The Community for Technology Leaders
RSS Icon
Subscribe
2012 Seventh International Conference on Availability, Reliability and Security (2007)
Vienna, Austria
Apr. 10, 2007 to Apr. 13, 2007
ISBN: 0-7695-2775-2
TABLE OF CONTENTS
Introduction
Session 1: Trust Model & Trust Management
Oluwafemi Ajayi , University of Glasgow, UK
Richard Sinnott , University of Glasgow, UK
Anthony Stell , University of Glasgow, UK
pp. 3-10
Yudistira Asnar , University of Trento
Paolo Giorgini , University of Trento
Fabio Massacci , University of Trento
Nicola Zannone , University of Trento
pp. 19-26
Jatinder Singh , University of Cambridge
Jean Bacon , University of Cambridge
Ken Moody , University of Cambridge
pp. 27-34
Ching Lin , Macquarie University, Sydney, Australia
Vijay Varadharajan , Macquarie University, Sydney, Australia
pp. 35-42
Wilfried N. Gansterer , University of Vienna
Andreas G.K. Janecek , University of Vienna
Peter Lechner , University of Vienna
pp. 43-52
Session 2: Availability, Fault-Tolerant & Recovery
Johannes Osrael , Vienna University of Technology
Lorenz Froihofer , Vienna University of Technology
Norbert Chlaupek , University of Applied Sciences fh-campus wien, Daumegasse 5, 1100 Vienna, Austria
Karl M. Goeschka , Vienna University of Technology
pp. 53-60
Marcin Gorawski , Silesian University of Technology, Poland
Pawel Marks , Silesian University of Technology, Poland
pp. 61-68
Stefan Beyer , Universidad Politecnica de Valencia
Francesc D. Munoz-Esco , Universidad Politecnica de Valencia
Pablo Galdamez , Universidad Politecnica de Valencia
pp. 69-76
Bin Rong , RMIT University, Melbourne, Australia
Fred Douglis , IBM T. J. Watson Research Center Hawthorne, NY, USA
Cathy H. Xia , IBM T. J. Watson Research Center Hawthorne, NY, USA
Zhen Liu , IBM T.J. Watson Research Center, USA
pp. 77-84
J.E. Armendariz , Instituto Tecnologico de Informatica, Valencia, Spain
F.D. Munoz-Esco , Instituto Tecnologico de Informatica, Valencia, Spain
J.R. Juarez , Universidad Publica de Navarra, Spain
J.R. G. de Mendivil , Universidad Publica de Navarra, Spain
B. Kemme , McGill University, Canada
pp. 85-92
Ruben de Juan-Marin , Universidad Politecnica de Valencia
Hendrik Decker , Universidad Politecnica de Valencia
Francesc D. Munoz-Esco , Universidad Politecnica de Valencia
pp. 93-102
Session 3: Reputation Management & Trust
Sini Ruohomaa , University of Helsinki
Lea Kutvonen , University of Helsinki
Eleni Koutrouli , National University of Athens
pp. 103-111
Audun Josang , Queensland University of Technology
Jochen Haller , SAP Research Germany
pp. 112-119
Sebastian Gajek , Ruhr-University Bochum, Germany
Ahmad-Reza Sadeghi , Ruhr-University Bochum, Germany
Christian Stuble , Ruhr-University Bochum, Germany
Marcel Winandy , Ruhr-University Bochum, Germany
pp. 120-127
Stefan Bottcher , University of Paderborn, Germany
Sebastian Obermeier , University of Paderborn, Germany
pp. 128-138
Session 4: Privacy & Access Control
Oliver Jorns , Telecommunications Research, Vienna, Austria
Oliver Jung , Telecommunications Research, Vienna, Austria
Gerald Quirchmayr , University of Vienna
pp. 139-146
Pankaj Bhaskar , Marquette University, Milwaukee, WI, USA
Sheikh I Ahamed , Marquette University, Milwaukee, WI, USA
pp. 147-154
Christin Groba , Technische Universitat Dresden, Germany
Stephan Grob , Technische Universitat Dresden, Germany
Thomas Springer , Technische Universitat Dresden, Germany
pp. 155-161
Dongxi Liu , University of Tokyo
pp. 162-172
Session 5: Failure Detection & Attack Prevention
P. Hazy , University of Waterloo, Canada
R. E. Seviora , University of Waterloo, Canada
pp. 173-181
Mourad Elhadef , University of Ottawa, Ottawa, Canada
Azzedine Boukerche , University of Ottawa, Ottawa, Canada
pp. 182-189
Yanlan Ding , Graduate University of Chinese Academy of Sciences, Beijing
Guiping Su , Graduate University of Chinese Academy of Sciences, Beijing
pp. 190-197
Muhammad Sher , Technical University Berlin/Fokus Fraunhofer Telecommunication Institute, Germany
Thomas Magedanz , Technical University Berlin/Fokus Fraunhofer Telecommunication Institute, Germany
pp. 198-205
Meriam Ben Ghorbel , Digital Security Unit, Higher School of Communication,Tunis, Tunisia
Mehdi Talbi , Digital Security Unit, Higher School of Communication,Tunis, Tunisia
Mohamed Mejri , Laval University,Quebec, Canada
pp. 206-212
Frank Yeong-Sung Lin , National Taiwan University
Po-Hao Tsang , National Taiwan University
Yi-Luen Lin , National Taiwan University
pp. 213-222
Session 6: Authentication & Authorisation
Anders Moen Hagalisletto , University of Oslo
pp. 223-229
Christian Schlager , University of Regensburg, Germany
Monika Ganslmayer , R&L Inc., Landshut, Germany
pp. 230-237
Tieyan Li , Institute for Infocomm Research, Singapore
Robert Deng , Singapore Management University
pp. 238-245
Leila Ismail , United Arab Emirates University
pp. 246-253
Yuri Demchenko , University of Amsterdam
Leon Gommans , University of Amsterdam
Cees de Laat , University of Amsterdam
pp. 254-262
Georg Treu , Mobile and Distributed Systems Group, Institute for Informatics
Florian Fuchs , Mobile and Distributed Systems Group, Institute for Informatics
Christiane Dargatz , Ludwig-Maximilian University Munich, Germany
pp. 263-272
Session 7: Security Algorithm & Framework
M. Zeghida , LESTER-University of South Brittany, Lorient, France
B. Bouallegue , Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
A. Baganne , LESTER-University of South Brittany, Lorient, France
M. Machhout , Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
R. Tourki , Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
pp. 281-285
J. Todd McDonald , Air Force Institute of Technology, Wright Patterson AFB, OH
Alec Yasinsac , Florida State University
pp. 286-293
Emilio Soler , University of Matanzas,Cuba
Juan Trujillo , University of Alicante, Spain
Eduardo Fern?ndez-Medina , University of Castilla-La Mancha
Mario Piattini , University of Castilla-La Mancha
pp. 294-300
Session 8: Software Security
David Byers , Linkopings universitet, SE-58183 Linkoping, Sweden
Nahid Shahmehri , Linkopings universitet, SE-58183 Linkoping, Sweden
pp. 301-309
Christoph Kraub , University of Technology, Darmstadt, Germany
Markus Schneider , Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany
Kpatcha Bayarou , Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany
Claudia Eckert , Darmstadt University of Technology, Darmstadt, Germany
pp. 310-317
Bernhard Riedl , Secure Business Austria
Thomas Neubauer , Secure Business Austria
Gernot Goluch , Secure Business Austria
Oswald Boehm , Braincon Technologies, Vienna, Austria
Gert Reinauer , Braincon Technologies, Vienna, Austria
Alexander Krumboeck , Braincon Technologies, Vienna, Austria
pp. 318-324
Thomas Nowey , University of Regensburg Germany
Hannes Federrath , University of Regensburg Germany
pp. 325-334
Session 9: Security Models
Suranjith Ariyapperuma , University of London
Chris J. Mitchell , University of London
pp. 335-342
David Arsenault , George Mason University
Arun Sood , George Mason University
Yih Huang , George Mason University
pp. 343-350
Raihan Al-Ekram , University of Waterloo, Canada
Ric Holt , University of Waterloo, Canada
Chris Hobbs , Nortel, Ottawa, Canada
pp. 351-355
Denis Hatebur , University Duisburg-Essen, Germany
Maritta Heisel , University Duisburg-Essen, Germany
Holger Schmidt , University Duisburg-Essen, Germany
pp. 356-365
Stefan Durbeck , University of Regensburg
Rolf Schillinger , University of Regensburg
Jan Kolter , University of Regensburg
pp. 366-373
Ludwig Fuchs , University of Regensburg, Germany
Gunther Pernul , University of Regensburg, Germany
pp. 374-384
Session 10: Miscellaneous Security Techniques
Vidar Evenrud Seeberg , Norsvin, Hamar, Norway
Slobodan Petrovic , Gjovik University College, P.O. box 191, N-2802 Gjovik, Norway
pp. 385-390
Valentina Casola , University of Naples, Federico II, Italy
Nicola Mazzocca , University of Naples, Federico II, Italy
Jesus Luna , Universitat Polit?cnica de Catalunya, Spain
Oscar Manso , Universitat Polit?cnica de Catalunya, Spain
Manel Medina , Universitat Polit?cnica de Catalunya, Spain
pp. 391-399
Mansoor Ahmed , Vienna University of Technology
Amin Anjomshoaa , Vienna University of Technology
Tho Manh Nguyen , Vienna University of Technology
A Min Tjoa , Vienna University of Technology
pp. 400-407
TingMao Chang , Information Engineering University,Henan, China
YueFei Zhu , Information Engineering University,Henan, China
Jin Zhou , Information Engineering University,Henan, China
YaJuan Zhang , Guangzhou University, China
pp. 408-416
Session 11: eAuction & eVoting Protocol
Brian Curtis , Australian Catholic University
Josef Pieprzyk , Macquarie University
Jan Seruga , Australian Catholic University
pp. 417-421
Benedikt Ostermaier , ETH Zurich, Switzerland
Florian Dotzer , ASKON Consulting Group, Germany
Markus Strassberger , BMW Group, Germany
pp. 422-431
Orhan Cetinkaya , Institute of Applied Mathematics,METU, Ankara, Turkey
Ali Doganaksoy , METU, Ankara, Turkey
pp. 432-442
Session 12: Dependability in Distributed & Ubiquitous Computing
Lorenz Froihofer , Vienna University of Technology
Johannes Osrael , Vienna University of Technology
Karl M. Goeschka , Vienna University of Technology
pp. 443-450
Lu Yan , University College London
Kaisa Sere , Abo Akademi University, Finland
pp. 451-453
Tomoya Enokido , Rissho University
Makoto Takizawa , Tokyo Denki University
pp. 454-464
Session 13: Anomaly & Intrusion Detection
Oleksiy Mazhelis , University of Jyvaskyla, Finland
Seppo Puuronen , University of Jyvaskyla, Finland
pp. 465-472
Surekha Mariam Varghese , M.A. College of Engineering Kothamangalam, India
K.Poulose Jacob , Cochin University of Science and Technology, Kochi, India
pp. 473-479
D. M. Akbar Hussain , Aalborg University Esbjerg, Denmark
pp. 480-492
Session 1: Fault-Tolerant & Availability
S. Prabhu , Cisco Systems, Inc.
R. Venkat , Cisco Systems, Inc.
pp. 493-498
Yanlong Wang , Northwestern Polytechnical University
Zhanhuai Li , Northwestern Polytechnical University
Wei Lin , Northwestern Polytechnical University
pp. 499-505
Keiji Ozaki , Tokyo Denki University, Japan
Naohiro Hayashibara , Tokyo Denki University, Japan
Tomoya Enokido , Rissho University, Japan
Makoto Takizawa , Tokyo Denki University, Japan
pp. 506-516
Session 2: Access Control
Vipin Singh Mewar , Indian Institute of Technology, Kharagpur, India
Subhendu Aich , Indian Institute of Technology, Kharagpur, India
Shamik Sural , Indian Institute of Technology, Kharagpur, India
pp. 524-531
Joaquin G. Alfaro , Universitat Oberta de Catalunya
Frederic Cuppens , GET/ENST-Bretagne, France
Nora Cuppens-Boulahia , GET/ENST-Bretagne, France
pp. 532-542
Session 3: Authentication
Arjan Durresi , Baton Rouge, Louisiana, USA
Vamsi Paruchuri , Louisiana State University
Mimoza Durresi , Fukuoka Institute of Technology, Fukuoka, Japan
Leonard Barolli , Fukuoka Institute of Technology, Fukuoka, Japan
pp. 543-549
Bogdan Groza , Politehnica University of Timisoara, Romania
pp. 550-557
HE Yijun , Central South University
XU Nan , City University of Hong Kong, Kowloon
LI Jie , City University of Hong Kong, Kowloon
pp. 558-563
Yao Gang , Graduate University of Chinese Academy of Sciences
Feng Dengguo , Graduate University of Chinese Academy of Sciences
Han Xiaoxi , Graduate University of Chinese Academy of Sciences
pp. 564-574
Session 4: Real-Time System & Sensor Network
Dong Seong Kim , Hankuk Aviation University, Seoul, Korea
Chung Su Yang , Hankuk Aviation University, Seoul, Korea
Jong Sou Park , Hankuk Aviation University, Seoul, Korea
pp. 575-579
Christian Buckl , Technische Universitat Munchen, Germany
Matthias Regensburger , Technische Universitat Munchen, Germany
Alois Knoll , Technische Universitat Munchen, Germany
Gerhard Schrott , Technische Universitat Munchen, Germany
pp. 580-587
Bastian Preindl , Vienna University of Technology
Alexander Schatten , Vienna University of Technology
pp. 588-598
Session 5: RFID Techniques & Applications
Qinghan Xiao , Defence Research and Development Canada Ottawa
Cam Boulet , Defence Research and Development Canada Ottawa
Thomas Gibbons , Operational Support Transformation - CANOSCOM
pp. 599-605
Jens Mache , Lewis & Clark College
Chris Allick , Lewis & Clark College
pp. 606-609
Geethapriya Venkataramani , Applied Research Group, Satyam Computers Services Limited
Srividya Gopalan , Applied Research Group, Satyam Computers Services Limited
pp. 610-620
Session 6: Secure Solution & Applications
C.M. Jayalath , Apache Software Foundation
R.U. Fernando , Apache Software Foundation
pp. 621-628
Anthony Stell , University of Glasgow
Richard Sinnott , University of Glasgow
Oluwafemi Ajayi , University of Glasgow
Jipu Jiang , University of Glasgow
pp. 629-636
Georgios Kambourakis , University of the Aegean, Karlovassi, Greece
Eleni Klaoudatou , University of the Aegean, Karlovassi, Greece
Stefanos Gritzalis , University of the Aegean, Karlovassi, Greece
pp. 637-643
Emilio Soler , University of Matanzas, Cuba
Juan Trujillo , University of Alicante
Eduardo Fern?ndez-Medina , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
pp. 644-654
Session 7: Security Issue in Business Management
Regine Endsuleit , Universitat Karlsruhe (TH) IAKS Germany
Christoph Amma , Universitat Karlsruhe (TH) IAKS Germany
pp. 655-662
Thomas Neubauer , Secure Business Austria
Gernot Goluch , Secure Business Austria
Bernhard Riedl , Secure Business Austria
pp. 670-680
Session 8: Web, XML, Content Management
William Bradley Glisson , University of Glasgow
L. Milton Glisson , N. C. A&T State University
Ray Welland , N. C. A&T State University
pp. 681-688
Viet Hung Nguyen , University of Technology, Vietnam
Tran Khanh Dang , University of Technology, Vietnam
Nguyen Thanh Son , University of Technology, Vietnam
Josef Kung , Johannes Kepler University of Linz, Austria
pp. 689-696
Lars-Helge Netland , University of Bergen
Yngve Espelid , University of Bergen
Khalid A. Mughal , University of Bergen
pp. 697-706
Session 9: Security Policies & Techniques
William Bradley Glisson , University of Glasgow
Ray Welland , University of Glasgow
pp. 707-714
Januszkiewicz Paulina , Academy of Business in D?browa G?rnicza, Poland
Pyka Marek , Academy of Business in D?browa G?rnicza, Poland
pp. 715-722
S. Pozo , University of Seville, Spain
R. Ceballos , University of Seville, Spain
R. M. Gasca , University of Seville, Spain
pp. 723-729
Gernot Goluch , Secure Business Austria
Andreas Ekelhart , Secure Business Austria
Stefan Fenz , Secure Business Austria
Stefan Jakoubi , Secure Business Austria
Bernhard Riedl , Secure Business Austria
Simon Tjoa , Secure Business Austria
pp. 730-740
Session 10: Trust Management & Trust Model
V. Liagkou , University of Patras
E. Makri , University of the Aegean
P. Spirakis , University of Patras
Y.C. Stamatiou , University of Ioannina
pp. 741-748
Jimmy McGibney , Waterford Institute of Technology
Dmitri Botvich , Waterford Institute of Technology
pp. 749-756
Zhang Lin , Nanjing University, China
Xu Feng , Nanjing University, China
Wang Yuan , Nanjing University, China
Lv Jian , Nanjing University, China
pp. 765-774
Session 11: Miscellaneous Applications
Mohammad Raihan , Queen?s University, Kingston
Mohammad Zulkernine , Queen?s University, Kingston
pp. 775-782
Niraj Swami , Marquette University, Milwaukee, WI, USA
Sheikh I Ahamed , Marquette University, Milwaukee, WI, USA
pp. 783-790
Rafael P?ez , Technical University of Catalonia, Barcelona, Spain
Cristina Satiz?bal , Pamplona University, Pamplona, Colombia
Jordi Forne , Technical University of Catalonia, Barcelona, Spain
pp. 791-798
C. Mauri , Lleida University, Spain
T. Granollers , Lleida University, Spain
A. Solanas , Universitat Rovira i Virgili, Spain
pp. 799-805
Chaobo Yang , South China University of Technology, Guangzhou, 510640 China
Ming Qi , South China University of Technology, Guangzhou, 510640 China
pp. 806-811
Shu-Ching Wang , Chaoyang University of Technology, Taiwan
Shyi-Ching Liang , Chaoyang University of Technology, Taiwan
Kuo-Qin Yan , Chaoyang University of Technology, Taiwan
Guang-Yan Zheng , Chaoyang University of Technology, Taiwan
pp. 812-820
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)
Bhavani Thuraisingham , The University of Texas at Dallas
Srinivasan Iyer , The University of Texas at Dallas
pp. 821-828
Emilio Soler , University of Matanzas, Cuba
Juan Trujillo , University of Alicante, Spain
Eduardo Fern?ndez-Medina , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
pp. 829-836
Marcin Gorawski , Silesian University of Technology
Jakub Bularz , Silesian University of Technology
pp. 837-844
Marcello Castellano , Politecnico di Bari
Giuseppe Mastronardi , Politecnico di Bari
Angela Aprile , Politecnico di Bari
Giuliano Bellone de Grecis , ACG srl - An IBM Company
Flaviano Fiorino , ACG srl - An IBM Company
pp. 845-852
Lillian Rostad , Norwegian University of Science and Technology
Oystein Nytro , Norwegian University of Science and Technology
pp. 871-878
Dalia El-Mansy , Southern Methodist University, Texas, USA
Ahmed Sameh , American University in Cairo, Cairo, Egypt
pp. 878-885
Calin Ciufudean , University, 9 University str., Suceava, 720225, Romania
Bianca Satco , University, 9 University str., Suceava, 720225, Romania
Constantin Filote , University, 9 University str., Suceava, 720225, Romania
pp. 886-894
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)
Melanie Volkamer , German Research Center for Artificial Intelligence
Margaret McGaley , NUI Maynooth
pp. 895-902
Orhan Cetinkaya , METU, Ankara, Turkey
Deniz Cetinkaya , METU, Ankara, Turkey
pp. 903-907
Stefan G. Weber , Darmstadt University of Technology
Roberto Araujo , Darmstadt University of Technology
Johannes Buchmann , Darmstadt University of Technology
pp. 908-916
Judith E. Y. Rossebo , NTNU, Department of Telematics, Norway
Scott Cadzow , Cadzow Communications (C3L), 10 Yewlands
Paul Sijben , EemValley Technology, Contrabaserf, Netherlands
pp. 925-933
K. Bhoopalam , Old Dominion University
K. Maly , Old Dominion University
R. Mukkamala , Old Dominion University
M. Zubair , Old Dominion University
pp. 934-940
Martijn Warnier , VU University Amsterdam
Frances Brazier , VU University Amsterdam
Martin Apistola , VU University Amsterdam
Anja Oskamp , VU University Amsterdam
pp. 941-947
Elsa Estevez , Universidad Nacional del Sur, Argentina
Tomasz Janowski , United Nations University International Institute for Software Technology, Macao
pp. 948-958
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)
Rachid GUERRAOUI , EPFL, Lausanne, Switzerland
Michel RAYNAL , IRISA, Campus de Beaulieu, 35042 Rennes Cedex, France
pp. 959-966
Cristian Martin , University of the Basque Country, Spain
Mikel Larrea , University of the Basque Country, Spain
Ernesto Jimenez , Universidad Polit?ecnica de Madrid, Spain
pp. 975-982
Mourad Elhadef , University of Ottawa, Ottawa, Canada
Azzedine Boukerche , University of Ottawa, Ottawa, Canada
Hisham Elkadiki , University of Ottawa, Ottawa, Canada
pp. 983-990
Olga Brukman , Ben-Gurion University, Israel
Shlomi Dolev , Ben-Gurion University, Israel
Yinnon Haviv , Ben-Gurion University, Israel
Reuven Yagel , Ben-Gurion University, Israel
pp. 991-998
C. Engelmann , University of Reading, UK
S. L. Scott , Oak Ridge National Laboratory, USA
C. Leangsuksun , Louisiana Tech University, USA
X. He , Tennessee Technological University, USA
pp. 999-1008
First International Workshop on Secure Software Engineering (SecSE 2007)
Christos Kalloniatis , University of the Aegean
Evangelia Kavakli , University of the Aegean
Stefanos Gritzalis , University of the Aegean
pp. 1009-1017
Shanai Ardi , Linkopings universitet
David Byers , Linkopings universitet
Per Hakon Meland , SINTEF ICT, Norway
Inger Anne Tondel , SINTEF ICT, Norway
Nahid Shahmehri , Linkopings universitet
pp. 1017-1025
Gabriel Hermosillo , ITESM-CEM-Dpto. Ciencias Computacionales, Mexico
Roberto Gomez , ITESM-CEM-Dpto. Ciencias Computacionales, Mexico
Lionel Seinturier , LIFL - INRIA Jacquard Project, France
Laurence Duchien , LIFL - INRIA Jacquard Project, France
pp. 1026-1033
Koen Buyens , DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
Bart De Win , DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
Wouter Joosen , DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
pp. 1034-1041
Takao Okubo , Fujitsu Laboratories ltd., Institute of Information Security
Hidehiko Tanaka , Fujitsu Laboratories ltd., Institute of Information Security
pp. 1042-1051
Sergey Bratus , Dartmouth College
Alex Ferguson , Dartmouth College
Doug McIlroy , Dartmouth College
Sean Smith , Dartmouth College
pp. 1052-1059
Kaarina Karppinen , VTT Technical Research Centre of Finland, Oulu, Finland
Reijo Savola , VTT Technical Research Centre of Finland, Oulu, Finland
Mikko Rapeli , VTT Technical Research Centre of Finland, Oulu, Finland
Esa Tikkala , VTT Technical Research Centre of Finland, Oulu, Finland
pp. 1060-1065
Chengying Mao , Jiangxi Univ. of Finance & Economics Nanchang, Jiangxi 330013, China
Yansheng Lu , College of Computer Scie. and Tech., Wuhan, Hubei 430074, China
pp. 1066-1073
Dragan Vidakovic , Gimnazija Ivanjica
Dejan Simic , FON Belgrade
pp. 1074-1084
Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)
Jan Ploski , OFFIS Institute for Information Technology, Oldenburg, Germany
Wilhelm Hasselbring , University of Oldenburg, Germany
pp. 1085-1092
Armin Beer , Siemens Program and Systems Engineering, Vienna, Austria
Matthias Heindl , Siemens Program and Systems Engineering, Vienna, Austria
pp. 1093-1100
Jiri Kubalik , Technical University in Vienna
Richard Mordinyi , Vienna University of Technology
pp. 1101-1107
Dindin Wahyudin , Vienna University of Technology
A Min Tjoa , Vienna University of Technology
pp. 1108-1115
Marcus Mor , Vienna University of Technology
Richard Mordinyi , Vienna University of Technology
Johannes Riemer , Vienna University of Technology
pp. 1116-1123
Roland Vecera , senactive.com
Szabolcs Rozsnyai , securityresearch.at
Heinz Roth , senactive.com
pp. 1124-1134
First International Workshop on Advances in Information Security (WAIS 2007)
Alexander Krizhanovsky , Moscow Aviation Institute, Moscow, Russia
Alexander Marasanov , Moscow Aviation Institute, Moscow, Russia
pp. 1135-1142
Rene Mayrhofer , Lancaster University
Martyn Welch , Lancaster University
pp. 1143-1148
Chik How Tan , Gjovik University College, Norway
pp. 1148-1154
Hyung Chan Kim , Gwangju Institute of Science and Technology, Korea
R.S. Ramakrishna , Gwangju Institute of Science and Technology, Korea
Wook Shin , University of Illinois at Urbana-Champaign
Kouichi Sakurai , Kyushu University, Fukuoka 812-8581, Japan
pp. 1160-1166
Tetsuya Izu , FUJITSU LABORATORIES Ltd.
Masahiko Takenaka , FUJITSU LABORATORIES Ltd.
Takeshi Shimoyama , FUJITSU LABORATORIES Ltd.
pp. 1167-1174
Yoshio KAKIZAKI , Tokai University Unified Graduate School
Hidekazu TSUJI , Tokai University
pp. 1175-1182
Koji Chida , NTT Corporation
Hiroaki Kikuchi , Tokai University
Gembu Morohashi , NTT Corporation
Keiichi Hirota , NTT Corporation
pp. 1183-1189
Orhan Cetinkaya , METU, Ankara, Turkey
Ali Doganaksoy , METU, Ankara, Turkey
pp. 1190-1196
Anders Moen Hagalisletto , University of Oslo
pp. 1197-1206
Luis Zarza , Universidad Tecnol?gica de la Mixteca
Josep Pegueroles , Technical University of Catalonia
Miguel Soriano , Technical University of Catalonia
pp. 1207-1213
Bogdan Groza , Politehnica University of Timisoara, Romania
Toma-Leonida Dragomir , Politehnica University of Timisoara, Romania
pp. 1214-1221
Nenad Stojanovski , Macedonian Telecommunication
Marjan Gusev , St. Cyril and Methodious University, Republic of Macedonia
Danilo Gligoroski , Norwegian University of Science and Technology, Trondheim, Norway
Svein.J. Knapskog , Norwegian University of Science and Technology, Trondheim, Norway
pp. 1222-1226
Dong Seong Kim , Hankuk Aviation University, Seoul, Korea
Taek-Hyun Shin , Hankuk Aviation University, Seoul, Korea
Jong Sou Park , Hankuk Aviation University, Seoul, Korea
pp. 1227-1234
Workshop on "Security in E-Learning" (SEL)
Gerald Quirchmayr , Institute of Distributed and Multimedia Systems
pp. 1240-1244
Emmanuel A. Adigun , University of Pretoria, South Africa
J.H.P. Eloff , University of Pretoria, South Africa
pp. 1245-1250
Alan Ward , University of Andorra
Jordi Castella Roca , Rovira i Virgili University of Tarragona
Alex Dorca Josa , University of Andorra
pp. 1251-1255
Author Index
Author Index (PDF)
pp. 1256
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool