Subscribe
2012 Seventh International Conference on Availability, Reliability and Security (2007)
Vienna, Austria
Apr. 10, 2007 to Apr. 13, 2007
ISBN: 0-7695-2775-2
TABLE OF CONTENTS
Introduction
Session 1: Trust Model & Trust Management
Paolo Giorgini , University of Trento
Yudistira Asnar , University of Trento
Nicola Zannone , University of Trento
pp. 19-26
Jatinder Singh , University of Cambridge
Jean Bacon , University of Cambridge
Ken Moody , University of Cambridge
pp. 27-34
Ching Lin , Macquarie University, Sydney, Australia
Vijay Varadharajan , Macquarie University, Sydney, Australia
pp. 35-42
Session 2: Availability, Fault-Tolerant & Recovery
Lorenz Froihofer , Vienna University of Technology
Norbert Chlaupek , University of Applied Sciences fh-campus wien, Daumegasse 5, 1100 Vienna, Austria
Karl M. Goeschka , Vienna University of Technology
pp. 53-60
Marcin Gorawski , Silesian University of Technology, Poland
pp. 61-68
Francesc D. Munoz-Esco , Universidad Politecnica de Valencia
Stefan Beyer , Universidad Politecnica de Valencia
pp. 69-76
Fred Douglis , IBM T. J. Watson Research Center Hawthorne, NY, USA
Cathy H. Xia , IBM T. J. Watson Research Center Hawthorne, NY, USA
Zhen Liu , IBM T.J. Watson Research Center, USA
pp. 77-84
F.D. Munoz-Esco , Instituto Tecnologico de Informatica, Valencia, Spain
J.R. Juarez , Universidad Publica de Navarra, Spain
J.R. G. de Mendivil , Universidad Publica de Navarra, Spain
B. Kemme , McGill University, Canada
pp. 85-92
Hendrik Decker , Universidad Politecnica de Valencia
Ruben de Juan-Marin , Universidad Politecnica de Valencia
pp. 93-102
Session 3: Reputation Management & Trust
Sini Ruohomaa , University of Helsinki
Lea Kutvonen , University of Helsinki
Eleni Koutrouli , National University of Athens
pp. 103-111
Audun Josang , Queensland University of Technology
pp. 112-119
Ahmad-Reza Sadeghi , Ruhr-University Bochum, Germany
Christian Stuble , Ruhr-University Bochum, Germany
Sebastian Gajek , Ruhr-University Bochum, Germany
pp. 120-127
Stefan Bottcher , University of Paderborn, Germany
Sebastian Obermeier , University of Paderborn, Germany
pp. 128-138
Session 4: Privacy & Access Control
Oliver Jorns , Telecommunications Research, Vienna, Austria
Oliver Jung , Telecommunications Research, Vienna, Austria
Gerald Quirchmayr , University of Vienna
pp. 139-146
Pankaj Bhaskar , Marquette University, Milwaukee, WI, USA
Sheikh I Ahamed , Marquette University, Milwaukee, WI, USA
pp. 147-154
Christin Groba , Technische Universitat Dresden, Germany
Thomas Springer , Technische Universitat Dresden, Germany
pp. 155-161
Session 5: Failure Detection & Attack Prevention
P. Hazy , University of Waterloo, Canada
R. E. Seviora , University of Waterloo, Canada
pp. 173-181
Yanlan Ding , Graduate University of Chinese Academy of Sciences, Beijing
pp. 190-197
Muhammad Sher , Technical University Berlin/Fokus Fraunhofer Telecommunication Institute, Germany
pp. 198-205
Mehdi Talbi , Digital Security Unit, Higher School of Communication,Tunis, Tunisia
Mohamed Mejri , Laval University,Quebec, Canada
pp. 206-212
Session 6: Authentication & Authorisation
Christian Schlager , University of Regensburg, Germany
Monika Ganslmayer , R&L Inc., Landshut, Germany
pp. 230-237
Tieyan Li , Institute for Infocomm Research, Singapore
pp. 238-245
Leila Ismail , United Arab Emirates University
pp. 246-253
Florian Fuchs , Mobile and Distributed Systems Group, Institute for Informatics
Georg Treu , Mobile and Distributed Systems Group, Institute for Informatics
pp. 263-272
Session 7: Security Algorithm & Framework
B. Bouallegue , Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
A. Baganne , LESTER-University of South Brittany, Lorient, France
M. Machhout , Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
M. Zeghida , LESTER-University of South Brittany, Lorient, France
pp. 281-285
J. Todd McDonald , Air Force Institute of Technology, Wright Patterson AFB, OH
pp. 286-293
Juan Trujillo , University of Alicante, Spain
Eduardo Fern?ndez-Medina , University of Castilla-La Mancha
Mario Piattini , University of Castilla-La Mancha
pp. 294-300
Session 8: Software Security
David Byers , Linkopings universitet, SE-58183 Linkoping, Sweden
pp. 301-309
Markus Schneider , Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany
Christoph Kraub , University of Technology, Darmstadt, Germany
Claudia Eckert , Darmstadt University of Technology, Darmstadt, Germany
pp. 310-317
Thomas Neubauer , Secure Business Austria
Gernot Goluch , Secure Business Austria
Oswald Boehm , Braincon Technologies, Vienna, Austria
Gert Reinauer , Braincon Technologies, Vienna, Austria
Bernhard Riedl , Secure Business Austria
pp. 318-324
Thomas Nowey , University of Regensburg Germany
pp. 325-334
Session 9: Security Models
Suranjith Ariyapperuma , University of London
Chris J. Mitchell , University of London
pp. 335-342
Ric Holt , University of Waterloo, Canada
Raihan Al-Ekram , University of Waterloo, Canada
pp. 351-355
Maritta Heisel , University Duisburg-Essen, Germany
Denis Hatebur , University Duisburg-Essen, Germany
pp. 356-365
Rolf Schillinger , University of Regensburg
Stefan Durbeck , University of Regensburg
pp. 366-373
Ludwig Fuchs , University of Regensburg, Germany
Gunther Pernul , University of Regensburg, Germany
pp. 374-384
Session 10: Miscellaneous Security Techniques
Nicola Mazzocca , University of Naples, Federico II, Italy
Jesus Luna , Universitat Polit?cnica de Catalunya, Spain
Oscar Manso , Universitat Polit?cnica de Catalunya, Spain
Manel Medina , Universitat Polit?cnica de Catalunya, Spain
pp. 391-399
Mansoor Ahmed , Vienna University of Technology
Amin Anjomshoaa , Vienna University of Technology
Tho Manh Nguyen , Vienna University of Technology
A Min Tjoa , Vienna University of Technology
pp. 400-407
YueFei Zhu , Information Engineering University,Henan, China
Jin Zhou , Information Engineering University,Henan, China
YaJuan Zhang , Guangzhou University, China
pp. 408-416
Session 11: eAuction & eVoting Protocol
Brian Curtis , Australian Catholic University
Josef Pieprzyk , Macquarie University
Jan Seruga , Australian Catholic University
pp. 417-421
Orhan Cetinkaya , Institute of Applied Mathematics,METU, Ankara, Turkey
Ali Doganaksoy , METU, Ankara, Turkey
pp. 432-442
Session 12: Dependability in Distributed & Ubiquitous Computing
Lorenz Froihofer , Vienna University of Technology
Johannes Osrael , Vienna University of Technology
Karl M. Goeschka , Vienna University of Technology
pp. 443-450
Lu Yan , University College London
pp. 451-453
Session 13: Anomaly & Intrusion Detection
Surekha Mariam Varghese , M.A. College of Engineering Kothamangalam, India
K.Poulose Jacob , Cochin University of Science and Technology, Kochi, India
pp. 473-479
Session 1: Fault-Tolerant & Availability
Yanlong Wang , Northwestern Polytechnical University
Wei Lin , Northwestern Polytechnical University
pp. 499-505
Naohiro Hayashibara , Tokyo Denki University, Japan
Keiji Ozaki , Tokyo Denki University, Japan
Makoto Takizawa , Tokyo Denki University, Japan
pp. 506-516
Session 2: Access Control
Vipin Singh Mewar , Indian Institute of Technology, Kharagpur, India
Shamik Sural , Indian Institute of Technology, Kharagpur, India
pp. 524-531
Frederic Cuppens , GET/ENST-Bretagne, France
Joaquin G. Alfaro , Universitat Oberta de Catalunya
