The Community for Technology Leaders
2012 Seventh International Conference on Availability, Reliability and Security (2006)
Vienna, Austria
Apr. 20, 2006 to Apr. 22, 2006
ISBN: 0-7695-2567-9
TABLE OF CONTENTS
Papers
Introduction
Invited Talks

Risk Management and Risk Assessment at ENISA: Issues and Challenges (PDF)

Louis Marinos , ENISA - European Network and Information Security Agency
pp. 2-3

Model Driven Security (PDF)

David Basin , ETH Zurich, Switzerland
pp. 4
Session 1: Trust Management

Trust Based Risk Management for Distributed System Security - A New Approach (Abstract)

Vijay Varadharajan , Macquarie University, North Ryde, Sydney, Australia
Ching Lin , Macquarie University, North Ryde, Sydney, Australia
pp. 6-13

RATING: Rigorous Assessment of Trust in Identity Management (Abstract)

Deepak Goel , Institute of Technology, Banaras Hindu University
Rajarajan Sampath , International University in Germany
pp. 14-23

Provably Secure Anonymous Access Control for Heterogeneous Trusts (Abstract)

Hiroshi Yasuda , University of Tokyo
Kilho Shin , University of Tokyo
pp. 24-33
Session 2: P2P Systems

A Secure Event Agreement (SEA) protocol for peer-to-peer games (Abstract)

Scott Douglas , University of Melbourne, Australia
Peter Schachte , University of Melbourne, Australia
Vanessa Teague , University of Melbourne, Australia
Amy Beth Corman , University of Melbourne, Australia
pp. 34-41

Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay Networks (Abstract)

Makoto Takizawa , Tokyo Denki University, Japan
S. Misbah Deen , University of Keel, England
Tomoya Enokido , Rissho University, Japan
Yoshio Nakajima , Tokyo Denki University, Japan
Kenichi Watanabe , Tokyo Denki University, Japan
Naohiro Hayashibara , Tokyo Denki University, Japan
pp. 42-49

Censorship-Resistant and Anonymous P2P Filesharing (Abstract)

Thilo Mie , Universitat Karlsruhe (TH), Germany
Regine Endsuleit , Universitat Karlsruhe (TH), Germany
pp. 58-65
Session 3: Mobile Network and Pervasive Systems

A Dependable Device Discovery Approach for Pervasive Computing Middleware (Abstract)

Mohammad Zulkernine , Queen?s University, Kingston, Ontario, Canada
Suresh Anamanamuri , Marquette University, Milwaukee, WI
Sheikh I Ahamed , Marquette University, Milwaukee
pp. 66-73

Single sign-on framework for AAA operations within commercial mobile networks (Abstract)

Saber Zrelli , Japan Advanced Institute of Science and Technology, Ishikawa, JAPAN
Yoichi Shinoda , Japan Advanced Institute of Science and Technology, Ishikawa, JAPAN
pp. 74-81

Guidelines for Biometric Recognition in Wireless System for Payment Confirmation (Abstract)

Sasa Divjak , University of Ljubljana, Slovenia
Leon Grabensek , Prosum Ltd, Trzin, Slovenia
pp. 90-99
Session 4: Protocol and Communication

An Extended Verifiable Secret Redistribution Protocol for Archival Systems (Abstract)

K. Gopinath , Indian Institute of Science,Bangalore, India
V. H. Gupta , Indian Institute of Science,Bangalore, India
pp. 100-107

Analysis of Current VPN Technologies (Abstract)

Thomas Berger , University of Salzburg
pp. 108-115

Integration of Quantum Cryptography in 802.11 Networks (Abstract)

Thi Mai Trang Nguyen , University of Lausanne, Switzerland
Mohamed Ali Sfaxi, , University of Lausanne, Switzerland
Solange Ghernaouti-Helie , University of Lausanne, Switzerland
pp. 116-123

Availability Constraints for Avionic Data Buses (Abstract)

Alban Gabillon , Laboratoire d?Informatique de l?Universit? de Pau et des Pays de l?Adour, France
Laurent Gallon , Laboratoire d?Informatique de l?Universit? de Pau et des Pays de l?Adour, France
pp. 124-131
Session 5: Security as Quality of Service

Securing DNS Services through System Self Cleansing and Hardware Enhancements (Abstract)

Arun Sood , George Mason University, Fairfax,
David Arsenault , George Mason University, Fairfax, VA
Yih Huang , George Mason University, Fairfax, VA
pp. 132-139

Personalized Security for E-Services (Abstract)

George Yee , Institute for Information Technology National Research Council Canada
pp. 140-147

Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks (Abstract)

Juan Vera del Campo , Polytechnic University of Catalonia, Spain
Miguel Soriano , Polytechnic University of Catalonia, Spain
Josep Pegueroles , Polytechnic University of Catalonia, Spain
pp. 148-155

Towards a Stochastic Model for Integrated Security and Dependability Evaluation (Abstract)

Karin Sallhammar , Norwegian University of Science and Technology
Svein J. Knapskog , Norwegian University of Science and Technology
Bjarne E. Helvik , Norwegian University of Science and Technology
pp. 156-165
Session 6: Networking and Fault Tolerance

A Novel Artificial-Immune-Based Approach for System-Level Fault Diagnosis (Abstract)

Mourad Elhadef , University of Ottawa, Ottawa, Canada
Shantanu Das , University of Ottawa, Ottawa, Canada
Amiya Nayak , University of Ottawa, Ottawa, Canada
pp. 166-173

Sandboxing in myKlaim (Abstract)

Rene Rydhof Hansen , Technical University of Denmark
Flemming Nielson , Technical University of Denmark
Christian W. Probst , Technical University of Denmark
pp. 174-181

Evaluation of Network Robustness for Given Defense Resource Allocation Strategies (Abstract)

Y.-L. Lin , National Taiwan University
C.-L. Tseng , National Taiwan University
C.-H. Chen , National Taiwan University
Y.-S. Lin , National Taiwan University
P.-H. Tsang , National Taiwan University
pp. 182-189

Proxy Oblivious Transfer Protocol (Abstract)

Yao Gang , Graduate School of Chinese Academy of Sciences, Beijing
Feng Dengguo , Graduate School of Chinese Academy of Sciences, Beijing
pp. 190-197
Session 7: Identification and Authentication

Providing Response Identity and Authentication in IP Telephony (Abstract)

Cullen Jennings , Cisco Systems, INC
Feng Cao , Cisco Systems, INC
pp. 198-205

Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition (Abstract)

Rolv Br? , NTNU, Department of Telematics N-7491 Trondheim, Norway
Judith E. Y. Rossebo , NTNU, Department of Telematics, and Telenor R&D, N-1331 Fornebu, Norway
pp. 206-215

An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol (Abstract)

Maurizio A. Strangio , University of Rome "Tor Vergata", ITALY
pp. 216-223

A Method for the Identification of Inaccuracies in Pupil Segmentation (Abstract)

Luis A. Alexandre , Universidade da Beira Interior, Covilha, Portugal
Hugo Proenca , Universidade da Beira Interior, Covilha, Portugal
pp. 224-228

Availability Enforcement by Obligations and Aspects Identification (Abstract)

Frederic Cuppens , GET/ENST Bretagne, 2 rue de la Chataigneraie, 35512 Cesson Sevigne Cedex, France
Nora Cuppens-Boulahia , GET/ENST Bretagne, 2 rue de la Chataigneraie, 35512 Cesson Sevigne Cedex, France
Tony Ramard , GET/ENST Bretagne, 2 rue de la Chataigneraie, 35512 Cesson Sevigne Cedex, France
pp. 229-239
Session 8: High Availability and Dependability

An integral IT continuity framework for undisrupted business operations (Abstract)

S. Van Oorschot , Utrecht University, Institute of Information and Computing Science, The Netherlands
R.W. Helms , Utrecht University, Institute of Information and Computing Science, The Netherlands
J. Herweijer , Utrecht University, Institute of Information and Computing Science, The Netherlands
M. Plas , Getronics, The Netherlands
pp. 240-244

Highly Adaptable Dynamic Quorum Schemes for Managing Replicated Data (Abstract)

Christian Storm , University of Oldenburg, Germany
Oliver Theel , University of Oldenburg, Germany
Carl Von Ossietzky , University of Oldenburg, Germany
pp. 245-253

High Availability support for the design of stateful networking equipments (Abstract)

R.M. Gasca , ETS Ingenieria Informatica, SEVILLE - Spain
Laurent Lef`evre , INRIA RESO - LIP Laboratory, LYON 07 - France
P. Neira , ETS Ingenieria Informatica, SEVILLE - Spain
pp. 254-261

A Hybrid Network Intrusion Detection Technique Using Random Forests (Abstract)

Mohammad Zulkernine , Queen?s University, Kingston, Canada
Jiong Zhang , Queen?s University, Kingston, Canada
pp. 262-269

Identifying Intrusions in Computer Networks with Principal Component Analysis (Abstract)

Wei Wang , University of Trento, Italy
Roberto Battiti , University of Trento, Italy
pp. 270-279
Session 9: Reliability and Availability

Systematic Error Detection for RFID Reliability (Abstract)

Sozo Inoue , Kyushu University, Japan
Hiroto Yasuura , Kyushu University, Japan
Daisuke Hagiwara , Sony Global Solutions Inc.
pp. 280-286

