default search action
2nd SECURWARE 2008: Cap Esterel, France
- André Cotton, Oana Dini, Antonio Fernandez Gómez-Skarmeta, Mihaela Ion, Manuela Popescu, Masaru Takesue:
Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France. IEEE Computer Society 2008, ISBN 978-0-7695-3329-2
Frameworks, Architectures and Protocols I
- Frederic Stumpf, Claudia Eckert:
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. 1-9 - Khaled Gaaloul, Andreas Schaad, Ulrich Flegel, François Charoy:
A Secure Task Delegation Model for Workflows. 10-15 - Anders Moen Hagalisletto, Lars Strand:
Formal Modeling of Authentication in SIP Registration. 16-21 - Sameerchand Pudaruth, Nevin Vunka Jungum, Soulakshmee D. Ghurbhurrun, Leckraj Nagowah:
Controlling Access to Location-Based Services in Vehicular Mobile Pervasive Environments. 22-27
Frameworks, Architectures and Protocols II
- H. Rezaei Ghaleh, M. A. Doustari:
A New Approach for Secure and Portable OS. 28-33 - Thomas Gamer, Christoph P. Mayer, Martina Zitterbart:
Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection. 34-40 - Jérémy Briffaut, Jean-François Lalande, Waleed W. Smari:
Team--Based MAC Policy over Security--Enhanced Linux. 41-46 - Shu-Lin Chen, Stanley Chow, Christophe Gustave, Dmitri Vinokurov:
Prototyping a New Identity Authentication Framework for IP Telephony. 47-52 - Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca:
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets. 53-61
Frameworks, Architectures and Protocols III
- Ángel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube:
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data. 62-67 - Fuwen Liu, Hartmut König:
Security Policy Management for Peer Group Meetings. 68-73 - Sandhya Khurana, Neelima Gupta:
FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks. 74-79 - Anders Moen Hagalisletto:
Proving Trust Locally. 80-87 - Rafael Bosse Brinhosa, Carlos Becker Westphall, Carla Merkle Westphall:
A Security Framework for Input Validation. 88-92
System Security
- Antonio San Martino, Xavier Perramon:
Defending E-Banking Services: Antiphishing Approach. 93-98 - Imad M. Abbadi, Muntaha Alawneh:
Preventing Insider Information Leakage for Enterprises. 99-106 - Pedro R. M. Inácio, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro:
Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic. 107-113 - Eric Y. Chen, Mitsutaka Itoh:
Scalable Detection of SIP Fuzzing Attacks. 114-119 - Sarosh Hashmi, John Brooke:
Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack. 120-126
Malware & Security
- Ian Castle, Eimear Buckley:
The Automatic Discovery, Identification and Measurement of Botnets. 127-132 - Masaru Takesue:
A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy. 133-138 - Nikolaos Chatzis, Enric Pujol:
Email Worm Mitigation by Controlling the Name Server Response Rate. 139-145 - Cheun Ngen Chong, Dan Jiang, Jiagang Zhang, Long Guo:
Anti-counterfeiting with a Random Pattern. 146-153 - Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri, Satoshi Kawasaki, Hirotake Abe, Takahiro Shinagawa, Kazuhiko Kato:
Efficient Anomaly Detection System for Mobile Handsets. 154-160
Ecosystem Security and Trust
- Vasile Florian Pais, Viorica Stancalie:
Providing Secure Access to Unsecure Web Services. 161-164 - Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell:
Towards Decentralised Security Policies for e-Health Collaborations. 165-172 - Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Luigi Telesca:
Rating Agencies Interoperation for Peer-to-Peer Online Transactions. 173-178 - Audun Jøsang, Touhid Bhuiyan:
Optimal Trust Network Analysis with Subjective Logic. 179-184 - Nuno Amálio, George Spanoudakis:
From Monitoring Templates to Security Monitoring and Threat Detection. 185-192
Cryptography
- Ioannis G. Askoxylakis, Damien Sauveron, Constantinos Markantonakis, Theodore Tryfonas, Apostolos Traganitis:
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. 193-202 - Przemyslaw Rodwald, Janusz Stoklosa:
Family of Parameterized Hash Algorithms. 203-208 - Roland Schmitz:
Public Key Cryptography: A Dynamical Systems Perspective. 209-212 - Aleksandar Kircanski, Amr M. Youssef:
A Related-Key Attack on TREYFER. 213-217
Information Security I
- Jean-Michel Sahut:
Security and Adoption of Internet Payment. 218-223 - Wolfgang Boehmer:
Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001. 224-231 - Marcin Dabrowski, Piotr Pacyna:
Generic and Complete Three-Level Identity Management Model. 232-237 - Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed:
A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. 238-242 - HwanJin Lee, InKyung Jeun, Kilsoo Chun, Junghwan Song:
A New Anti-phishing Method in OpenID. 243-247
Information Security II
- Wilson Goudalo, Dominique Seret:
Toward the Engineering of Security of Information Systems (ESIS): UML and the IS Confidentiality. 248-256 - Cynthia Y. Lester, Frank Jamerson:
Designing an Undergraduate Software Security Course. 257-262 - Carlos Aguilar Melchor, Benoît Crespin, Philippe Gaborit, Vincent Jolivet, Pierre Rousseau:
High-Speed Private Information Retrieval Computation on GPU. 263-272 - Kreetta Askola, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, Juha Röning:
Vulnerability Dependencies in Antivirus Software. 273-278
Information Security III
- Rainer Falk, Steffen Fries:
Security Governance for Enterprise VoIP Communication. 279-286 - Jan Feyereisl, Uwe Aickelin:
ToLeRating UR-STD. 287-293 - Fatiha Benali, Stéphane Ubéda, Véronique Legrand:
Collaborative Approach to Automatic Classification of Heterogeneous Information Security. 294-299 - Cynthia Y. Lester, Hira N. Narang, Chung-Han Chen:
Infusing Information Assurance into an Undergraduate CS Curriculum. 300-305
Profiling Data Mining
- Giacomo Verticale:
On the Portability of Trained Machine Learning Classifiers for Early Application Identification. 306-310 - Martin Floeck, Lothar Litz:
Activity- and Inactivity-BasedApproaches to Analyze an Assisted Living Environment. 311-316 - Yannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant:
Analysis of Computer Infection Risk Factors Based on Customer Network Usage. 317-325
DEPEND I
- Daniel J. Martinez, Juan M. Marin, Jorge Bernal Bernabé, Manuel Gil Pérez, Antonio Fernandez Gómez-Skarmeta:
Design-Time Learning for Operational Planning Improvement. 326-331 - André Cotton, Maurice Israël, Julien Borgel:
Molecular Approach Paves the Way towards High Resilience for Large Mission-Critical Information Systems. 332-337 - Maurice Israël, Julien Borgel, André Cotton:
Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems. 338-343 - Marco Domenico Aime, Andrea S. Atzeni:
Generation of Diagnostic Plans for Large ICT Systems. 344-349
DEPEND II
- Dariusz Caban, Wojciech Zamojski:
Dependability Analysis of Information Systems with Hierarchical Reconfiguration of Services. 350-355 - Katarzyna Michalska, Tomasz Walkowiak:
Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and Simulation. 356-361 - Juan Manuel Marín Pérez, Jorge Bernal Bernabé, Daniel J. Martínez-Manzano, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Towards the Definition of a Web Service Based Management Framework. 362-367 - Imre Kocsis, György Csertán, Péter László Pásztor, András Pataricza:
Dependability and Security Metrics in Controlling Infrastructure. 368-374
DEPEND III
- Maite Avelino, Francisco de la Torre:
Advanced Rule-Based Techniques in Mission Critical Systems. 375-380 - Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca:
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates. 381-390 - Jesús J. Martinez Molina, Miguel A. Hernández Ruíz, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Event-Driven Architecture for Intrusion Detection Systems Based on Patterns. 391-396 - Marek Woda, Tomasz Walkowiak:
Agent Based Approach to Events Monitoring in Complex Information Systems. 397-402
DEPEND IV
- Xiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu:
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. 403-411 - Artur Hecker:
On System Security Metrics and the Definition Approaches. 412-419 - Marco Domenico Aime, Paolo Carlo Pomi, Marco Vallini:
Policy-Driven System Configuration for Dependability. 420-425 - Ilkka Norros, Pirkko Kuusela, Pekka Savola:
A Dependability Case Approach to the Assessment of IP Networks. 426-432
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.