pp. 532-542
Session 3: Authentication
Arjan Durresi , Baton Rouge, Louisiana, USA
Vamsi Paruchuri , Louisiana State University
Mimoza Durresi , Fukuoka Institute of Technology, Fukuoka, Japan
Leonard Barolli , Fukuoka Institute of Technology, Fukuoka, Japan
pp. 543-549
HE Yijun , Central South University
LI Jie , City University of Hong Kong, Kowloon
pp. 558-563
Yao Gang , Graduate University of Chinese Academy of Sciences
Feng Dengguo , Graduate University of Chinese Academy of Sciences
Han Xiaoxi , Graduate University of Chinese Academy of Sciences
pp. 564-574
Session 4: Real-Time System & Sensor Network
Dong Seong Kim , Hankuk Aviation University, Seoul, Korea
Chung Su Yang , Hankuk Aviation University, Seoul, Korea
Jong Sou Park , Hankuk Aviation University, Seoul, Korea
pp. 575-579
Matthias Regensburger , Technische Universitat Munchen, Germany
Alois Knoll , Technische Universitat Munchen, Germany
Gerhard Schrott , Technische Universitat Munchen, Germany
pp. 580-587
Bastian Preindl , Vienna University of Technology
Alexander Schatten , Vienna University of Technology
pp. 588-598
Session 5: RFID Techniques & Applications
Qinghan Xiao , Defence Research and Development Canada Ottawa
Thomas Gibbons , Operational Support Transformation - CANOSCOM
pp. 599-605
Geethapriya Venkataramani , Applied Research Group, Satyam Computers Services Limited
Srividya Gopalan , Applied Research Group, Satyam Computers Services Limited
pp. 610-620
Session 6: Secure Solution & Applications
C.M. Jayalath , Apache Software Foundation
R.U. Fernando , Apache Software Foundation
pp. 621-628
Anthony Stell , University of Glasgow
Richard Sinnott , University of Glasgow
Oluwafemi Ajayi , University of Glasgow
Jipu Jiang , University of Glasgow
pp. 629-636
Eleni Klaoudatou , University of the Aegean, Karlovassi, Greece
Stefanos Gritzalis , University of the Aegean, Karlovassi, Greece
pp. 637-643
Juan Trujillo , University of Alicante
Eduardo Fern?ndez-Medina , University of Castilla-La Mancha, Spain
Emilio Soler , University of Matanzas, Cuba
pp. 644-654
Session 7: Security Issue in Business Management
Regine Endsuleit , Universitat Karlsruhe (TH) IAKS Germany
pp. 655-662
Thomas Neubauer , Secure Business Austria
Bernhard Riedl , Secure Business Austria
pp. 670-680
Session 8: Web, XML, Content Management
L. Milton Glisson , N. C. A&T State University
William Bradley Glisson , University of Glasgow
pp. 681-688
Viet Hung Nguyen , University of Technology, Vietnam
Tran Khanh Dang , University of Technology, Vietnam
Nguyen Thanh Son , University of Technology, Vietnam
Josef Kung , Johannes Kepler University of Linz, Austria
pp. 689-696
Lars-Helge Netland , University of Bergen
Yngve Espelid , University of Bergen
Khalid A. Mughal , University of Bergen
pp. 697-706
Session 9: Security Policies & Techniques
Januszkiewicz Paulina , Academy of Business in D?browa G?rnicza, Poland
Pyka Marek , Academy of Business in D?browa G?rnicza, Poland
pp. 715-722
R. Ceballos , University of Seville, Spain
R. M. Gasca , University of Seville, Spain
pp. 723-729
Gernot Goluch , Secure Business Austria
Andreas Ekelhart , Secure Business Austria
Stefan Fenz , Secure Business Austria
Stefan Jakoubi , Secure Business Austria
Bernhard Riedl , Secure Business Austria
Simon Tjoa , Secure Business Austria
pp. 730-740
Session 10: Trust Management & Trust Model
E. Makri , University of the Aegean
P. Spirakis , University of Patras
V. Liagkou , University of Patras
pp. 741-748
Zhang Lin , Nanjing University, China
Xu Feng , Nanjing University, China
Wang Yuan , Nanjing University, China
Lv Jian , Nanjing University, China
pp. 765-774
Session 11: Miscellaneous Applications
Rafael P?ez , Technical University of Catalonia, Barcelona, Spain
Cristina Satiz?bal , Pamplona University, Pamplona, Colombia
Jordi Forne , Technical University of Catalonia, Barcelona, Spain
pp. 791-798
C. Mauri , Lleida University, Spain
A. Solanas , Universitat Rovira i Virgili, Spain
pp. 799-805
Chaobo Yang , South China University of Technology, Guangzhou, 510640 China
pp. 806-811
Shyi-Ching Liang , Chaoyang University of Technology, Taiwan
Kuo-Qin Yan , Chaoyang University of Technology, Taiwan
Shu-Ching Wang , Chaoyang University of Technology, Taiwan
pp. 812-820
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)
Bhavani Thuraisingham , The University of Texas at Dallas
Srinivasan Iyer , The University of Texas at Dallas
pp. 821-828
Emilio Soler , University of Matanzas, Cuba
Eduardo Fern?ndez-Medina , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
pp. 829-836
Marcin Gorawski , Silesian University of Technology
Jakub Bularz , Silesian University of Technology
pp. 837-844
Giuseppe Mastronardi , Politecnico di Bari
Marcello Castellano , Politecnico di Bari
Giuliano Bellone de Grecis , ACG srl - An IBM Company
Flaviano Fiorino , ACG srl - An IBM Company
pp. 845-852
Lillian Rostad , Norwegian University of Science and Technology
Oystein Nytro , Norwegian University of Science and Technology
pp. 871-878
Dalia El-Mansy , Southern Methodist University, Texas, USA
Ahmed Sameh , American University in Cairo, Cairo, Egypt
pp. 878-885
Bianca Satco , University, 9 University str., Suceava, 720225, Romania
Calin Ciufudean , University, 9 University str., Suceava, 720225, Romania
pp. 886-894
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)
Melanie Volkamer , German Research Center for Artificial Intelligence
Margaret McGaley , NUI Maynooth
pp. 895-902
Stefan G. Weber , Darmstadt University of Technology
Roberto Araujo , Darmstadt University of Technology
Johannes Buchmann , Darmstadt University of Technology
pp. 908-916
Judith E. Y. Rossebo , NTNU, Department of Telematics, Norway
Paul Sijben , EemValley Technology, Contrabaserf, Netherlands
pp. 925-933
K. Maly , Old Dominion University
R. Mukkamala , Old Dominion University
K. Bhoopalam , Old Dominion University
pp. 934-940
Frances Brazier , VU University Amsterdam
Martin Apistola , VU University Amsterdam
Anja Oskamp , VU University Amsterdam
pp. 941-947
Elsa Estevez , Universidad Nacional del Sur, Argentina
Tomasz Janowski , United Nations University International Institute for Software Technology, Macao
pp. 948-958
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)
Rachid GUERRAOUI , EPFL, Lausanne, Switzerland
pp. 959-966
Cristian Martin , University of the Basque Country, Spain
Mikel Larrea , University of the Basque Country, Spain
Ernesto Jimenez , Universidad Polit?ecnica de Madrid, Spain
pp. 975-982
Azzedine Boukerche , University of Ottawa, Ottawa, Canada
Mourad Elhadef , University of Ottawa, Ottawa, Canada
pp. 983-990
Olga Brukman , Ben-Gurion University, Israel
Shlomi Dolev , Ben-Gurion University, Israel
Yinnon Haviv , Ben-Gurion University, Israel
Reuven Yagel , Ben-Gurion University, Israel
pp. 991-998
S. L. Scott , Oak Ridge National Laboratory, USA
C. Leangsuksun , Louisiana Tech University, USA
X. He , Tennessee Technological University, USA
pp. 999-1008
First International Workshop on Secure Software Engineering (SecSE 2007)
David Byers , Linkopings universitet
Per Hakon Meland , SINTEF ICT, Norway
Inger Anne Tondel , SINTEF ICT, Norway
Shanai Ardi , Linkopings universitet
pp. 1017-1025
Roberto Gomez , ITESM-CEM-Dpto. Ciencias Computacionales, Mexico
Lionel Seinturier , LIFL - INRIA Jacquard Project, France
Laurence Duchien , LIFL - INRIA Jacquard Project, France
pp. 1026-1033
Koen Buyens , DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
Wouter Joosen , DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
pp. 1034-1041
Takao Okubo , Fujitsu Laboratories ltd., Institute of Information Security
Hidehiko Tanaka , Fujitsu Laboratories ltd., Institute of Information Security
pp. 1042-1051
Alex Ferguson , Dartmouth College
Doug McIlroy , Dartmouth College
Sergey Bratus , Dartmouth College
pp. 1052-1059
Kaarina Karppinen , VTT Technical Research Centre of Finland, Oulu, Finland
Mikko Rapeli , VTT Technical Research Centre of Finland, Oulu, Finland
Esa Tikkala , VTT Technical Research Centre of Finland, Oulu, Finland
pp. 1060-1065
Chengying Mao , Jiangxi Univ. of Finance & Economics Nanchang, Jiangxi 330013, China
pp. 1066-1073
Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)
Jan Ploski , OFFIS Institute for Information Technology, Oldenburg, Germany
Wilhelm Hasselbring , University of Oldenburg, Germany
pp. 1085-1092
Armin Beer , Siemens Program and Systems Engineering, Vienna, Austria
Matthias Heindl , Siemens Program and Systems Engineering, Vienna, Austria
pp. 1093-1100
Jiri Kubalik , Technical University in Vienna
Richard Mordinyi , Vienna University of Technology
pp. 1101-1107
Dindin Wahyudin , Vienna University of Technology
A Min Tjoa , Vienna University of Technology
pp. 1108-1115
Marcus Mor , Vienna University of Technology
Richard Mordinyi , Vienna University of Technology
Johannes Riemer , Vienna University of Technology
pp. 1116-1123
Roland Vecera , senactive.com
Szabolcs Rozsnyai , securityresearch.at
Heinz Roth , senactive.com
pp. 1124-1134
First International Workshop on Advances in Information Security (WAIS 2007)
Alexander Krizhanovsky , Moscow Aviation Institute, Moscow, Russia
Alexander Marasanov , Moscow Aviation Institute, Moscow, Russia
pp. 1135-1142
Rene Mayrhofer , Lancaster University
Martyn Welch , Lancaster University
pp. 1143-1148
Chik How Tan , Gjovik University College, Norway
pp. 1148-1154
R.S. Ramakrishna , Gwangju Institute of Science and Technology, Korea
Hyung Chan Kim , Gwangju Institute of Science and Technology, Korea
Kouichi Sakurai , Kyushu University, Fukuoka 812-8581, Japan
pp. 1160-1166
Tetsuya Izu , FUJITSU LABORATORIES Ltd.
Masahiko Takenaka , FUJITSU LABORATORIES Ltd.
Takeshi Shimoyama , FUJITSU LABORATORIES Ltd.
pp. 1167-1174
Koji Chida , NTT Corporation
Hiroaki Kikuchi , Tokai University
Gembu Morohashi , NTT Corporation
Keiichi Hirota , NTT Corporation
pp. 1183-1189
Orhan Cetinkaya , METU, Ankara, Turkey
Ali Doganaksoy , METU, Ankara, Turkey
pp. 1190-1196
Anders Moen Hagalisletto , University of Oslo
pp. 1197-1206
Josep Pegueroles , Technical University of Catalonia
Luis Zarza , Universidad Tecnol?gica de la Mixteca
pp. 1207-1213
Bogdan Groza , Politehnica University of Timisoara, Romania
Toma-Leonida Dragomir , Politehnica University of Timisoara, Romania
pp. 1214-1221
Nenad Stojanovski , Macedonian Telecommunication
Marjan Gusev , St. Cyril and Methodious University, Republic of Macedonia
Danilo Gligoroski , Norwegian University of Science and Technology, Trondheim, Norway
Svein.J. Knapskog , Norwegian University of Science and Technology, Trondheim, Norway
pp. 1222-1226
Taek-Hyun Shin , Hankuk Aviation University, Seoul, Korea
Dong Seong Kim , Hankuk Aviation University, Seoul, Korea
pp. 1227-1234
Workshop on "Security in E-Learning" (SEL)
Gerald Quirchmayr , Institute of Distributed and Multimedia Systems
pp. 1240-1244
Emmanuel A. Adigun , University of Pretoria, South Africa
pp. 1245-1250
Author Index