The Community for Technology Leaders
RSS Icon
Subscribe
2012 Seventh International Conference on Availability, Reliability and Security (2006)
Vienna, Austria
Apr. 20, 2006 to Apr. 22, 2006
ISBN: 0-7695-2567-9
TABLE OF CONTENTS
Workshop - Dependability Aspects on Data WArehousing and Mining Applications (DAWAM 2006)
Introduction
Invited Talks
Louis Marinos , ENISA - European Network and Information Security Agency
pp. 2-3
David Basin , ETH Zurich, Switzerland
pp. 4
Session 1: Trust Management
Ching Lin , Macquarie University, North Ryde, Sydney, Australia
Vijay Varadharajan , Macquarie University, North Ryde, Sydney, Australia
pp. 6-13
Rajarajan Sampath , International University in Germany
Deepak Goel , Institute of Technology, Banaras Hindu University
pp. 14-23
Kilho Shin , University of Tokyo
Hiroshi Yasuda , University of Tokyo
pp. 24-33
Session 2: P2P Systems
Amy Beth Corman , University of Melbourne, Australia
Scott Douglas , University of Melbourne, Australia
Peter Schachte , University of Melbourne, Australia
Vanessa Teague , University of Melbourne, Australia
pp. 34-41
Yoshio Nakajima , Tokyo Denki University, Japan
Kenichi Watanabe , Tokyo Denki University, Japan
Naohiro Hayashibara , Tokyo Denki University, Japan
Makoto Takizawa , Tokyo Denki University, Japan
Tomoya Enokido , Rissho University, Japan
S. Misbah Deen , University of Keel, England
pp. 42-49
Alexander Zangerl , Bond University, IT School, Australia
pp. 50-57
Regine Endsuleit , Universitat Karlsruhe (TH), Germany
Thilo Mie , Universitat Karlsruhe (TH), Germany
pp. 58-65
Session 3: Mobile Network and Pervasive Systems
Sheikh I Ahamed , Marquette University, Milwaukee
Mohammad Zulkernine , Queen?s University, Kingston, Ontario, Canada
Suresh Anamanamuri , Marquette University, Milwaukee, WI
pp. 66-73
Saber Zrelli , Japan Advanced Institute of Science and Technology, Ishikawa, JAPAN
Yoichi Shinoda , Japan Advanced Institute of Science and Technology, Ishikawa, JAPAN
pp. 74-81
Junyang Zhou , Hong Kong Baptist University
Joseph Kee-Yin Ng , Hong Kong Baptist University
pp. 82-89
Leon Grabensek , Prosum Ltd, Trzin, Slovenia
Sasa Divjak , University of Ljubljana, Slovenia
pp. 90-99
Session 4: Protocol and Communication
V. H. Gupta , Indian Institute of Science,Bangalore, India
K. Gopinath , Indian Institute of Science,Bangalore, India
pp. 100-107
Thomas Berger , University of Salzburg
pp. 108-115
Thi Mai Trang Nguyen , University of Lausanne, Switzerland
Mohamed Ali Sfaxi, , University of Lausanne, Switzerland
Solange Ghernaouti-Helie , University of Lausanne, Switzerland
pp. 116-123
Alban Gabillon , Laboratoire d?Informatique de l?Universit? de Pau et des Pays de l?Adour, France
Laurent Gallon , Laboratoire d?Informatique de l?Universit? de Pau et des Pays de l?Adour, France
pp. 124-131
Session 5: Security as Quality of Service
Yih Huang , George Mason University, Fairfax, VA
David Arsenault , George Mason University, Fairfax, VA
Arun Sood , George Mason University, Fairfax,
pp. 132-139
George Yee , Institute for Information Technology National Research Council Canada
pp. 140-147
Juan Vera del Campo , Polytechnic University of Catalonia, Spain
Josep Pegueroles , Polytechnic University of Catalonia, Spain
Miguel Soriano , Polytechnic University of Catalonia, Spain
pp. 148-155
Karin Sallhammar , Norwegian University of Science and Technology
Bjarne E. Helvik , Norwegian University of Science and Technology
Svein J. Knapskog , Norwegian University of Science and Technology
pp. 156-165
Session 6: Networking and Fault Tolerance
Mourad Elhadef , University of Ottawa, Ottawa, Canada
Shantanu Das , University of Ottawa, Ottawa, Canada
Amiya Nayak , University of Ottawa, Ottawa, Canada
pp. 166-173
Rene Rydhof Hansen , Technical University of Denmark
Christian W. Probst , Technical University of Denmark
Flemming Nielson , Technical University of Denmark
pp. 174-181
Y.-S. Lin , National Taiwan University
P.-H. Tsang , National Taiwan University
C.-H. Chen , National Taiwan University
C.-L. Tseng , National Taiwan University
Y.-L. Lin , National Taiwan University
pp. 182-189
Yao Gang , Graduate School of Chinese Academy of Sciences, Beijing
Feng Dengguo , Graduate School of Chinese Academy of Sciences, Beijing
pp. 190-197
Session 7: Identification and Authentication
Feng Cao , Cisco Systems, INC
Cullen Jennings , Cisco Systems, INC
pp. 198-205
Judith E. Y. Rossebo , NTNU, Department of Telematics, and Telenor R&D, N-1331 Fornebu, Norway
Rolv Br? , NTNU, Department of Telematics N-7491 Trondheim, Norway
pp. 206-215
Maurizio A. Strangio , University of Rome "Tor Vergata", ITALY
pp. 216-223
Hugo Proenca , Universidade da Beira Interior, Covilha, Portugal
Luis A. Alexandre , Universidade da Beira Interior, Covilha, Portugal
pp. 224-228
Frederic Cuppens , GET/ENST Bretagne, 2 rue de la Chataigneraie, 35512 Cesson Sevigne Cedex, France
Nora Cuppens-Boulahia , GET/ENST Bretagne, 2 rue de la Chataigneraie, 35512 Cesson Sevigne Cedex, France
Tony Ramard , GET/ENST Bretagne, 2 rue de la Chataigneraie, 35512 Cesson Sevigne Cedex, France
pp. 229-239
Session 8: High Availability and Dependability
R.W. Helms , Utrecht University, Institute of Information and Computing Science, The Netherlands
S. Van Oorschot , Utrecht University, Institute of Information and Computing Science, The Netherlands
J. Herweijer , Utrecht University, Institute of Information and Computing Science, The Netherlands
M. Plas , Getronics, The Netherlands
pp. 240-244
Christian Storm , University of Oldenburg, Germany
Oliver Theel , University of Oldenburg, Germany
Carl Von Ossietzky , University of Oldenburg, Germany
pp. 245-253
P. Neira , ETS Ingenieria Informatica, SEVILLE - Spain
Laurent Lef`evre , INRIA RESO - LIP Laboratory, LYON 07 - France
R.M. Gasca , ETS Ingenieria Informatica, SEVILLE - Spain
pp. 254-261
Jiong Zhang , Queen?s University, Kingston, Canada
Mohammad Zulkernine , Queen?s University, Kingston, Canada
pp. 262-269
Wei Wang , University of Trento, Italy
Roberto Battiti , University of Trento, Italy
pp. 270-279
Session 9: Reliability and Availability
Sozo Inoue , Kyushu University, Japan
Hiroto Yasuura , Kyushu University, Japan
Daisuke Hagiwara , Sony Global Solutions Inc.
pp. 280-286
Cas Cremers , Eindhoven University of Technology, Netherlands
pp. 287-294
Michael Jarrett , University of Waterloo, Canada
Rudolph Seviora , University of Waterloo, Canada
pp. 295-299
Javier Cano , Universidad Rey Juan Carlos, Madrid, Spain
David Rios , Universidad Rey Juan Carlos, Madrid, Spain
pp. 300-304
Hertong Song , Louisiana Tech University
Chokchai "box" Leangsuksun , Louisiana Tech University
Raja Nassar , Louisiana Tech University
pp. 305-313
Session 10: Security and Privacy Issue
Man Lin , St. Francis Xavier University, Canada
Laurence T. Yang , St. Francis Xavier University, Canada
pp. 314-320
George Yee , National Research Council Canada
Larry Korba , National Research Council Canada
Ronggong Song , National Research Council Canada
pp. 321-328
Nevena Stolba , Vienna University of Technology, Austria
Marko Banek , University of Zagreb, Croatia
A Min Tjoa , Vienna University of Technology, Austria
pp. 329-339
Melanie Volkamer , DFKI GmbH, Saarbrucken, Germany
Robert Krimmer , Institute for Production Management, Vienna
pp. 340-347
Zhiqiang Lin , Nanjing University, Nanjing, 210093, China
Bing Mao , Nanjing University, Nanjing, 210093, China
Li Xie , Nanjing University, Nanjing, 210093, China
pp. 348-357
Session 11: Security Management
David G. Rosado , University of Castilla-La Mancha, Spain
Eduardo Fernandez-Medina , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
Carlos Gutierrez , STL. Calle Manuel Tovar 9, 28034 Madrid, Spain
pp. 358-365
Thomas Neubauer , Institute of Software Technology and Interactive Systems Vienna University of Technology, Austria
Christian Stummer , School of Business, Economics,and Statistics, Vienna University of Technology, Austria
Edgar Weippl , Institute of Software Technology and Interactive Systems Vienna University of Technology, Austria
pp. 366-373
Klaus Plobl , University of Regensburg, 93040 Regensburg, Germany
Thomas Nowey , University of Regensburg, 93040 Regensburg, Germany
Christian Mletzko , University of Regensburg, 93040 Regensburg, Germany
pp. 374-381
Yohann Thomas , France Telecom R&D
Herve Debar , France Telecom R&D
Benjamin Morin , Supelec Avenue de la Boulaie - France
pp. 382-389
Serge Abiteboul , INRIA & LRI-Univ. of Paris-Sud, France
Bogdan Cautis , INRIA & LRI-Univ. of Paris-Sud, France
Amos Fiat , Tel-Aviv Univ.
Tova Milo , Tel-Aviv Univ.
pp. 390-399
Session 12: Distributed Systems
J. Osrael , Vienna University of Technology
L. Froihofer , Vienna University of Technology
K. M. Goeschka , Vienna University of Technology
S. Beyer , Universidad Politecnica de Valencia, Spain
P. Galdamez , Universidad Politecnica de Valencia, Spain
F. Munoz , Universidad Politecnica de Valencia, Spain
pp. 400-407
Stefan Beyer , Universidad Politecnica de Valencia, Spain
Alexander Sanchez , Universidad Politecnica de Valencia, Spain
Francesc D. Munoz-Escoi , Universidad Politecnica de Valencia, Spain
Pablo Galdamez , Universidad Politecnica de Valencia, Spain
pp. 408-415
Stefano Bistarelli , Universita degli Studi "G. d?Annunzio" Pescara, Italy
Fabio Fioravanti , Universita degli Studi "G. d?Annunzio" Pescara, Italy
Pamela Peretti , Universita degli Studi "G. d?Annunzio" Pescara, Italy
pp. 416-423
Amir Hayat , Graz Univ. of Tech. 8010 Graz, Austria
Thomas Rossler , Graz Univ. of Tech. 8010 Graz, Austria
Muhammad Alam , Universitat Innsbruck , 6020 Innsbruck, Austria
pp. 424-431
Davrondzhon Gafurov , Gjovik University College, Norway
Kirsi Helkala , Gjovik University College, Norway
Torkjel Sondrol , Gjovik University College, Norway
pp. 432-439
Session 13: Software Security and Dependability
L. E. Moser , University of California, Santa Barbara
P. M. Melliar-Smith , University of California, Santa Barbara
Wenbing Zha , Cleveland State University, Cleveland, OH
pp. 440-448
R. Remenyte , Loughborough University; Loughborough,Leicestershire, England
J.D. Andrews , Loughborough University; Loughborough,Leicestershire, England
pp. 449-457
Thomas Neubauer , Vienna University of Technology, Austria
Markus Klemen , Vienna University of Technology, Austria
Stefan x Biffl , Vienna University of Technology, Austria
pp. 457-464
Torsten Priebe , Capgemini Consulting Osterreich AG Lassallestrabe 9b, A-1020 Vienna, Austria
Wolfgang Dobmeier , University of Regensburg, D-93040 Regensburg, Germany
Nora Kamprath , University of Regensburg, D-93040 Regensburg, Germany
pp. 465-472
Calin Ciufudean , University of Suceava, 9 University str., RO-720225, Romania
Adrian Graur , University of Suceava, 9 University str., RO-720225, Romania
Constantin Filote , University of Suceava, 9 University str., RO-720225, Romania
Cornel Turcu , University of Suceava, 9 University str., RO-720225, Romania
Valentin Popa , University of Suceava, 9 University str., RO-720225, Romania
pp. 473-481
Session 1: IP Network and Adhoc Network
Marc Conrad , University of Luton, Park Square, Luton, Bedfordshire, LU1 3JU, United Kingdom.
Tim French , University of Luton, Park Square, Luton, Bedfordshire, LU1 3JU, United Kingdom
Wei Huang , University of Luton, Park Square, Luton, Bedfordshire, LU1 3JU, United Kingdom
Carsten Maple , University of Luton, Park Square, Luton, Bedfordshire, LU1 3JU, United Kingdom
pp. 482-487
Arjan Durresi , Louisiana State University, USA
Lyn Evans , Louisiana State University, USA
Vamsi Paruchuri , Louisiana State University, USA
Leonard Barolli , Fukuoka Institute of Technology, Japan
pp. 488-495
Feng Cao , Cisco Systems, INC.
Saadat Malik , Cisco Systems, INC.
pp. 496-501
Muhammad Sher , Technical University Berlin & Fokus Fraunhofer Institute, Berlin, Germany
Thomas Magedanz , Technical University Berlin & Fokus Fraunhofer Institute, Berlin, Germany
Walter T. Penzhorn , University of Pretoria South Africa
pp. 502-509
Hyangjin Lee , Korea Information Security Agency
Jeeyeon Kim , Korea Information Security Agency
pp. 510-514
Session 2: Wireless and Sensor Network
Dong Seong Kim , Hankuk Aviation University
Khaja Mohammad Shazzad , Hankuk Aviation University
Jong Sou Park , Hankuk Aviation University
pp. 515-522
Valer BOCAN , Politehnica University of Timisoara
Vladimir CRETU , Politehnica University of Timisoara
pp. 523-528
Amirhosein Taherkordi , Iran University of Science and Technology
Majid Alkaee Taleghan , Iran University of Science and Technology
Mohsen Sharifi , Iran University of Science and Technology
pp. 529-535
Jin-Cherng Lin , Tatung University
Yu-Hsin Kao , Tatung University
Chen-Wei Yang , Tatung University
pp. 536-543
Session 3: Authentication and Authorization
Carlos Villarrubia , University of Castilla-La Marzcha, Spain
Eduardo Fernhndez-Medina , University of Castilla-La Marzcha, Spain
Mario Piattini , University of Castilla-La Marzcha, Spain
pp. 544-550
Yoshio KAKIZAKI , Tokai University Unified Graduate School, Japan
Hiroshi YAMAMOTO , School of Information Technology and Electronics, Tokai University, Japan
Hidekazu TSUJI , School of Information Technology and Electronics, Tokai University, Japan
pp. 551-557
MingChu LI , Dalian University of Technology
Hongyan YAO , Dalian University of Technology
Jianbo MA , Tianjin University
pp. 558-562
Session 4: Trust Management and Recovery
Cristina Satizabal , Pamplona University, Pamplona, Colombia
Rafael Paez , Technical University of Catalonia, Barcelona, Spain
Jordi Forne , Technical University of Catalonia, Barcelona, Spain
pp. 563-570
MingChu LI , Dalian University of Technology, China
Hongyan YAO , Dalian University of Technology, China
pp. 571-576
Naoyuki Nagatou , Tokyo Institute of Technology
Takuo Watanabe , Tokyo Institute of Technology.
pp. 577-584
Session 5: Secure Information System
Lu?s Enrique Sanchez , SICAMAN NT., Spain
Daniel Villafranca , SICAMAN NT., Spain
Eduardo Fernandez-Medina , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
pp. 585-592
Gerd Saurer , Senactive IT Dienstleistungs GmbH
Alexander Schatten , Institute for Software Technology and Interactive Systems
pp. 593-600
Jingde Cheng , Saitama University, Saitama, 338-8570, Japan
Junichi Miura , Saitama University, Saitama, 338-8570, Japan
pp. 601-608
Zude Li , Tsinghua University, Beijing, China
Guoqiang Zhan , Tsinghua University, Beijing, China
Xiaojun Ye , Tsinghua University, Beijing, China
pp. 609-616
Session 6: Availability
Jose Daniel Garcia , Universidad Carlos III de Madrid, Spain
Jesus Carretero , Universidad Carlos III de Madrid, Spain
Javier Fernandez , Universidad Carlos III de Madrid, Spain
Felix Garcia , Universidad Carlos III de Madrid, Spain
David E. Singh , Universidad Carlos III de Madrid, Spain
Alejandro Calderon , Universidad Carlos III de Madrid, Spain
pp. 617-624
S M Rizwan , Caledonian College of Engineering, Sultanate of Oman
K P Ramachandran , Caledonian College of Engineering, Sultanate of Oman
pp. 625-630
Jingde Cheng , Saitama University, Saitama, 338-8570, Japan
pp. 631-638
C. Engelmann , University of Reading, Reading, RG6 6AH, UK
S. L. Scott , Oak Ridge National Laboratory, Oak Ridge, TN
C. Leangsuksun , Louisiana Tech University, Ruston, LA
X. He , Tennessee Technological University, Cookeville, TN
pp. 639-645
Session 7: Software Security 1
Erland Jonsson , Chalmers University of Technology, Sweden
pp. 646-653
Daniel Mellado , Quality, Auditing and Security Institute, Madrid, Spain
Eduardo Fernandez-Medina , UCLM-Soluziona Research and Development Institute, Spain
Mario Piattini , UCLM-Soluziona Research and Development Institute, Spain
pp. 654-661
Walter Binder , Artificial Intelligence Laboratory, Lausanne, Switzerland
pp. 662-669
Session 8: Software Security 2
Alfonso Rodriguez , Universidad del Bio Bio, La Castilla, Chile
Eduardo Fernandez-Medina , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
pp. 670-677
Rodolfo Villarroel , Catholic University of Maule, Chile
Emilio Soler , University of Matanzas, Cuba
Eduardo Fernandez-Medina , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
Juan Trujillo , University of Alicante, Spain
pp. 678-684
Muhammad Alam , Universitat Innsbruck, Austria
Ruth Breu , Universitat Innsbruck, Austria
Michael Hafner , Universitat Innsbruck, Austria
pp. 685-692
Session 9: Safety and Security
E. M. Kelly , Loughborough University, UK
L. M. Bartlett , Loughborough University, UK
pp. 693-700
Kenji Saito , Keio University
Eiichi Morino , Gesell Research Society Japan
Jun Murai , Keio University
pp. 701-708
Session 10: E-commerce and E-Government
Christian Schlager , University of Regensburg, Germany
Thomas Nowey , University of Regensburg, Germany
Jose A. Montenegro , University of Malaga, Spain
pp. 709-716
Magdalena Payeras-Capella , Universitat de les Illes Balears
Josep Llu?s Ferrer-Gomila , Universitat de les Illes Balears
Llorenc Huguet-Rotger , Universitat de les Illes Balears
pp. 717-722
Thomas Neubauer , Vienna University of Technology, Austria
Edgar Weippl , Vienna University of Technology, Austria
Stefan Biffl , Vienna University of Technology, Austria
pp. 723-731
Session 1: Construction of Dependable Overlay Networks
Barbara Emmert , Telecommunications Research Center Vienna, Austria
Andreas Binzenhofer , University of Wurzburg, Germany
pp. 732-739
Matthew Leslie , Oxford University Department of Physics
Jim Davies , Oxford University Computing Laboratory
Todd Huffman , Oxford University Department of Physics
pp. 740-747
Session 2: Security
Yuuki Takano , Japan Advanced Institute of Science and Technology
Naoki Isozaki , Japan Advanced Institute of Science and Technology
Yoichi Shinoda , Japan Advanced Institute of Science and Technology
pp. 748-755
Jochen Dinger , Universitat Karlsruhe (TH), Germany
Hannes Hartenstein , Universitat Karlsruhe (TH), Germany
pp. 756-763
Session 3: Social Front
Kenji Saito , Keio University
Eiichi Morino , Gesell Research Society Japan
Jun Murai , Keio University
pp. 764-771
Yusuke DOI , TOSHIBA Corporation
Shirou WAKAYAMA , TOSHIBA Corporation
Masahiro ISHIYAMA , TOSHIBA Corporation
Satoshi OZAKI , TOSHIBA Corporation
Tomohiro ISHIHARA , Keio University
Yojiro UO , IIJ Research Laboratory
pp. 772-778
Hameeda Alshabib , University of Glamorgan, UK
Omer F. Rana , Cardiff University, 5 The Parade Cardiff, UK
Ali Shaikh Ali , Cardiff University, 5 The Parade Cardiff, UK
pp. 779-787
Workshop on Bayesian Networks in Dependability (BND2006)
Christophe SIMON , CRAN UMR 7039, CNRS-UHP-INPL, France
Philippe WEBER , CRAN UMR 7039, CNRS-UHP-INPL, France
pp. 788-793
Sam Maes , LITIS Laboratory, INSA Rouen, Cedex, France
Philippe Leray , LITIS Laboratory, INSA Rouen, Cedex, France
pp. 794-798
Veronique Delcroix , University of Valenciennes, Cedex, France
Mohamed-Amine Maalej , University of Valenciennes, Cedex, France
Sylvain Piechowiak , University of Valenciennes, Cedex, France
pp. 799-803
S. Montani , Universita del Piemonte Orientale
L. Portinale , Universita del Piemonte Orientale
A. Bobbio , Universita del Piemonte Orientale
D. Codetta-Raiteri , Universita del Piemonte Orientale
pp. 804-809
Ashley Russell , University of Strathclyde, Glasgow UK
John Quigley , University of Strathclyde, Glasgow UK
Robert Van der Meer , University of Strathclyde, Glasgow UK
pp. 810-816
Martin Neil , Agena Ltd
Manesh Tailor , Agena Ltd
Norman Fenton , Agena Ltd
David Marquez , University of London
Peter Hearty , University of London
pp. 817-823
Workshop on Dependability in Large-scale Service-oriented Systems (DILSOS)
Jaka Mo?cnik , XLAB d.o.o., Ljubljana, Slovenia
Piotr Karwaczynski , Wroclaw University of Technology, Wroclaw, Poland
pp. 824-831
Alexander Bohm , Universitat Mannheim, Germany
Carl-Christian Kanne , Universitat Mannheim, Germany
Guido Moerkotte , Universitat Mannheim, Germany
pp. 832-839
Raman Kazhamiakin , DIT, University of Trento, Italy
Paritosh Pandya , Tata Institute of Fundamental Research, Mumbai, India
Marco Pistore , DIT, University of Trento, Italy
pp. 840-846
Lukasz Juszczyk , Vienna University of Technology
Jaroslaw Lazowski , Vienna University of Technology
Schahram Dustdar , Vienna University of Technology
pp. 847-854
A. Sousa , A. Sousa
A. Jr. Correia , A. Correia Jr.
F. Moura , F. Moura
J. Pereira , J. Pereira
R. Oliveira , R. Oliveira
pp. 855-863
Workshop: Security in E-Learning (SEL)
Jordi Castella-Roca , Rovirai Virgili University of Tarragona
Jordi Herrera-Joancomarti , Universitat Oberta de Catalunya, Av. Tibidabo 39, 08035 Barcelona
Aleix Dorca-Josa , Universitat d?Andorra
pp. 864-871
Elke Franz , Dresden University of Technology, Germany
Katrin Borcea-Pfitzmann , Dresden University of Technology, Germany
pp. 872-878
Elke Franz , Dresden University of Technology, Germany
Hagen Wahrig , Dresden University of Technology, Germany
Alexander Boettcher , Dresden University of Technology, Germany
Katrin Borcea-Pfitzmann , Dresden University of Technology, Germany
pp. 879-886
Carine G. Webber , University of Caxias do Sul - Brazil
Maria De Fatima , University of Caxias do Sul - Brazil
W. Do Prado Lima , University of Caxias do Sul - Brazil
Marcos E. Casa , University of Caxias do Sul - Brazil
Alexandre M. Ribeiro , University of Caxias do Sul - Brazil
pp. 887-894
Marek Hatala , Simon Fraser University, British Columbia, Canada
Ty Mey (Timmy) Eap , Simon Fraser University, British Columbia, Canada
Ashok Shah , Simon Fraser University, British Columbia, Canada
pp. 895-903
Workshop - Dependability Aspects on Data WArehousing and Mining Applications (DAWAM 2006)
Vasilis Aggelis , WINBANK (PIRAEUSBANK SA)
pp. 904-905
Emilio Soler , Universidad de Matanzas, Cuba
Rodolfo Villarroel , Universidad Catolica del Maule, Chile
Juan Trujillo , Universidad de Alicante, Spain
Eduardo Fernandez-Medina , Universidad de Castilla-La Mancha, Spain
Mario Piattini , Universidad de Castilla-La Mancha, Spain
pp. 914-921
Agusti Solanas , Universitat Rovira i Virgili, Catalonia, Spain
Antoni Martinez-Balleste , Universitat Rovira i Virgili, Catalonia, Spain
Josep Domingo-Ferrer , Universitat Rovira i Virgili, Catalonia, Spain
Josep M. Mateo-Sanz , Universitat Rovira i Virgili, Catalonia, Spain
pp. 922-928
Marcin Gorawski , Silesian University of Technology
Karol Stachurski , Silesian University of Technology
pp. 936-943
H. Michael Chung , California State University, Long Beach
pp. 944-949
Workshop on Bioinformatics and Security (BIOS 06)
R. Sinnott , University of Glasgow,
M. Bayer , University of Glasgow
A. Stell , University of Glasgow
J. Koetsier , University of Edinburgh
pp. 950-957
Carsten Maple , University of Luton, Luton, Bedfordshire, UK
Peter Norrington , Kinetic Solutions, UK
pp. 958-964
C. Blanchet , CNRS; Univ. Lyon 1, France
R. Mollon , CNRS; Univ. Lyon 1, France
G. Deleage , CNRS; Univ. Lyon 1, France
pp. 965-973
Workshop: Information Security Risk Management (ISRM)
Christer Magnusson , Stockholm University/Royal Institute of Technology, Sweden
Heidi Ola , Stockholm University/Royal Institute of Technology, Sweden
Camilla Silversjo Holmqvist , Stockholm University/Royal Institute of Technology, Sweden
pp. 974-979
Ruedi Baer , BSG Unternehmensberatung
Martin Dietrich , lic. oec. HSG, CISA BSG Unternehmensberatung
pp. 980-981
Sabine Delaitre , ICT Unit, IPTS, JRC, European Commission, Sevilla, Spain
pp. 982
Workshop - Dependability and Security in e-Government (DeSeGov 2006)
J W Bryans , University of Newcastle upon Tyne, UK
B Littlewood , Centre for Software Reliability,City University, London, UK
P Y A Ryan , University of Newcastle upon Tyne, UK
L Strigini , Centre for Software Reliability, City University, London, UK
pp. 988-995
Omar Batarfi , University of Newcastle upon Tyne, UK
Lindsay Marshall , University of Newcastle upon Tyne, UK
pp. 996-1003
Daniel Beer , Chemnitz University of Technology, Germany
Raphael Kunis , Chemnitz University of Technology, Germany
Gudula Runger , Chemnitz University of Technology, Germany
pp. 1004-1011
Carsten Maple , University of Luton, Luton, Bedfordshire, LU1 3JU, UK
Helen Jacobs , Modern Networks, Knowl Piece, Wilbury Way, Hitchin, UK
Matthew Reeve , Modern Networks, Knowl Piece, Wilbury Way, Hitchin, UK
pp. 1025-1032
M. Karyda , University of the Aegean, Samos, Greece
T. Balopoulos , University of the Aegean, Samos, Greece
L. Gymnopoulos , University of the Aegean, Samos, Greece
S. Kokolakis , University of the Aegean, Samos, Greece
C. Lambrinoudakis , University of the Aegean, Samos, Greece
S. Gritzalis , University of the Aegean, Samos, Greece
S. Dritsas , Athens University of Economics and Business
pp. 1033-1037
Semir Daskapan , Delft University of Technology
pp. 1038-1044
Author Index
Author Index (PDF)
pp. 1045
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool