena Stolba, Marko Banek, A. Min Tjoa
    The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:329-339 [Conf]
  46. Melanie Volkamer, Robert Krimmer
    Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:340-347 [Conf]
  47. Zhiqiang Lin, Bing Mao, Li Xie
    A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:348-357 [Conf]
  48. David G. Rosado, Eduardo Fernández-Medina, Mario Piattini, Carlos Gutiérrez
    A Study of Security Architectural Patterns. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:358-365 [Conf]
  49. Thomas Neubauer, Christian Stummer, Edgar Weippl
    Workshop-based Multiobjective Security Safeguard Selection. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:366-373 [Conf]
  50. Klaus Plößl, Thomas Nowey, Christian Mletzko
    Towards a Security Architecture for Vehicular Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:374-381 [Conf]
  51. Yohann Thomas, Hervé Debar, Benjamin Morin
    Improving Security Management through Passive Network Observation. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:382-389 [Conf]
  52. Serge Abiteboul, Bogdan Cautis, Amos Fiat, Tova Milo
    Digital Signatures for Modifiable Collections. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:390-399 [Conf]
  53. Johannes Osrael, Lorenz Froihofer, Karl M. Göschka, Stefan Beyer, Pablo Galdámez, Francesc D. Muñoz-Escoí
    A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:400-407 [Conf]
  54. Stefan Beyer, Alexander Sanchez, Francesc D. Muñoz-Escoí, Pablo Galdámez
    DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:408-415 [Conf]
  55. Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti
    Defense trees for economic evaluation of security investments. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:416-423 [Conf]
  56. Amir Hayat, Thomas Rossler, Muhammad Alam
    Proposed Framework for Achieving Interoperable Services Between European Public Administrations. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:424-431 [Conf]
  57. Davrondzhon Gafurov, Kirsi Helkala, Torkjel Sondrol
    Gait Recognition Using Acceleration from MEMS. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:432-439 [Conf]
  58. Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao
    Making Web Services Dependable. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:440-448 [Conf]
  59. R. Remenyte, J. D. Andrews
    A Simple Component Connection Approach for Fault Tree Conversion to Binary Decision Diagram. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:449-457 [Conf]
  60. Thomas Neubauer, Markus D. Klemen, Stefan Biffl
    Secure Business Process Management: A Roadmap. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:457-464 [Conf]
  61. Torsten Priebe, Wolfgang Dobmeier, Nora Kamprath
    Supporting Attribute-based Access Control with Ontologies. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:465-472 [Conf]
  62. Calin Ciufudean, Adrian Graur, Constantin Filote, Cornel Turcu, Valentin Popa
    Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:473-481 [Conf]
  63. Marc Conrad, Tim French, Wei Huang, Carsten Maple
    A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter?. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:482-487 [Conf]
  64. Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard Barolli
    Secure 3G User Authentication in Adhoc Serving Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:488-495 [Conf]
  65. Feng Cao, Saadat Malik
    Security Analysis for IP-based Government Emergency Telephony Service. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:496-501 [Conf]
  66. Muhammad Sher, Thomas Magedanz, Walter T. Penzhorn
    Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS). [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:502-509 [Conf]
  67. Hyangjin Lee, Jeeyeon Kim
    Privacy threats and issues in mobile RFID. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:510-514 [Conf]
  68. Dong Seong Kim, Khaja Mohammad Shazzad, Jong Sou Park
    A Framework of Survivability Model for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:515-522 [Conf]
  69. Valer Bocan, Vladimir Cretu
    Mitigating Denial of Service Threats in GSM Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:523-528 [Conf]
  70. Amirhosein Taherkordi, Majid Alkaee Taleghan, Mohsen Sharifi
    Achieving Availability and Reliability in Wireless Sensor Networks Applications. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:529-535 [Conf]
  71. Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang
    Secure Enhanced Wireless Transfer Protocol. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:536-543 [Conf]
  72. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
    Quality of Password Management Policy. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:544-550 [Conf]
  73. Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji
    A Proposal of An Anonymous Authentication Method For Flat-rate Service. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:551-557 [Conf]
  74. MingChu Li, Hongyan Yao, Jianbo Ma
    Recovery Mechanism of Online Certification Chain in Grid Computing. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:558-562 [Conf]
  75. Cristina Satizábal, Rafael Páez, Jordi Forné
    PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:563-570 [Conf]
  76. MingChu Li, Hongyan Yao
    Recovery Mechanism of Cooperative Process Chain in Grid. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:571-576 [Conf]
  77. Naoyuki Nagatou, Takuo Watanabe
    Run-Time Detection of Covert Channels. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:577-584 [Conf]
  78. Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini
    Practical Approach of a Secure Management System based on ISO/IEC 17799. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:585-592 [Conf]
  79. Gerd Saurer, Alexander Schatten
    Testing Complex Business Process Solutions. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:593-600 [Conf]
  80. Jingde Cheng, Junichi Miura
    Deontic Relevant Logic as the Logical Basis for Specifying, Verifying, and Reasoning about Information Security and Information Assurance. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:601-608 [Conf]
  81. Zude Li, Guoqiang Zhan, Xiaojun Ye
    Resource Management Continuity With Constraint Inheritance Relation. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:609-616 [Conf]
  82. José Daniel García, Jesús Carretero, Javier Fernández, Félix García, David E. Singh, Alejandro Calderón
    On the Reliability of Web Clusters with Partial Replication of Contents. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:617-624 [Conf]
  83. S. M. Rizwan, K. P. Ramachandran
    Reliability Modeling Strategy of an Industrial System. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:625-630 [Conf]
  84. Jingde Cheng
    Persistent Computing Systems as Continuously Available, Reliable, and Secure Systems. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:631-638 [Conf]
  85. Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin (Ben) He
    Active/Active Replication for Highly Available HPC System Services. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:639-645 [Conf]
  86. Erland Jonsson
    Towards an Integrated Conceptual Model of Security and Dependability. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:646-653 [Conf]
  87. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:654-661 [Conf]
  88. Walter Binder
    Secure and Reliable Java-Based Middleware - Challenges and Solutions. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:662-669 [Conf]
  89. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Security Requirement with a UML 2.0 Profile. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:670-677 [Conf]
  90. Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo
    Representing levels of abstraction to facilitate the Secure Multidimensional Modeling. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:678-684 [Conf]
  91. Muhammad Alam, Ruth Breu, Michael Hafner
    Modeling permissions in a (U/X)ML world. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:685-692 [Conf]
  92. E. M. Kelly, L. M. Bartlett
    Application of the Digraph Method in System Fault Diagnostics. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:693-700 [Conf]
  93. Kenji Saito, Eiichi Morino, Jun Murai
    No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:701-708 [Conf]
  94. Christian Schläger, Thomas Nowey, José A. Montenegro
    A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:709-716 [Conf]
  95. Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenc Huguet-Rotger
    Achieving Fairness and Timeliness in a Previous Electronic Contract Signing Protocol. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:717-722 [Conf]
  96. Thomas Neubauer, Edgar Weippl, Stefan Biffl
    Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:723-731 [Conf]
  97. Barbara Emmert, Andreas Binzenhöfer
    Efficient Link Failure Detection and Localization using P2P-Overlay Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:732-739 [Conf]
  98. Matthew Leslie, Jim Davies, Todd Huffman
    Replication Strategies for Reliable Decentralised Storage. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:740-747 [Conf]
  99. Yuuki Takano, Naoki Isozaki, Yoichi Shinoda
    Multipath Key Exchange on P2P Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:748-755 [Conf]
  100. Jochen Dinger, Hannes Hartenstein
    Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:756-763 [Conf]
  101. Kenji Saito, Eiichi Morino, Jun Murai
    Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:764-771 [Conf]
  102. Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Tomohiro Ishihara, Yojiro Uo
    Ecosystem of Naming Systems: Discussions on a Framework to Induce Smart Space Naming Systems Development. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:772-778 [Conf]
  103. Hameeda Alshabib, Omer F. Rana, Ali Shaikh Ali
    Deriving Ratings Through Social Network Structures. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:779-787 [Conf]
  104. Christophe Simon, Philippe Weber
    Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability Uncertainty. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:788-793 [Conf]
  105. Sam Maes, Philippe Leray
    Multi-Agent Causal Models for Dependability Analysis. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:794-798 [Conf]
  106. Veronique Delcroix, Mohamed-Amine Maalej, Sylvain Piechowiak
    Computing Multiple Diagnoses in Large Devices Using Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:799-803 [Conf]
  107. Stefania Montani, Luigi Portinale, Andrea Bobbio, Daniele Codetta Raiteri
    Automatically Translating Dynamic Fault Trees into Dynamic Bayesian Networks by Means of a Software Tool. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:804-809 [Conf]
  108. Ashley Russell, John Quigley, Robert Van der Meer
    Modeling the Reliability of Search and Rescue Operations within the UK Through Bayesian Belief Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:810-816 [Conf]
  109. Martin Neil, Manesh Tailor, Norman E. Fenton, David Marquez, Peter Hearty
    Modeling Dependable Systems using Hybrid Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:817-823 [Conf]
  110. Jaka Mocnik, Piotr Karwaczynski
    An Architecture for Service Discovery Based on Capability Matching. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:824-831 [Conf]
  111. Alexander Böhm 0002, Carl-Christian Kanne, Guido Moerkotte
    A Declarative Control Language for Dependable XML Message Queues. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:832-839 [Conf]
  112. Raman Kazhamiakin, Paritosh K. Pandya, Marco Pistore
    Timed Modelling and Analysis in Web Service Compositions. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:840-846 [Conf]
  113. Lukasz Juszczyk, Jaroslaw Lazowski, Schahram Dustdar
    Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:847-854 [Conf]
  114. A. Sousa, Afrânio Correia Jr., Francisco Moura, José Pereira, Rui Carlos Oliveira
    Evaluating Certification Protocols in the Partial Database State Machine. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:855-863 [Conf]
  115. Jordi Castellà-Roca, Jordi Herrera-Joancomartí, Aleix Dorca-Josa
    A Secure E-Exam Management System. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:864-871 [Conf]
  116. Elke Franz, Katrin Borcea-Pfitzmann
    Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:872-878 [Conf]
  117. Elke Franz, Hagen Wahrig, Alexander Boettcher, Katrin Borcea-Pfitzmann
    Access Control in a Privacy-Aware eLearning Environment. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:879-886 [Conf]
  118. Carine Webber, Maria De Fatima, W. Do Prado Lima, Marcos E. Casa, Alexandre M. Ribeiro
    Adding Security to a Multiagent Learning Platform. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:887-894 [Conf]
  119. Marek Hatala, Ty Mey Eap, Ashok Shah
    Unlocking Repositories: Federated Security Solution for Attribute and Policy Based Access to Repositories via Web Services. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:895-903 [Conf]
  120. Vasilis Aggelis
    Offline Internet Banking Fraud Detection. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:904-905 [Conf]
  121. Nasrullah Memon, Henrik Legind Larsen
    Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:906-913 [Conf]
  122. Emilio Soler, Rodolfo Villarroel, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini
    Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:914-921 [Conf]
  123. Agusti Solanas, Antoni Martínez-Ballesté, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz
    A 2d-Tree-Based Blocking Method for Microaggregating Very Large Data Sets. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:922-928 [Conf]
  124. Carsten Maple, Vitaly Schetinin
    Using A Bayesian Averaging Model for Estimating the Reliability of Decisions in Multimodal Biometrics. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:929-935 [Conf]
  125. Marcin Gorawski, Karol Stachurski
    On Efficiency and Data Privacy Level of Association Rules Mining Algorithms within Parallel Spatial Data Warehouse. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:936-943 [Conf]
  126. H. Michael Chung
    Dependability in Data Mining: A Perspective from the Cost of Making Decisions. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:944-949 [Conf]
  127. Richard O. Sinnott, Micha Bayer, A. J. Stell, Jos Koetsier
    Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:950-957 [Conf]
  128. Carsten Maple, Peter Norrington
    The Usability and Practicality of Biometric Authentication in the Workplace. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:958-964 [Conf]
  129. Christophe Blanchet, Rémi Mollon, Gilbert Deléage
    Building an Encrypted File System on the EGEE grid: Application to Protein Sequence Analysis. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:965-973 [Conf]
  130. Christer Magnusson, Heidi Ola, Camilla Silversjo Holmqvist
    The knowledge pressure on Risk and Security managers is increasing. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:974-979 [Conf]
  131. Ruedi Baer, Martin Dietrich
    Validation of IT-Security Measurement Tools. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:980-981 [Conf]
  132. Sabine Delaître
    Risk Management approach on identity theft in biometric systems context. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:982- [Conf]
  133. J. W. Bryans, Bev Littlewood, Peter Y. A. Ryan, Lorenzo Strigini
    E-voting: Dependability Requirements and Design for Dependability. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:988-995 [Conf]
  134. Omar Batarfi, Lindsay Marshall
    Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:996-1003 [Conf]
  135. Daniel Beer, Raphael Kunis, Gudula Rünger
    A Component Based Software Architecture for E-Government Applications. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:1004-1011 [Conf]
  136. Akiko Orita
    Designing mutual-aid model for RAQ (Rarely Asked Question) in e-Government: Practical use of anonymity. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:1012-1016 [Conf]
  137. Rob Peters, Pim Jorg, Marco Meesters, Marcel Hoogwout, Edwin Stuart
    Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:1017-1024 [Conf]
  138. Carsten Maple, Helen Jacobs, Matthew Reeve
    Choosing the Right Wireless LAN Security Protocol for the Home and Business User. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:1025-1032 [Conf]
  139. Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas
    An ontology for secure e-government applications. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:1033-1037 [Conf]
  140. Semir Daskapan
    Building governments in e-government: settlement of trusted e-oligarchy. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:1038-1044 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002