The Community for Technology Leaders
2012 Seventh International Conference on Availability, Reliability and Security (2007)
Vienna, Austria
Apr. 10, 2007 to Apr. 13, 2007
ISBN: 0-7695-2775-2
TABLE OF CONTENTS
Introduction
Session 1: Trust Model & Trust Management

Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems (Abstract)

Richard Sinnott , University of Glasgow, UK
Anthony Stell , University of Glasgow, UK
Oluwafemi Ajayi , University of Glasgow, UK
pp. 3-10

From Trust to Dependability through Risk Analysis (Abstract)

Fabio Massacci , University of Trento
Paolo Giorgini , University of Trento
Yudistira Asnar , University of Trento
Nicola Zannone , University of Trento
pp. 19-26

Dynamic trust domains for secure, private, technology-assisted living (Abstract)

Jatinder Singh , University of Cambridge
Jean Bacon , University of Cambridge
Ken Moody , University of Cambridge
pp. 27-34

A Hybrid Trust Model for Enhancing Security in Distributed Systems (Abstract)

Ching Lin , Macquarie University, Sydney, Australia
Vijay Varadharajan , Macquarie University, Sydney, Australia
pp. 35-42

A Reliable Component-Based Architecture for E-Mail Filtering (Abstract)

Peter Lechner , University of Vienna
Wilfried N. Gansterer , University of Vienna
Andreas G.K. Janecek , University of Vienna
pp. 43-52
Session 2: Availability, Fault-Tolerant & Recovery

Availability and Performance of the Adaptive Voting Replication (Abstract)

Karl M. Goeschka , Vienna University of Technology
Johannes Osrael , Vienna University of Technology
Lorenz Froihofer , Vienna University of Technology
Norbert Chlaupek , University of Applied Sciences fh-campus wien, Daumegasse 5, 1100 Vienna, Austria
pp. 53-60

Distributed Stream Processing Analysis in High Availability Context (Abstract)

Pawel Marks , Silesian University of Technology, Poland
Marcin Gorawski , Silesian University of Technology, Poland
pp. 61-68

Implementing Network Partition-Aware Fault-Tolerant CORBA Systems (Abstract)

Pablo Galdamez , Universidad Politecnica de Valencia
Francesc D. Munoz-Esco , Universidad Politecnica de Valencia
Stefan Beyer , Universidad Politecnica de Valencia
pp. 69-76

Failure Recovery in Cooperative Data Stream Analysis (Abstract)

Zhen Liu , IBM T.J. Watson Research Center, USA
Bin Rong , RMIT University, Melbourne, Australia
Fred Douglis , IBM T. J. Watson Research Center Hawthorne, NY, USA
Cathy H. Xia , IBM T. J. Watson Research Center Hawthorne, NY, USA
pp. 77-84

A Recovery Protocol for Middleware Replicated Databases Providing GSI (Abstract)

J.R. Juarez , Universidad Publica de Navarra, Spain
J.E. Armendariz , Instituto Tecnologico de Informatica, Valencia, Spain
J.R. G. de Mendivil , Universidad Publica de Navarra, Spain
F.D. Munoz-Esco , Instituto Tecnologico de Informatica, Valencia, Spain
B. Kemme , McGill University, Canada
pp. 85-92

Revisiting Hot Passive Replication (Abstract)

Francesc D. Munoz-Esco , Universidad Politecnica de Valencia
Hendrik Decker , Universidad Politecnica de Valencia
Ruben de Juan-Marin , Universidad Politecnica de Valencia
pp. 93-102
Session 3: Reputation Management & Trust

Reputation Management Survey (Abstract)

Sini Ruohomaa , University of Helsinki
Eleni Koutrouli , National University of Athens
Lea Kutvonen , University of Helsinki
pp. 103-111

Dirichlet Reputation Systems (Abstract)

Jochen Haller , SAP Research Germany
Audun Josang , Queensland University of Technology
pp. 112-119

Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing (Abstract)

Christian Stuble , Ruhr-University Bochum, Germany
Ahmad-Reza Sadeghi , Ruhr-University Bochum, Germany
Marcel Winandy , Ruhr-University Bochum, Germany
Sebastian Gajek , Ruhr-University Bochum, Germany
pp. 120-127

Secure Anonymous Union Computation Among Malicious Partners (Abstract)

Stefan Bottcher , University of Paderborn, Germany
Sebastian Obermeier , University of Paderborn, Germany
pp. 128-138
Session 4: Privacy & Access Control

A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications (Abstract)

Oliver Jorns , Telecommunications Research, Vienna, Austria
Gerald Quirchmayr , University of Vienna
Oliver Jung , Telecommunications Research, Vienna, Austria
pp. 139-146

Privacy in Pervasive Computing and Open Issues (Abstract)

Pankaj Bhaskar , Marquette University, Milwaukee, WI, USA
Sheikh I Ahamed , Marquette University, Milwaukee, WI, USA
pp. 147-154

Context-Dependent Access Control for Contextual Information (Abstract)

Stephan Grob , Technische Universitat Dresden, Germany
Christin Groba , Technische Universitat Dresden, Germany
Thomas Springer , Technische Universitat Dresden, Germany
pp. 155-161

Bytecode Verification for Enhanced JVM Access Control (Abstract)

Dongxi Liu , University of Tokyo
pp. 162-172
Session 5: Failure Detection & Attack Prevention

Automatic Failure Detection with Separation of Concerns (Abstract)

P. Hazy , University of Waterloo, Canada
R. E. Seviora , University of Waterloo, Canada
pp. 173-181

A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor Networks (Abstract)

Azzedine Boukerche , University of Ottawa, Ottawa, Canada
Mourad Elhadef , University of Ottawa, Ottawa, Canada
pp. 182-189

Intrusion detection system for signal based SIP attacks through timed HCPN (Abstract)

Guiping Su , Graduate University of Chinese Academy of Sciences, Beijing
Yanlan Ding , Graduate University of Chinese Academy of Sciences, Beijing
pp. 190-197

3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model (Abstract)

Thomas Magedanz , Technical University Berlin/Fokus Fraunhofer Telecommunication Institute, Germany
Muhammad Sher , Technical University Berlin/Fokus Fraunhofer Telecommunication Institute, Germany
pp. 198-205

Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic (Abstract)

Mohamed Mejri , Laval University,Quebec, Canada
Meriam Ben Ghorbel , Digital Security Unit, Higher School of Communication,Tunis, Tunisia
Mehdi Talbi , Digital Security Unit, Higher School of Communication,Tunis, Tunisia
pp. 206-212

Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network (Abstract)

Yi-Luen Lin , National Taiwan University
Po-Hao Tsang , National Taiwan University
Frank Yeong-Sung Lin , National Taiwan University
pp. 213-222
Session 6: Authentication & Authorisation

Effects of Architectural Decisions in Authentication and Authorisation Infrastructures (Abstract)

Christian Schlager , University of Regensburg, Germany
Monika Ganslmayer , R&L Inc., Landshut, Germany
pp. 230-237

Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol (Abstract)

Robert Deng , Singapore Management University
Tieyan Li , Institute for Infocomm Research, Singapore
pp. 238-245

Authentication Mechanisms for Mobile Agents (Abstract)

Leila Ismail , United Arab Emirates University
pp. 246-253

Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning (Abstract)

Cees de Laat , University of Amsterdam
Leon Gommans , University of Amsterdam
Yuri Demchenko , University of Amsterdam
pp. 254-262

Implicit Authorization for Accessing Location Data in a Social Context (Abstract)

Florian Fuchs , Mobile and Distributed Systems Group, Institute for Informatics
Christiane Dargatz , Ludwig-Maximilian University Munich, Germany
Georg Treu , Mobile and Distributed Systems Group, Institute for Informatics
pp. 263-272
Session 7: Security Algorithm & Framework

A Reconfigurable Implementation of the New Secure Hash Algorithm (Abstract)

R. Tourki , Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
B. Bouallegue , Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
M. Machhout , Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
A. Baganne , LESTER-University of South Brittany, Lorient, France
M. Zeghida , LESTER-University of South Brittany, Lorient, France
pp. 281-285

Applications for Provably Secure Intent Protection with Bounded Input-Size Programs (Abstract)

Alec Yasinsac , Florida State University
J. Todd McDonald , Air Force Institute of Technology, Wright Patterson AFB, OH
pp. 286-293

A Framework for the Development of Secure Data Warehouses based on MDA and QVT (Abstract)

Eduardo Fern?ndez-Medina , University of Castilla-La Mancha
Emilio Soler , University of Matanzas,Cuba
Mario Piattini , University of Castilla-La Mancha
Juan Trujillo , University of Alicante, Spain
pp. 294-300
Session 8: Software Security

Design of a Process for Software Security (Abstract)

Nahid Shahmehri , Linkopings universitet, SE-58183 Linkoping, Sweden
David Byers , Linkopings universitet, SE-58183 Linkoping, Sweden
pp. 301-309

STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks (Abstract)

Claudia Eckert , Darmstadt University of Technology, Darmstadt, Germany
Kpatcha Bayarou , Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany
Christoph Kraub , University of Technology, Darmstadt, Germany
Markus Schneider , Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany
pp. 310-317

A secure architecture for the pseudonymization of medical data (Abstract)

Thomas Neubauer , Secure Business Austria
Oswald Boehm , Braincon Technologies, Vienna, Austria
Gernot Goluch , Secure Business Austria
Gert Reinauer , Braincon Technologies, Vienna, Austria
Alexander Krumboeck , Braincon Technologies, Vienna, Austria
Bernhard Riedl , Secure Business Austria
pp. 318-324

Collection of Quantitative Data on Security Incidents (Abstract)

Hannes Federrath , University of Regensburg Germany
Thomas Nowey , University of Regensburg Germany
pp. 325-334
Session 9: Security Models

Security vulnerabilities in DNS and DNSSEC (Abstract)

Suranjith Ariyapperuma , University of London
Chris J. Mitchell , University of London
pp. 335-342

Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES) (Abstract)

Yih Huang , George Mason University
Arun Sood , George Mason University
David Arsenault , George Mason University
pp. 343-350

Applying a Tradeoff Model (TOM) to TACT (Abstract)

Chris Hobbs , Nortel, Ottawa, Canada
Ric Holt , University of Waterloo, Canada
Raihan Al-Ekram , University of Waterloo, Canada
pp. 351-355

A Pattern System for Security Requirements Engineering (Abstract)

Maritta Heisel , University Duisburg-Essen, Germany
Holger Schmidt , University Duisburg-Essen, Germany
Denis Hatebur , University Duisburg-Essen, Germany
pp. 356-365

Security Requirements for a Semantic Service-oriented Architecture (Abstract)

Jan Kolter , University of Regensburg
Rolf Schillinger , University of Regensburg
Stefan Durbeck , University of Regensburg
pp. 366-373

Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management (Abstract)

Ludwig Fuchs , University of Regensburg, Germany
Gunther Pernul , University of Regensburg, Germany
pp. 374-384
Session 10: Miscellaneous Security Techniques

A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking (Abstract)

Slobodan Petrovic , Gjovik University College, P.O. box 191, N-2802 Gjovik, Norway
Vidar Evenrud Seeberg , Norsvin, Hamar, Norway
pp. 385-390

Static evaluation of Certificate Policies for GRID PKIs interoperability (Abstract)

Manel Medina , Universitat Polit?cnica de Catalunya, Spain
Valentina Casola , University of Naples, Federico II, Italy
Oscar Manso , Universitat Polit?cnica de Catalunya, Spain
Nicola Mazzocca , University of Naples, Federico II, Italy
Jesus Luna , Universitat Polit?cnica de Catalunya, Spain
pp. 391-399

Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE (Abstract)

Mansoor Ahmed , Vienna University of Technology
A Min Tjoa , Vienna University of Technology
Amin Anjomshoaa , Vienna University of Technology
Tho Manh Nguyen , Vienna University of Technology
pp. 400-407

Universally Composable Three-Party Key Distribution (Abstract)

YueFei Zhu , Information Engineering University,Henan, China
YaJuan Zhang , Guangzhou University, China
TingMao Chang , Information Engineering University,Henan, China
Jin Zhou , Information Engineering University,Henan, China
pp. 408-416
Session 11: eAuction & eVoting Protocol

An Efficient eAuction Protocol (Abstract)

Brian Curtis , Australian Catholic University
Josef Pieprzyk , Macquarie University
Jan Seruga , Australian Catholic University
pp. 417-421

Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes (Abstract)

Benedikt Ostermaier , ETH Zurich, Switzerland
Florian Dotzer , ASKON Consulting Group, Germany
Markus Strassberger , BMW Group, Germany
pp. 422-431

A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network (Abstract)

Orhan Cetinkaya , Institute of Applied Mathematics,METU, Ankara, Turkey
Ali Doganaksoy , METU, Ankara, Turkey
pp. 432-442
Session 12: Dependability in Distributed & Ubiquitous Computing

Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems (Abstract)

Lorenz Froihofer , Vienna University of Technology
Johannes Osrael , Vienna University of Technology
Karl M. Goeschka , Vienna University of Technology
pp. 443-450

Dependability Aspects of Ubiquitous Computing (Abstract)

Kaisa Sere , Abo Akademi University, Finland
Lu Yan , University College London
pp. 451-453

Concurrency Control using Subject- and Purpose-Oriented (SPO) View (Abstract)

Makoto Takizawa , Tokyo Denki University
Tomoya Enokido , Rissho University
pp. 454-464
Session 13: Anomaly & Intrusion Detection

Comparing Classifier Combining Techniques for Mobile-Masquerader Detection (Abstract)

Seppo Puuronen , University of Jyvaskyla, Finland
Oleksiy Mazhelis , University of Jyvaskyla, Finland
pp. 465-472

Process Profiling Using Frequencies of System Calls (Abstract)

Surekha Mariam Varghese , M.A. College of Engineering Kothamangalam, India
K.Poulose Jacob , Cochin University of Science and Technology, Kochi, India
pp. 473-479

Terrorist Networks Analysis through Argument Driven Hypotheses Model (Abstract)

D. M. Akbar Hussain , Aalborg University Esbjerg, Denmark
pp. 480-492
Session 1: Fault-Tolerant & Availability

High Availability for Network Management Applications (Abstract)

R. Venkat , Cisco Systems, Inc.
S. Prabhu , Cisco Systems, Inc.
pp. 493-498

RWAR: A Resilient Window-consistent Asynchronous Replication Protocol (Abstract)

Zhanhuai Li , Northwestern Polytechnical University
Yanlong Wang , Northwestern Polytechnical University
Wei Lin , Northwestern Polytechnical University
pp. 499-505

Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model (Abstract)

Tomoya Enokido , Rissho University, Japan
Makoto Takizawa , Tokyo Denki University, Japan
Keiji Ozaki , Tokyo Denki University, Japan
Naohiro Hayashibara , Tokyo Denki University, Japan
pp. 506-516
Session 2: Access Control

Access Control Model for Web Services with Attribute Disclosure Restriction (Abstract)

Subhendu Aich , Indian Institute of Technology, Kharagpur, India
Vipin Singh Mewar , Indian Institute of Technology, Kharagpur, India
Shamik Sural , Indian Institute of Technology, Kharagpur, India
pp. 524-531

Aggregating and Deploying Network Access Control Policies (Abstract)

Nora Cuppens-Boulahia , GET/ENST-Bretagne, France
Frederic Cuppens , GET/ENST-Bretagne, France
Joaquin G. Alfaro , Universitat Oberta de Catalunya
pp. 532-542
Session 3: Authentication

Secure Spatial Authentication using Cell Phones (Abstract)

Arjan Durresi , Baton Rouge, Louisiana, USA
Leonard Barolli , Fukuoka Institute of Technology, Fukuoka, Japan
Mimoza Durresi , Fukuoka Institute of Technology, Fukuoka, Japan
Vamsi Paruchuri , Louisiana State University
pp. 543-549

Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain (Abstract)

Bogdan Groza , Politehnica University of Timisoara, Romania
pp. 550-557

A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications (Abstract)

XU Nan , City University of Hong Kong, Kowloon
HE Yijun , Central South University
LI Jie , City University of Hong Kong, Kowloon
pp. 558-563

Improved Client-to-Client Password-Authenticated Key Exchange Protocol (Abstract)

Yao Gang , Graduate University of Chinese Academy of Sciences
Feng Dengguo , Graduate University of Chinese Academy of Sciences
Han Xiaoxi , Graduate University of Chinese Academy of Sciences
pp. 564-574
Session 4: Real-Time System & Sensor Network

Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack (Abstract)

Dong Seong Kim , Hankuk Aviation University, Seoul, Korea
Chung Su Yang , Hankuk Aviation University, Seoul, Korea
Jong Sou Park , Hankuk Aviation University, Seoul, Korea
pp. 575-579

Models for automatic generation of safety-critical real-time systems (Abstract)

Gerhard Schrott , Technische Universitat Munchen, Germany
Christian Buckl , Technische Universitat Munchen, Germany
Alois Knoll , Technische Universitat Munchen, Germany
Matthias Regensburger , Technische Universitat Munchen, Germany
pp. 580-587

A Near-Real-Time Behaviour Control Framework (Abstract)

Bastian Preindl , Vienna University of Technology
Alexander Schatten , Vienna University of Technology
pp. 588-598
Session 5: RFID Techniques & Applications

RFID Security Issues in Military Supply Chains (Abstract)

Cam Boulet , Defence Research and Development Canada Ottawa
Qinghan Xiao , Defence Research and Development Canada Ottawa
Thomas Gibbons , Operational Support Transformation - CANOSCOM
pp. 599-605

Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards (Abstract)

Geethapriya Venkataramani , Applied Research Group, Satyam Computers Services Limited
Srividya Gopalan , Applied Research Group, Satyam Computers Services Limited
pp. 610-620
Session 6: Secure Solution & Applications

A Modular Architecture for Secure and Reliable Distributed Communication (Abstract)

C.M. Jayalath , Apache Software Foundation
R.U. Fernando , Apache Software Foundation
pp. 621-628

Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials (Abstract)

Anthony Stell , University of Glasgow
Oluwafemi Ajayi , University of Glasgow
Richard Sinnott , University of Glasgow
Jipu Jiang , University of Glasgow
pp. 629-636

Securing Medical Sensor Environments: The CodeBlue Framework Case (Abstract)

Stefanos Gritzalis , University of the Aegean, Karlovassi, Greece
Georgios Kambourakis , University of the Aegean, Karlovassi, Greece
Eleni Klaoudatou , University of the Aegean, Karlovassi, Greece
pp. 637-643

A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses (Abstract)

Juan Trujillo , University of Alicante
Eduardo Fern?ndez-Medina , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
Emilio Soler , University of Matanzas, Cuba
pp. 644-654
Session 7: Security Issue in Business Management

Agent Alliances: A Means for Practical Threshold Signature (Abstract)

Christoph Amma , Universitat Karlsruhe (TH) IAKS Germany
Regine Endsuleit , Universitat Karlsruhe (TH) IAKS Germany
pp. 655-662

A research agenda for Autonomous Business Process Management (Abstract)

Gernot Goluch , Secure Business Austria
Thomas Neubauer , Secure Business Austria
Bernhard Riedl , Secure Business Austria
pp. 670-680
Session 8: Web, XML, Content Management

Secure Web Application Development and Global Regulation (Abstract)

L. Milton Glisson , N. C. A&T State University
Ray Welland , N. C. A&T State University
William Bradley Glisson , University of Glasgow
pp. 681-688

Query Assurance Verification for Dynamic Outsourced XML Databases (Abstract)

Viet Hung Nguyen , University of Technology, Vietnam
Tran Khanh Dang , University of Technology, Vietnam
Nguyen Thanh Son , University of Technology, Vietnam
Josef Kung , Johannes Kepler University of Linz, Austria
pp. 689-696

A Reflection-Based Framework for Content Validation (Abstract)

Lars-Helge Netland , University of Bergen
Yngve Espelid , University of Bergen
Khalid A. Mughal , University of Bergen
pp. 697-706
Session 9: Security Policies & Techniques

Web Engineering Security: Essential Elements (Abstract)

Ray Welland , University of Glasgow
William Bradley Glisson , University of Glasgow
pp. 707-714

Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology (Abstract)

Januszkiewicz Paulina , Academy of Business in D?browa G?rnicza, Poland
Pyka Marek , Academy of Business in D?browa G?rnicza, Poland
pp. 715-722

CSP-Based Firewall Rule Set Diagnosis using Security Policies (Abstract)

R. M. Gasca , University of Seville, Spain
S. Pozo , University of Seville, Spain
R. Ceballos , University of Seville, Spain
pp. 723-729

CASSIS - Computer-based Academy for Security and Safety in Information Systems (Abstract)

Gernot Goluch , Secure Business Austria
Bernhard Riedl , Secure Business Austria
Stefan Fenz , Secure Business Austria
Simon Tjoa , Secure Business Austria
Andreas Ekelhart , Secure Business Austria
Stefan Jakoubi , Secure Business Austria
pp. 730-740
Session 10: Trust Management & Trust Model

Trust in global computing systems as a limit property emerging from short range random interactions (Abstract)

P. Spirakis , University of Patras
E. Makri , University of the Aegean
Y.C. Stamatiou , University of Ioannina
V. Liagkou , University of Patras
pp. 741-748

A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam (Abstract)

Dmitri Botvich , Waterford Institute of Technology
Jimmy McGibney , Waterford Institute of Technology
pp. 749-756

A Semantic and Time Related Recommendation-Feedback Trust Model (Abstract)

Zhang Lin , Nanjing University, China
Lv Jian , Nanjing University, China
Wang Yuan , Nanjing University, China
Xu Feng , Nanjing University, China
pp. 765-774
Session 11: Miscellaneous Applications

AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification (Abstract)

Mohammad Zulkernine , Queen?s University, Kingston
Mohammad Raihan , Queen?s University, Kingston
pp. 775-782

Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments (Abstract)

Sheikh I Ahamed , Marquette University, Milwaukee, WI, USA
Niraj Swami , Marquette University, Milwaukee, WI, USA
pp. 783-790

A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS (Abstract)

Rafael P?ez , Technical University of Catalonia, Barcelona, Spain
Cristina Satiz?bal , Pamplona University, Pamplona, Colombia
Jordi Forne , Technical University of Catalonia, Barcelona, Spain
pp. 791-798

On the Assessment of the Interaction Quality of Users with Cerebral Palsy (Abstract)

T. Granollers , Lleida University, Spain
C. Mauri , Lleida University, Spain
A. Solanas , Universitat Rovira i Virgili, Spain
pp. 799-805

Research and Design of Mobile Impeachment System with Semi-cryptonym (Abstract)

Ming Qi , South China University of Technology, Guangzhou, 510640 China
Chaobo Yang , South China University of Technology, Guangzhou, 510640 China
pp. 806-811

Efficient Malicious Agreement in a Virtual Subnet Network (Abstract)

Kuo-Qin Yan , Chaoyang University of Technology, Taiwan
Guang-Yan Zheng , Chaoyang University of Technology, Taiwan
Shyi-Ching Liang , Chaoyang University of Technology, Taiwan
Shu-Ching Wang , Chaoyang University of Technology, Taiwan
pp. 812-820
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)

Extended RBAC - Based Design and Implementation for a Secure Data Warehouse (Abstract)

Bhavani Thuraisingham , The University of Texas at Dallas
Srinivasan Iyer , The University of Texas at Dallas
pp. 821-828

Application of QVT for the Development of Secure Data Warehouses: A case study (Abstract)

Juan Trujillo , University of Alicante, Spain
Emilio Soler , University of Matanzas, Cuba
Mario Piattini , University of Castilla-La Mancha, Spain
Eduardo Fern?ndez-Medina , University of Castilla-La Mancha, Spain
pp. 829-836

Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse (Abstract)

Marcin Gorawski , Silesian University of Technology
Jakub Bularz , Silesian University of Technology
pp. 837-844

Applying a Flexible Mining Architecture to Intrusion Detection (Abstract)

Flaviano Fiorino , ACG srl - An IBM Company
Angela Aprile , Politecnico di Bari
Marcello Castellano , Politecnico di Bari
Giuliano Bellone de Grecis , ACG srl - An IBM Company
Giuseppe Mastronardi , Politecnico di Bari
pp. 845-852

Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges (Abstract)

Lillian Rostad , Norwegian University of Science and Technology
Oystein Nytro , Norwegian University of Science and Technology
pp. 871-878

A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace (Abstract)

Dalia El-Mansy , Southern Methodist University, Texas, USA
Ahmed Sameh , American University in Cairo, Cairo, Egypt
pp. 878-885

Reliability Markov Chains for Security Data Transmitter Analysis (Abstract)

Bianca Satco , University, 9 University str., Suceava, 720225, Romania
Constantin Filote , University, 9 University str., Suceava, 720225, Romania
Calin Ciufudean , University, 9 University str., Suceava, 720225, Romania
pp. 886-894
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)

Requirements and Evaluation Procedures for eVoting (Abstract)

Melanie Volkamer , German Research Center for Artificial Intelligence
Margaret McGaley , NUI Maynooth
pp. 895-902

Towards Secure E-Elections in Turkey: Requirements and Principles (Abstract)

Orhan Cetinkaya , METU, Ankara, Turkey
Deniz Cetinkaya , METU, Ankara, Turkey
pp. 903-907

On Coercion-Resistant Electronic Elections with Linear Work (Abstract)

Stefan G. Weber , Darmstadt University of Technology
Roberto Araujo , Darmstadt University of Technology
Johannes Buchmann , Darmstadt University of Technology
pp. 908-916

eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope (Abstract)

Scott Cadzow , Cadzow Communications (C3L), 10 Yewlands
Judith E. Y. Rossebo , NTNU, Department of Telematics, Norway
Paul Sijben , EemValley Technology, Contrabaserf, Netherlands
pp. 925-933

Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies (Abstract)

M. Zubair , Old Dominion University
K. Maly , Old Dominion University
R. Mukkamala , Old Dominion University
K. Bhoopalam , Old Dominion University
pp. 934-940

Secure Distributed Dossier Management in the Legal Domain (Abstract)

Martin Apistola , VU University Amsterdam
Martijn Warnier , VU University Amsterdam
Anja Oskamp , VU University Amsterdam
Frances Brazier , VU University Amsterdam
pp. 941-947

Building a Dependable Messaging Infrastructure for Electronic Government (Abstract)

Elsa Estevez , Universidad Nacional del Sur, Argentina
Tomasz Janowski , United Nations University International Institute for Software Technology, Macao
pp. 948-958
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)

A Universal Construction for Concurrent Objects (Abstract)

Michel RAYNAL , IRISA, Campus de Beaulieu, 35042 Rennes Cedex, France
Rachid GUERRAOUI , EPFL, Lausanne, