• A
  • ARES
  • 2007
  • The Second International Conference on Availability, Reliability and Security (ARES'07)
Advanced Search 
The Second International Conference on Availability, Reliability and Security (ARES'07)
Vienna, Austria
April 10-April 13
ISBN: 0-7695-2775-2
Table of Contents
Introduction
Session 1: Trust Model & Trust Management
Yudistira Asnar, University of Trento
Paolo Giorgini, University of Trento
Fabio Massacci, University of Trento
Nicola Zannone, University of Trento
pp. 19-26
Ching Lin, Macquarie University, Sydney, Australia
Vijay Varadharajan, Macquarie University, Sydney, Australia
pp. 35-42
Session 2: Availability, Fault-Tolerant & Recovery
Johannes Osrael, Vienna University of Technology
Lorenz Froihofer, Vienna University of Technology
Norbert Chlaupek, University of Applied Sciences fh-campus wien, Daumegasse 5, 1100 Vienna, Austria
Karl M. Goeschka, Vienna University of Technology
pp. 53-60
Marcin Gorawski, Silesian University of Technology, Poland
Pawel Marks, Silesian University of Technology, Poland
pp. 61-68
Stefan Beyer, Universidad Politecnica de Valencia
Francesc D. Munoz-Esco, Universidad Politecnica de Valencia
Pablo Galdamez, Universidad Politecnica de Valencia
pp. 69-76
Bin Rong, RMIT University, Melbourne, Australia
Fred Douglis, IBM T. J. Watson Research Center Hawthorne, NY, USA
Cathy H. Xia, IBM T. J. Watson Research Center Hawthorne, NY, USA
Zhen Liu, IBM T.J. Watson Research Center, USA
pp. 77-84
J.E. Armendariz, Instituto Tecnologico de Informatica, Valencia, Spain
F.D. Munoz-Esco, Instituto Tecnologico de Informatica, Valencia, Spain
J.R. Juarez, Universidad Publica de Navarra, Spain
J.R. G. de Mendivil, Universidad Publica de Navarra, Spain
B. Kemme, McGill University, Canada
pp. 85-92
Ruben de Juan-Marin, Universidad Politecnica de Valencia
Hendrik Decker, Universidad Politecnica de Valencia
Francesc D. Munoz-Esco, Universidad Politecnica de Valencia
pp. 93-102
Session 3: Reputation Management & Trust
Sini Ruohomaa, University of Helsinki
Lea Kutvonen, University of Helsinki
Eleni Koutrouli, National University of Athens
pp. 103-111
Audun Josang, Queensland University of Technology
Jochen Haller, SAP Research Germany
pp. 112-119
Sebastian Gajek, Ruhr-University Bochum, Germany
Ahmad-Reza Sadeghi, Ruhr-University Bochum, Germany
Christian Stuble, Ruhr-University Bochum, Germany
Marcel Winandy, Ruhr-University Bochum, Germany
pp. 120-127
Session 4: Privacy & Access Control
Oliver Jorns, Telecommunications Research, Vienna, Austria
Oliver Jung, Telecommunications Research, Vienna, Austria
Gerald Quirchmayr, University of Vienna
pp. 139-146
Pankaj Bhaskar, Marquette University, Milwaukee, WI, USA
Sheikh I Ahamed, Marquette University, Milwaukee, WI, USA
pp. 147-154
Christin Groba, Technische Universitat Dresden, Germany
Stephan Grob, Technische Universitat Dresden, Germany
Thomas Springer, Technische Universitat Dresden, Germany
pp. 155-161
Session 5: Failure Detection & Attack Prevention
P. Hazy, University of Waterloo, Canada
R. E. Seviora, University of Waterloo, Canada
pp. 173-181
Yanlan Ding, Graduate University of Chinese Academy of Sciences, Beijing
Guiping Su, Graduate University of Chinese Academy of Sciences, Beijing
pp. 190-197
Muhammad Sher, Technical University Berlin/Fokus Fraunhofer Telecommunication Institute, Germany
Thomas Magedanz, Technical University Berlin/Fokus Fraunhofer Telecommunication Institute, Germany
pp. 198-205
Meriam Ben Ghorbel, Digital Security Unit, Higher School of Communication,Tunis, Tunisia
Mehdi Talbi, Digital Security Unit, Higher School of Communication,Tunis, Tunisia
Mohamed Mejri, Laval University,Quebec, Canada
pp. 206-212
Session 6: Authentication & Authorisation
Tieyan Li, Institute for Infocomm Research, Singapore
Robert Deng, Singapore Management University
pp. 238-245
Georg Treu, Mobile and Distributed Systems Group, Institute for Informatics
Florian Fuchs, Mobile and Distributed Systems Group, Institute for Informatics
Christiane Dargatz, Ludwig-Maximilian University Munich, Germany
pp. 263-272
Session 7: Security Algorithm & Framework
M. Zeghida, LESTER-University of South Brittany, Lorient, France
B. Bouallegue, Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
A. Baganne, LESTER-University of South Brittany, Lorient, France
M. Machhout, Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
R. Tourki, Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
pp. 281-285
J. Todd McDonald, Air Force Institute of Technology, Wright Patterson AFB, OH
Alec Yasinsac, Florida State University
pp. 286-293
Emilio Soler, University of Matanzas,Cuba
Juan Trujillo, University of Alicante, Spain
Eduardo Fern?ndez-Medina, University of Castilla-La Mancha
Mario Piattini, University of Castilla-La Mancha
pp. 294-300
Session 8: Software Security
David Byers, Linkopings universitet, SE-58183 Linkoping, Sweden
Nahid Shahmehri, Linkopings universitet, SE-58183 Linkoping, Sweden
pp. 301-309
Christoph Kraub, University of Technology, Darmstadt, Germany
Markus Schneider, Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany
Kpatcha Bayarou, Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany
Claudia Eckert, Darmstadt University of Technology, Darmstadt, Germany
pp. 310-317
Bernhard Riedl, Secure Business Austria
Thomas Neubauer, Secure Business Austria
Gernot Goluch, Secure Business Austria
Oswald Boehm, Braincon Technologies, Vienna, Austria
Gert Reinauer, Braincon Technologies, Vienna, Austria
Alexander Krumboeck, Braincon Technologies, Vienna, Austria
pp. 318-324
Thomas Nowey, University of Regensburg Germany
Hannes Federrath, University of Regensburg Germany
pp. 325-334
Session 9: Security Models
Raihan Al-Ekram, University of Waterloo, Canada
Ric Holt, University of Waterloo, Canada
Chris Hobbs, Nortel, Ottawa, Canada
pp. 351-355
Denis Hatebur, University Duisburg-Essen, Germany
Maritta Heisel, University Duisburg-Essen, Germany
Holger Schmidt, University Duisburg-Essen, Germany
pp. 356-365
Stefan Durbeck, University of Regensburg
Rolf Schillinger, University of Regensburg
Jan Kolter, University of Regensburg
pp. 366-373
Session 10: Miscellaneous Security Techniques
Vidar Evenrud Seeberg, Norsvin, Hamar, Norway
Slobodan Petrovic, Gjovik University College, P.O. box 191, N-2802 Gjovik, Norway
pp. 385-390
Valentina Casola, University of Naples, Federico II, Italy
Nicola Mazzocca, University of Naples, Federico II, Italy
Jesus Luna, Universitat Polit?cnica de Catalunya, Spain
Oscar Manso, Universitat Polit?cnica de Catalunya, Spain
Manel Medina, Universitat Polit?cnica de Catalunya, Spain
pp. 391-399
Mansoor Ahmed, Vienna University of Technology
Amin Anjomshoaa, Vienna University of Technology
Tho Manh Nguyen, Vienna University of Technology
A Min Tjoa, Vienna University of Technology
pp. 400-407
TingMao Chang, Information Engineering University,Henan, China
YueFei Zhu, Information Engineering University,Henan, China
Jin Zhou, Information Engineering University,Henan, China
YaJuan Zhang, Guangzhou University, China
pp. 408-416
Session 11: eAuction & eVoting Protocol
Brian Curtis, Australian Catholic University
Josef Pieprzyk, Macquarie University
Jan Seruga, Australian Catholic University
pp. 417-421
Session 12: Dependability in Distributed & Ubiquitous Computing
Lu Yan, University College London
Kaisa Sere, Abo Akademi University, Finland
pp. 451-453
Session 13: Anomaly & Intrusion Detection
Surekha Mariam Varghese, M.A. College of Engineering Kothamangalam, India
K.Poulose Jacob, Cochin University of Science and Technology, Kochi, India
pp. 473-479
Session 1: Fault-Tolerant & Availability
Yanlong Wang, Northwestern Polytechnical University
Zhanhuai Li, Northwestern Polytechnical University
Wei Lin, Northwestern Polytechnical University
pp. 499-505
Keiji Ozaki, Tokyo Denki University, Japan
Naohiro Hayashibara, Tokyo Denki University, Japan
Tomoya Enokido, Rissho University, Japan
Makoto Takizawa, Tokyo Denki University, Japan
pp. 506-516
Session 2: Access Control
Vipin Singh Mewar, Indian Institute of Technology, Kharagpur, India
Subhendu Aich, Indian Institute of Technology, Kharagpur, India
Shamik Sural, Indian Institute of Technology, Kharagpur, India
pp. 524-531
Joaquin G. Alfaro, Universitat Oberta de Catalunya
Frederic Cuppens, GET/ENST-Bretagne, France
Nora Cuppens-Boulahia, GET/ENST-Bretagne, France
pp. 532-542
Session 3: Authentication
Arjan Durresi, Baton Rouge, Louisiana, USA
Vamsi Paruchuri, Louisiana State University
Mimoza Durresi, Fukuoka Institute of Technology, Fukuoka, Japan
Leonard Barolli, Fukuoka Institute of Technology, Fukuoka, Japan
pp. 543-549
HE Yijun, Central South University
XU Nan, City University of Hong Kong, Kowloon
LI Jie, City University of Hong Kong, Kowloon
pp. 558-563
Yao Gang, Graduate University of Chinese Academy of Sciences
Feng Dengguo, Graduate University of Chinese Academy of Sciences
Han Xiaoxi, Graduate University of Chinese Academy of Sciences
pp. 564-574
Session 4: Real-Time System & Sensor Network
Dong Seong Kim, Hankuk Aviation University, Seoul, Korea
Chung Su Yang, Hankuk Aviation University, Seoul, Korea
Jong Sou Park, Hankuk Aviation University, Seoul, Korea
pp. 575-579
Christian Buckl, Technische Universitat Munchen, Germany
Matthias Regensburger, Technische Universitat Munchen, Germany
Alois Knoll, Technische Universitat Munchen, Germany
Gerhard Schrott, Technische Universitat Munchen, Germany
pp. 580-587
Bastian Preindl, Vienna University of Technology
Alexander Schatten, Vienna University of Technology
pp. 588-598
Session 5: RFID Techniques & Applications
Qinghan Xiao, Defence Research and Development Canada Ottawa
Cam Boulet, Defence Research and Development Canada Ottawa
Thomas Gibbons, Operational Support Transformation - CANOSCOM
pp. 599-605
Geethapriya Venkataramani, Applied Research Group, Satyam Computers Services Limited
Srividya Gopalan, Applied Research Group, Satyam Computers Services Limited
pp. 610-620
Session 6: Secure Solution & Applications
Georgios Kambourakis, University of the Aegean, Karlovassi, Greece
Eleni Klaoudatou, University of the Aegean, Karlovassi, Greece
Stefanos Gritzalis, University of the Aegean, Karlovassi, Greece
pp. 637-643
Emilio Soler, University of Matanzas, Cuba
Juan Trujillo, University of Alicante
Eduardo Fern?ndez-Medina, University of Castilla-La Mancha, Spain
Mario Piattini, University of Castilla-La Mancha, Spain
pp. 644-654
Session 7: Security Issue in Business Management
Regine Endsuleit, Universitat Karlsruhe (TH) IAKS Germany
Christoph Amma, Universitat Karlsruhe (TH) IAKS Germany
pp. 655-662
Thomas Neubauer, Secure Business Austria
Gernot Goluch, Secure Business Austria
Bernhard Riedl, Secure Business Austria
pp. 670-680
Session 8: Web, XML, Content Management
William Bradley Glisson, University of Glasgow
L. Milton Glisson, N. C. A&T State University
Ray Welland, N. C. A&T State University
pp. 681-688
Viet Hung Nguyen, University of Technology, Vietnam
Tran Khanh Dang, University of Technology, Vietnam
Nguyen Thanh Son, University of Technology, Vietnam
Josef Kung, Johannes Kepler University of Linz, Austria
pp. 689-696
Session 9: Security Policies & Techniques
Januszkiewicz Paulina, Academy of Business in D?browa G?rnicza, Poland
Pyka Marek, Academy of Business in D?browa G?rnicza, Poland
pp. 715-722
S. Pozo, University of Seville, Spain
R. Ceballos, University of Seville, Spain
R. M. Gasca, University of Seville, Spain
pp. 723-729
Gernot Goluch, Secure Business Austria
Andreas Ekelhart, Secure Business Austria
Stefan Fenz, Secure Business Austria
Stefan Jakoubi, Secure Business Austria
Bernhard Riedl, Secure Business Austria
Simon Tjoa, Secure Business Austria
pp. 730-740
Session 10: Trust Management & Trust Model
Zhang Lin, Nanjing University, China
Xu Feng, Nanjing University, China
Wang Yuan, Nanjing University, China
Lv Jian, Nanjing University, China
pp. 765-774
Session 11: Miscellaneous Applications
Niraj Swami, Marquette University, Milwaukee, WI, USA
Sheikh I Ahamed, Marquette University, Milwaukee, WI, USA
pp. 783-790
Rafael P?ez, Technical University of Catalonia, Barcelona, Spain
Cristina Satiz?bal, Pamplona University, Pamplona, Colombia
Jordi Forne, Technical University of Catalonia, Barcelona, Spain
pp. 791-798
C. Mauri, Lleida University, Spain
T. Granollers, Lleida University, Spain
A. Solanas, Universitat Rovira i Virgili, Spain
pp. 799-805
Chaobo Yang, South China University of Technology, Guangzhou, 510640 China
Ming Qi, South China University of Technology, Guangzhou, 510640 China
pp. 806-811
Shu-Ching Wang, Chaoyang University of Technology, Taiwan
Shyi-Ching Liang, Chaoyang University of Technology, Taiwan
Kuo-Qin Yan, Chaoyang University of Technology, Taiwan
Guang-Yan Zheng, Chaoyang University of Technology, Taiwan
pp. 812-820
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)
Emilio Soler, University of Matanzas, Cuba
Juan Trujillo, University of Alicante, Spain
Eduardo Fern?ndez-Medina, University of Castilla-La Mancha, Spain
Mario Piattini, University of Castilla-La Mancha, Spain
pp. 829-836
Marcello Castellano, Politecnico di Bari
Giuseppe Mastronardi, Politecnico di Bari
Angela Aprile, Politecnico di Bari
Giuliano Bellone de Grecis, ACG srl - An IBM Company
Flaviano Fiorino, ACG srl - An IBM Company
pp. 845-852
Lillian Rostad, Norwegian University of Science and Technology
Oystein Nytro, Norwegian University of Science and Technology
pp. 871-878
Dalia El-Mansy, Southern Methodist University, Texas, USA
Ahmed Sameh, American University in Cairo, Cairo, Egypt
pp. 878-885
Calin Ciufudean, University, 9 University str., Suceava, 720225, Romania
Bianca Satco, University, 9 University str., Suceava, 720225, Romania
Constantin Filote, University, 9 University str., Suceava, 720225, Romania
pp. 886-894
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)
Melanie Volkamer, German Research Center for Artificial Intelligence
Margaret McGaley, NUI Maynooth
pp. 895-902
Stefan G. Weber, Darmstadt University of Technology
Roberto Araujo, Darmstadt University of Technology
Johannes Buchmann, Darmstadt University of Technology
pp. 908-916
Judith E. Y. Rossebo, NTNU, Department of Telematics, Norway
Scott Cadzow, Cadzow Communications (C3L), 10 Yewlands
Paul Sijben, EemValley Technology, Contrabaserf, Netherlands
pp. 925-933
K. Bhoopalam, Old Dominion University
K. Maly, Old Dominion University
R. Mukkamala, Old Dominion University
M. Zubair, Old Dominion University
pp. 934-940
Martijn Warnier, VU University Amsterdam
Frances Brazier, VU University Amsterdam
Martin Apistola, VU University Amsterdam
Anja Oskamp, VU University Amsterdam
pp. 941-947
Elsa Estevez, Universidad Nacional del Sur, Argentina
Tomasz Janowski, United Nations University International Institute for Software Technology, Macao
pp. 948-958
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)
Rachid GUERRAOUI, EPFL, Lausanne, Switzerland
Michel RAYNAL, IRISA, Campus de Beaulieu, 35042 Rennes Cedex, France
pp. 959-966
Cristian Martin, University of the Basque Country, Spain
Mikel Larrea, University of the Basque Country, Spain
Ernesto Jimenez, Universidad Polit?ecnica de Madrid, Spain
pp. 975-982
Mourad Elhadef, University of Ottawa, Ottawa, Canada
Azzedine Boukerche, University of Ottawa, Ottawa, Canada
Hisham Elkadiki, University of Ottawa, Ottawa, Canada
pp. 983-990
Olga Brukman, Ben-Gurion University, Israel
Shlomi Dolev, Ben-Gurion University, Israel
Yinnon Haviv, Ben-Gurion University, Israel
Reuven Yagel, Ben-Gurion University, Israel
pp. 991-998
C. Engelmann, University of Reading, UK
S. L. Scott, Oak Ridge National Laboratory, USA
C. Leangsuksun, Louisiana Tech University, USA
X. He, Tennessee Technological University, USA
pp. 999-1008
First International Workshop on Secure Software Engineering (SecSE 2007)
Shanai Ardi, Linkopings universitet
David Byers, Linkopings universitet
Per Hakon Meland, SINTEF ICT, Norway
Inger Anne Tondel, SINTEF ICT, Norway
Nahid Shahmehri, Linkopings universitet
pp. 1017-1025
Gabriel Hermosillo, ITESM-CEM-Dpto. Ciencias Computacionales, Mexico
Roberto Gomez, ITESM-CEM-Dpto. Ciencias Computacionales, Mexico
Lionel Seinturier, LIFL - INRIA Jacquard Project, France
Laurence Duchien, LIFL - INRIA Jacquard Project, France
pp. 1026-1033
Koen Buyens, DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
Bart De Win, DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
Wouter Joosen, DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
pp. 1034-1041
Takao Okubo, Fujitsu Laboratories ltd., Institute of Information Security
Hidehiko Tanaka, Fujitsu Laboratories ltd., Institute of Information Security
pp. 1042-1051
Sergey Bratus, Dartmouth College
Alex Ferguson, Dartmouth College
Doug McIlroy, Dartmouth College
Sean Smith, Dartmouth College
pp. 1052-1059
Kaarina Karppinen, VTT Technical Research Centre of Finland, Oulu, Finland
Reijo Savola, VTT Technical Research Centre of Finland, Oulu, Finland
Mikko Rapeli, VTT Technical Research Centre of Finland, Oulu, Finland
Esa Tikkala, VTT Technical Research Centre of Finland, Oulu, Finland
pp. 1060-1065
Chengying Mao, Jiangxi Univ. of Finance & Economics Nanchang, Jiangxi 330013, China
Yansheng Lu, College of Computer Scie. and Tech., Wuhan, Hubei 430074, China
pp. 1066-1073
Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)
Jan Ploski, OFFIS Institute for Information Technology, Oldenburg, Germany
Wilhelm Hasselbring, University of Oldenburg, Germany
pp. 1085-1092
Armin Beer, Siemens Program and Systems Engineering, Vienna, Austria
Matthias Heindl, Siemens Program and Systems Engineering, Vienna, Austria
pp. 1093-1100
Dindin Wahyudin, Vienna University of Technology
A Min Tjoa, Vienna University of Technology
pp. 1108-1115
First International Workshop on Advances in Information Security (WAIS 2007)
Alexander Krizhanovsky, Moscow Aviation Institute, Moscow, Russia
Alexander Marasanov, Moscow Aviation Institute, Moscow, Russia
pp. 1135-1142
Hyung Chan Kim, Gwangju Institute of Science and Technology, Korea
R.S. Ramakrishna, Gwangju Institute of Science and Technology, Korea
Wook Shin, University of Illinois at Urbana-Champaign
Kouichi Sakurai, Kyushu University, Fukuoka 812-8581, Japan
pp. 1160-1166
Tetsuya Izu, FUJITSU LABORATORIES Ltd.
Masahiko Takenaka, FUJITSU LABORATORIES Ltd.
Takeshi Shimoyama, FUJITSU LABORATORIES Ltd.
pp. 1167-1174
Luis Zarza, Universidad Tecnol?gica de la Mixteca
Josep Pegueroles, Technical University of Catalonia
Miguel Soriano, Technical University of Catalonia
pp. 1207-1213
Bogdan Groza, Politehnica University of Timisoara, Romania
Toma-Leonida Dragomir, Politehnica University of Timisoara, Romania
pp. 1214-1221
Nenad Stojanovski, Macedonian Telecommunication
Marjan Gusev, St. Cyril and Methodious University, Republic of Macedonia
Danilo Gligoroski, Norwegian University of Science and Technology, Trondheim, Norway
Svein.J. Knapskog, Norwegian University of Science and Technology, Trondheim, Norway
pp. 1222-1226
Dong Seong Kim, Hankuk Aviation University, Seoul, Korea
Taek-Hyun Shin, Hankuk Aviation University, Seoul, Korea
Jong Sou Park, Hankuk Aviation University, Seoul, Korea
pp. 1227-1234
Workshop on "Security in E-Learning" (SEL)
Emmanuel A. Adigun, University of Pretoria, South Africa
J.H.P. Eloff, University of Pretoria, South Africa
pp. 1245-1250
Alan Ward, University of Andorra
Jordi Castella Roca, Rovira i Virgili University of Tarragona
Alex Dorca Josa, University of Andorra
pp. 1251-1255
Author Index
Usage of this product signifies your acceptance of the Terms of Use.