Feasibility of Multi-Protocol Attacks (Abstract)

Cas Cremers , Eindhoven University of Technology, Netherlands
pp. 287-294

Diversity to Enhance Autonomic Computing Self-Protection (Abstract)

Rudolph Seviora , University of Waterloo, Canada
Michael Jarrett , University of Waterloo, Canada
pp. 295-299

Reliability Forecasting in Complex Hardware/Software Systems (Abstract)

Javier Cano , Universidad Rey Juan Carlos, Madrid, Spain
David Rios , Universidad Rey Juan Carlos, Madrid, Spain
pp. 300-304

Availability Modeling and Analysis on High Performance Cluster Computing Systems (Abstract)

Hertong Song , Louisiana Tech University
Raja Nassar , Louisiana Tech University
Chokchai "box" Leangsuksun , Louisiana Tech University
pp. 305-313
Session 10: Security and Privacy Issue

Schedulability Driven Security Optimization in Real-time Systems (Abstract)

Laurence T. Yang , St. Francis Xavier University, Canada
Man Lin , St. Francis Xavier University, Canada
pp. 314-320

Ensuring Privacy for E-Health Services (Abstract)

Larry Korba , National Research Council Canada
George Yee , National Research Council Canada
Ronggong Song , National Research Council Canada
pp. 321-328

The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine (Abstract)

A Min Tjoa , Vienna University of Technology, Austria
Marko Banek , University of Zagreb, Croatia
Nevena Stolba , Vienna University of Technology, Austria
pp. 329-339

Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols (Abstract)

Robert Krimmer , Institute for Production Management, Vienna
Melanie Volkamer , DFKI GmbH, Saarbrucken, Germany
pp. 340-347

A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities (Abstract)

Bing Mao , Nanjing University, Nanjing, 210093, China
Zhiqiang Lin , Nanjing University, Nanjing, 210093, China
Li Xie , Nanjing University, Nanjing, 210093, China
pp. 348-357
Session 11: Security Management

A Study of Security Architectural Patterns (Abstract)

David G. Rosado , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
Eduardo Fernandez-Medina , University of Castilla-La Mancha, Spain
Carlos Gutierrez , STL. Calle Manuel Tovar 9, 28034 Madrid, Spain
pp. 358-365

Workshop-based Multiobjective Security Safeguard Selection (Abstract)

Thomas Neubauer , Institute of Software Technology and Interactive Systems Vienna University of Technology, Austria
Edgar Weippl , Institute of Software Technology and Interactive Systems Vienna University of Technology, Austria
Christian Stummer , School of Business, Economics,and Statistics, Vienna University of Technology, Austria
pp. 366-373

Towards a Security Architecture for Vehicular Ad Hoc Networks (Abstract)

Christian Mletzko , University of Regensburg, 93040 Regensburg, Germany
Klaus Plobl , University of Regensburg, 93040 Regensburg, Germany
Thomas Nowey , University of Regensburg, 93040 Regensburg, Germany
pp. 374-381

Improving Security Management through Passive Network Observation (Abstract)

Benjamin Morin , Supelec Avenue de la Boulaie - France
Yohann Thomas , France Telecom R&D
Herve Debar , France Telecom R&D
pp. 382-389

Digital Signatures for Modifiable Collections (Abstract)

Tova Milo , Tel-Aviv Univ.
Serge Abiteboul , INRIA & LRI-Univ. of Paris-Sud, France
Amos Fiat , Tel-Aviv Univ.
Bogdan Cautis , INRIA & LRI-Univ. of Paris-Sud, France
pp. 390-399
Session 12: Distributed Systems

A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems (Abstract)

J. Osrael , Vienna University of Technology
P. Galdamez , Universidad Politecnica de Valencia, Spain
S. Beyer , Universidad Politecnica de Valencia, Spain
K. M. Goeschka , Vienna University of Technology
L. Froihofer , Vienna University of Technology
F. Munoz , Universidad Politecnica de Valencia, Spain
pp. 400-407

DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems (Abstract)

Pablo Galdamez , Universidad Politecnica de Valencia, Spain
Alexander Sanchez , Universidad Politecnica de Valencia, Spain
Francesc D. Munoz-Escoi , Universidad Politecnica de Valencia, Spain
Stefan Beyer , Universidad Politecnica de Valencia, Spain
pp. 408-415

Defense trees for economic evaluation of security investments (Abstract)

Pamela Peretti , Universita degli Studi "G. d?Annunzio" Pescara, Italy
Fabio Fioravanti , Universita degli Studi "G. d?Annunzio" Pescara, Italy
Stefano Bistarelli , Universita degli Studi "G. d?Annunzio" Pescara, Italy
pp. 416-423

Proposed Framework for Achieving Interoperable Services Between European Public Administrations (Abstract)

Amir Hayat , Graz Univ. of Tech. 8010 Graz, Austria
Thomas Rossler , Graz Univ. of Tech. 8010 Graz, Austria
Muhammad Alam , Universitat Innsbruck , 6020 Innsbruck, Austria
pp. 424-431

Gait Recognition Using Acceleration from MEMS (Abstract)

Davrondzhon Gafurov , Gjovik University College, Norway
Kirsi Helkala , Gjovik University College, Norway
Torkjel Sondrol , Gjovik University College, Norway
pp. 432-439
Session 13: Software Security and Dependability

Making Web Services Dependable (Abstract)

P. M. Melliar-Smith , University of California, Santa Barbara
Wenbing Zha , Cleveland State University, Cleveland, OH
L. E. Moser , University of California, Santa Barbara
pp. 440-448

A Simple Component Connection Approach for Fault Tree Conversion to Binary Decision Diagram (Abstract)

R. Remenyte , Loughborough University; Loughborough,Leicestershire, England
J.D. Andrews , Loughborough University; Loughborough,Leicestershire, England
pp. 449-457

Secure Business Process Management: A Roadmap (Abstract)

Stefan x Biffl , Vienna University of Technology, Austria
Markus Klemen , Vienna University of Technology, Austria
Thomas Neubauer , Vienna University of Technology, Austria
pp. 457-464

Supporting Attribute-based Access Control with Ontologies (Abstract)

Wolfgang Dobmeier , University of Regensburg, D-93040 Regensburg, Germany
Torsten Priebe , Capgemini Consulting Osterreich AG Lassallestrabe 9b, A-1020 Vienna, Austria
Nora Kamprath , University of Regensburg, D-93040 Regensburg, Germany
pp. 465-472

Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets (Abstract)

Adrian Graur , University of Suceava, 9 University str., RO-720225, Romania
Cornel Turcu , University of Suceava, 9 University str., RO-720225, Romania
Calin Ciufudean , University of Suceava, 9 University str., RO-720225, Romania
Constantin Filote , University of Suceava, 9 University str., RO-720225, Romania
Valentin Popa , University of Suceava, 9 University str., RO-720225, Romania
pp. 473-481
Session 1: IP Network and Adhoc Network

A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter? (Abstract)

Wei Huang , University of Luton, Park Square, Luton, Bedfordshire, LU1 3JU, United Kingdom
Tim French , University of Luton, Park Square, Luton, Bedfordshire, LU1 3JU, United Kingdom
Marc Conrad , University of Luton, Park Square, Luton, Bedfordshire, LU1 3JU, United Kingdom.
Carsten Maple , University of Luton, Park Square, Luton, Bedfordshire, LU1 3JU, United Kingdom
pp. 482-487

Secure 3G User Authentication in Adhoc Serving Networks (Abstract)

Arjan Durresi , Louisiana State University, USA
Lyn Evans , Louisiana State University, USA
Vamsi Paruchuri , Louisiana State University, USA
Leonard Barolli , Fukuoka Institute of Technology, Japan
pp. 488-495

Security Analysis for IP-based Government Emergency Telephony Service (Abstract)

Feng Cao , Cisco Systems, INC.
Saadat Malik , Cisco Systems, INC.
pp. 496-501

Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS) (Abstract)

Muhammad Sher , Technical University Berlin & Fokus Fraunhofer Institute, Berlin, Germany
Walter T. Penzhorn , University of Pretoria South Africa
Thomas Magedanz , Technical University Berlin & Fokus Fraunhofer Institute, Berlin, Germany
pp. 502-509

Privacy threats and issues in mobile RFID (Abstract)

Jeeyeon Kim , Korea Information Security Agency
Hyangjin Lee , Korea Information Security Agency
pp. 510-514
Session 2: Wireless and Sensor Network

A Framework of Survivability Model for Wireless Sensor Network (Abstract)

Khaja Mohammad Shazzad , Hankuk Aviation University
Dong Seong Kim , Hankuk Aviation University
Jong Sou Park , Hankuk Aviation University
pp. 515-522

Mitigating Denial of Service Threats in GSM Networks (Abstract)

Vladimir CRETU , Politehnica University of Timisoara
Valer BOCAN , Politehnica University of Timisoara
pp. 523-528

Achieving Availability and Reliability in Wireless Sensor Networks Applications (Abstract)

Amirhosein Taherkordi , Iran University of Science and Technology
Majid Alkaee Taleghan , Iran University of Science and Technology
Mohsen Sharifi , Iran University of Science and Technology
pp. 529-535

Secure Enhanced Wireless Transfer Protocol (Abstract)

Yu-Hsin Kao , Tatung University
Chen-Wei Yang , Tatung University
Jin-Cherng Lin , Tatung University
pp. 536-543
Session 3: Authentication and Authorization

Quality of Password Management Policy (Abstract)

Mario Piattini , University of Castilla-La Marzcha, Spain
Carlos Villarrubia , University of Castilla-La Marzcha, Spain
Eduardo Fernhndez-Medina , University of Castilla-La Marzcha, Spain
pp. 544-550

A Proposal of An Anonymous Authentication Method For Flat-rate Service (Abstract)

Hiroshi YAMAMOTO , School of Information Technology and Electronics, Tokai University, Japan
Hidekazu TSUJI , School of Information Technology and Electronics, Tokai University, Japan
Yoshio KAKIZAKI , Tokai University Unified Graduate School, Japan
pp. 551-557

Recovery Mechanism of Online Certification Chain in Grid Computing (Abstract)

MingChu LI , Dalian University of Technology
Jianbo MA , Tianjin University
Hongyan YAO , Dalian University of Technology
pp. 558-562
Session 4: Trust Management and Recovery

PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model (Abstract)

Rafael Paez , Technical University of Catalonia, Barcelona, Spain
Cristina Satizabal , Pamplona University, Pamplona, Colombia
Jordi Forne , Technical University of Catalonia, Barcelona, Spain
pp. 563-570

Recovery Mechanism of Cooperative Process Chain in Grid (Abstract)

MingChu LI , Dalian University of Technology, China
Hongyan YAO , Dalian University of Technology, China
pp. 571-576

Run-Time Detection of Covert Channels (Abstract)

Naoyuki Nagatou , Tokyo Institute of Technology
Takuo Watanabe , Tokyo Institute of Technology.
pp. 577-584
Session 5: Secure Information System

Practical Approach of a Secure Management System based on ISO/IEC 17799 (Abstract)

Eduardo Fernandez-Medina , University of Castilla-La Mancha, Spain
Daniel Villafranca , SICAMAN NT., Spain
Lu?s Enrique Sanchez , SICAMAN NT., Spain
Mario Piattini , University of Castilla-La Mancha, Spain
pp. 585-592

Testing Complex Business Process Solutions (Abstract)

Gerd Saurer , Senactive IT Dienstleistungs GmbH
Alexander Schatten , Institute for Software Technology and Interactive Systems
pp. 593-600

Deontic Relevant Logic as the Logical Basis for Specifying, Verifying, and Reasoning about Information Security and Information Assurance (Abstract)

Junichi Miura , Saitama University, Saitama, 338-8570, Japan
Jingde Cheng , Saitama University, Saitama, 338-8570, Japan
pp. 601-608

Resource Management Continuity With Constraint Inheritance Relation (Abstract)

Zude Li , Tsinghua University, Beijing, China
Guoqiang Zhan , Tsinghua University, Beijing, China
Xiaojun Ye , Tsinghua University, Beijing, China
pp. 609-616
Session 6: Availability

On the Reliability ofWeb Clusters with Partial Replication of Contents (Abstract)

David E. Singh , Universidad Carlos III de Madrid, Spain
Alejandro Calderon , Universidad Carlos III de Madrid, Spain
Jose Daniel Garcia , Universidad Carlos III de Madrid, Spain
Jesus Carretero , Universidad Carlos III de Madrid, Spain
Felix Garcia , Universidad Carlos III de Madrid, Spain
Javier Fernandez , Universidad Carlos III de Madrid, Spain
pp. 617-624

Reliability Modeling Strategy of an Industrial System (Abstract)

S M Rizwan , Caledonian College of Engineering, Sultanate of Oman
K P Ramachandran , Caledonian College of Engineering, Sultanate of Oman
pp. 625-630

Persistent Computing Systems as Continuously Available, Reliable, and Secure Systems (Abstract)

Jingde Cheng , Saitama University, Saitama, 338-8570, Japan
pp. 631-638

Active/Active Replication for Highly Available HPC System Services (Abstract)

S. L. Scott , Oak Ridge National Laboratory, Oak Ridge, TN
C. Leangsuksun , Louisiana Tech University, Ruston, LA
C. Engelmann , University of Reading, Reading, RG6 6AH, UK
X. He , Tennessee Technological University, Cookeville, TN
pp. 639-645
Session 7: Software Security 1

Towards an Integrated Conceptual Model of Security and Dependability (Abstract)

Erland Jonsson , Chalmers University of Technology, Sweden
pp. 646-653

A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements (Abstract)

Eduardo Fernandez-Medina , UCLM-Soluziona Research and Development Institute, Spain
Daniel Mellado , Quality, Auditing and Security Institute, Madrid, Spain
Mario Piattini , UCLM-Soluziona Research and Development Institute, Spain
pp. 654-661

Secure and Reliable Java-Based Middleware - Challenges and Solutions (Abstract)

Walter Binder , Artificial Intelligence Laboratory, Lausanne, Switzerland
pp. 662-669
Session 8: Software Security 2

Security Requirement with a UML 2.0 Profile (Abstract)

Mario Piattini , University of Castilla-La Mancha, Spain
Alfonso Rodriguez , Universidad del Bio Bio, La Castilla, Chile
Eduardo Fernandez-Medina , University of Castilla-La Mancha, Spain
pp. 670-677

Representing levels of abstraction to facilitate the Secure Multidimensional Modeling (Abstract)

Mario Piattini , University of Castilla-La Mancha, Spain
Rodolfo Villarroel , Catholic University of Maule, Chile
Eduardo Fernandez-Medina , University of Castilla-La Mancha, Spain
Juan Trujillo , University of Alicante, Spain
Emilio Soler , University of Matanzas, Cuba
pp. 678-684

Modeling permissions in a (U/X)ML world (Abstract)

Ruth Breu , Universitat Innsbruck, Austria
Muhammad Alam , Universitat Innsbruck, Austria
Michael Hafner , Universitat Innsbruck, Austria
pp. 685-692
Session 9: Safety and Security

Application of the Digraph Method in System Fault Diagnostics (PDF)

E. M. Kelly , Loughborough University, UK
L. M. Bartlett , Loughborough University, UK
pp. 693-700

No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies (Abstract)

Eiichi Morino , Gesell Research Society Japan
Jun Murai , Keio University
Kenji Saito , Keio University
pp. 701-708
Session 10: E-commerce and E-Government

A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce (Abstract)

Christian Schlager , University of Regensburg, Germany
Jose A. Montenegro , University of Malaga, Spain
Thomas Nowey , University of Regensburg, Germany
pp. 709-716

Achieving Fairness and Timeliness in a Previous Electronic Contract Signing Protocol (Abstract)

Llorenc Huguet-Rotger , Universitat de les Illes Balears
Josep Llu?s Ferrer-Gomila , Universitat de les Illes Balears
Magdalena Payeras-Capella , Universitat de les Illes Balears
pp. 717-722

Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF (Abstract)

Stefan Biffl , Vienna University of Technology, Austria
Thomas Neubauer , Vienna University of Technology, Austria
Edgar Weippl , Vienna University of Technology, Austria
pp. 723-731
Session 1: Construction of Dependable Overlay Networks

Efficient Link Failure Detection and Localization using P2P-Overlay Networks (Abstract)

Barbara Emmert , Telecommunications Research Center Vienna, Austria
Andreas Binzenhofer , University of Wurzburg, Germany
pp. 732-739

Replication Strategies for Reliable Decentralised Storage (Abstract)

Jim Davies , Oxford University Computing Laboratory
Matthew Leslie , Oxford University Department of Physics
Todd Huffman , Oxford University Department of Physics
pp. 740-747
Session 2: Security

Multipath Key Exchange on P2P Networks (Abstract)

Naoki Isozaki , Japan Advanced Institute of Science and Technology
Yuuki Takano , Japan Advanced Institute of Science and Technology
Yoichi Shinoda , Japan Advanced Institute of Science and Technology
pp. 748-755

Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration (Abstract)

Jochen Dinger , Universitat Karlsruhe (TH), Germany
Hannes Hartenstein , Universitat Karlsruhe (TH), Germany
pp. 756-763
Session 3: Social Front

Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems (Abstract)

Kenji Saito , Keio University
Jun Murai , Keio University
Eiichi Morino , Gesell Research Society Japan
pp. 764-771

Ecosystem of Naming Systems: Discussions on a Framework to Induce Smart Space Naming Systems Development (Abstract)

Shirou WAKAYAMA , TOSHIBA Corporation
Tomohiro ISHIHARA , Keio University
Masahiro ISHIYAMA , TOSHIBA Corporation
Satoshi OZAKI , TOSHIBA Corporation
Yusuke DOI , TOSHIBA Corporation
Yojiro UO , IIJ Research Laboratory
pp. 772-778

Deriving Ratings Through Social Network Structures (Abstract)

Omer F. Rana , Cardiff University, 5 The Parade Cardiff, UK
Ali Shaikh Ali , Cardiff University, 5 The Parade Cardiff, UK
Hameeda Alshabib , University of Glamorgan, UK
pp. 779-787
Workshop on Bayesian Networks in Dependability (BND2006)

Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability Uncertainty (Abstract)

Philippe WEBER , CRAN UMR 7039, CNRS-UHP-INPL, France
Christophe SIMON , CRAN UMR 7039, CNRS-UHP-INPL, France
pp. 788-793

Multi-Agent Causal Models for Dependability Analysis (Abstract)

Sam Maes , LITIS Laboratory, INSA Rouen, Cedex, France
Philippe Leray , LITIS Laboratory, INSA Rouen, Cedex, France
pp. 794-798

Computing Multiple Diagnoses in Large Devices Using Bayesian Networks (Abstract)

Sylvain Piechowiak , University of Valenciennes, Cedex, France
Veronique Delcroix , University of Valenciennes, Cedex, France
Mohamed-Amine Maalej , University of Valenciennes, Cedex, France
pp. 799-803

Automatically Translating Dynamic Fault Trees into Dynamic Bayesian Networks by Means of a Software Tool (Abstract)

S. Montani , Universita del Piemonte Orientale
D. Codetta-Raiteri , Universita del Piemonte Orientale
L. Portinale , Universita del Piemonte Orientale
A. Bobbio , Universita del Piemonte Orientale
pp. 804-809

Modeling the Reliability of Search and Rescue Operations within the UK Through Bayesian Belief Networks (Abstract)

Ashley Russell , University of Strathclyde, Glasgow UK
John Quigley , University of Strathclyde, Glasgow UK
Robert Van der Meer , University of Strathclyde, Glasgow UK
pp. 810-816

Modeling Dependable Systems using Hybrid Bayesian Networks (Abstract)

David Marquez , University of London
Manesh Tailor , Agena Ltd
Martin Neil , Agena Ltd
Peter Hearty , University of London
Norman Fenton , Agena Ltd
pp. 817-823
Workshop on Dependability in Large-scale Service-oriented Systems (DILSOS)

An Architecture for Service Discovery Based on Capability Matching (Abstract)

Jaka Mo?cnik , XLAB d.o.o., Ljubljana, Slovenia
Piotr Karwaczynski , Wroclaw University of Technology, Wroclaw, Poland
pp. 824-831

A Declarative Control Language for Dependable XML Message Queues (Abstract)

Carl-Christian Kanne , Universitat Mannheim, Germany
Guido Moerkotte , Universitat Mannheim, Germany
Alexander Bohm , Universitat Mannheim, Germany
pp. 832-839

Timed Modelling and Analysis inWeb Service Compositions (Abstract)

Marco Pistore , DIT, University of Trento, Italy
Raman Kazhamiakin , DIT, University of Trento, Italy
Paritosh Pandya , Tata Institute of Fundamental Research, Mumbai, India
pp. 840-846

Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks (Abstract)

Lukasz Juszczyk , Vienna University of Technology
Schahram Dustdar , Vienna University of Technology
Jaroslaw Lazowski , Vienna University of Technology
pp. 847-854

Evaluating Certification Protocols in the Partial Database State Machine (Abstract)

F. Moura , F. Moura
J. Pereira , J. Pereira
R. Oliveira , R. Oliveira
A. Jr. Correia , A. Correia Jr.
A. Sousa , A. Sousa
pp. 855-863
Workshop: Security in E-Learning (SEL)

A Secure E-Exam Management System (Abstract)

Aleix Dorca-Josa , Universitat d?Andorra
Jordi Herrera-Joancomarti , Universitat Oberta de Catalunya, Av. Tibidabo 39, 08035 Barcelona
Jordi Castella-Roca , Rovirai Virgili University of Tarragona
pp. 864-871

Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects (Abstract)

Elke Franz , Dresden University of Technology, Germany
Katrin Borcea-Pfitzmann , Dresden University of Technology, Germany
pp. 872-878

Access Control in a Privacy-Aware eLearning Environment (Abstract)

Hagen Wahrig , Dresden University of Technology, Germany
Elke Franz , Dresden University of Technology, Germany
Alexander Boettcher , Dresden University of Technology, Germany
Katrin Borcea-Pfitzmann , Dresden University of Technology, Germany
pp. 879-886

Adding Security to a Multiagent Learning Platform (Abstract)

W. Do Prado Lima , University of Caxias do Sul - Brazil
Carine G. Webber , University of Caxias do Sul - Brazil
Alexandre M. Ribeiro , University of Caxias do Sul - Brazil
Maria De Fatima , University of Caxias do Sul - Brazil
Marcos E. Casa , University of Caxias do Sul - Brazil
pp. 887-894

Unlocking Repositories: Federated Security Solution for Attribute and Policy Based Access to Repositories via Web Services (Abstract)

Ashok Shah , Simon Fraser University, British Columbia, Canada
Ty Mey (Timmy) Eap , Simon Fraser University, British Columbia, Canada
Marek Hatala , Simon Fraser University, British Columbia, Canada
pp. 895-903
Workshop - Dependability Aspects on Data WArehousing and Mining Applications (DAWAM 2006)

Offline Internet Banking Fraud Detection (Abstract)

Vasilis Aggelis , WINBANK (PIRAEUSBANK SA)
pp. 904-905

Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel (Abstract)

Juan Trujillo , Universidad de Alicante, Spain
Eduardo Fernandez-Medina , Universidad de Castilla-La Mancha, Spain
Rodolfo Villarroel , Universidad Catolica del Maule, Chile
Mario Piattini , Universidad de Castilla-La Mancha, Spain
Emilio Soler , Universidad de Matanzas, Cuba
pp. 914-921

A 2^d-Tree-Based Blocking Method for Microaggregating Very Large Data Sets (Abstract)

Josep M. Mateo-Sanz , Universitat Rovira i Virgili, Catalonia, Spain
Agusti Solanas , Universitat Rovira i Virgili, Catalonia, Spain
Antoni Martinez-Balleste , Universitat Rovira i Virgili, Catalonia, Spain
Josep Domingo-Ferrer , Universitat Rovira i Virgili, Catalonia, Spain
pp. 922-928

Dependability in Data Mining: A Perspective from the Cost of Making Decisions (Abstract)

H. Michael Chung , California State University, Long Beach
pp. 944-949
Workshop on Bioinformatics and Security (BIOS 06)

Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project (Abstract)

M. Bayer , University of Glasgow
R. Sinnott , University of Glasgow,
A. Stell , University of Glasgow
J. Koetsier , University of Edinburgh
pp. 950-957

The Usability and Practicality of Biometric Authentication in the Workplace (Abstract)

Peter Norrington , Kinetic Solutions, UK
Carsten Maple , University of Luton, Luton, Bedfordshire, UK
pp. 958-964

Building an Encrypted File System on the EGEE grid: Application to Protein Sequence Analysis (Abstract)

G. Deleage , CNRS; Univ. Lyon 1, France
R. Mollon , CNRS; Univ. Lyon 1, France
C. Blanchet , CNRS; Univ. Lyon 1, France
pp. 965-973
Workshop: Information Security Risk Management (ISRM)

The knowledge pressure on Risk and Security managers is increasing (Abstract)

Heidi Ola , Stockholm University/Royal Institute of Technology, Sweden
Camilla Silversjo Holmqvist , Stockholm University/Royal Institute of Technology, Sweden
Christer Magnusson , Stockholm University/Royal Institute of Technology, Sweden
pp. 974-979

Validation of IT-Security Measurement Tools (Abstract)

Martin Dietrich , lic. oec. HSG, CISA BSG Unternehmensberatung
Ruedi Baer , BSG Unternehmensberatung
pp. 980-981

Risk Management approach on identity theft in biometric systems context (Abstract)

Sabine Delaitre , ICT Unit, IPTS, JRC, European Commission, Sevilla, Spain
pp. 982
Workshop - Dependability and Security in e-Government (DeSeGov 2006)

E-voting: Dependability Requirements and Design for Dependability (Abstract)

B Littlewood , Centre for Software Reliability,City University, London, UK
L Strigini , Centre for Software Reliability, City University, London, UK
P Y A Ryan , University of Newcastle upon Tyne, UK
J W Bryans , University of Newcastle upon Tyne, UK
pp. 988-995

Defining Criteria for Rating an Entity?s Trustworthiness Based on Its Certificate Policy (Abstract)

Lindsay Marshall , University of Newcastle upon Tyne, UK
Omar Batarfi , University of Newcastle upon Tyne, UK
pp. 996-1003

A Component Based Software Architecture for E-Government Applications (Abstract)

Raphael Kunis , Chemnitz University of Technology, Germany
Gudula Runger , Chemnitz University of Technology, Germany
Daniel Beer , Chemnitz University of Technology, Germany
pp. 1004-1011

Choosing the Right Wireless LAN Security Protocol for the Home and Business User (Abstract)

Helen Jacobs , Modern Networks, Knowl Piece, Wilbury Way, Hitchin, UK
Carsten Maple , University of Luton, Luton, Bedfordshire, LU1 3JU, UK
Matthew Reeve , Modern Networks, Knowl Piece, Wilbury Way, Hitchin, UK
pp. 1025-1032

An ontology for secure e-government applications (Abstract)

M. Karyda , University of the Aegean, Samos, Greece
C. Lambrinoudakis , University of the Aegean, Samos, Greece
S. Dritsas , Athens University of Economics and Business
L. Gymnopoulos , University of the Aegean, Samos, Greece
S. Kokolakis , University of the Aegean, Samos, Greece
T. Balopoulos , University of the Aegean, Samos, Greece
S. Gritzalis , University of the Aegean, Samos, Greece
pp. 1033-1037
Author Index

Author Index (PDF)

pp. 1045
99 ms
(Ver 3.1 (10032016))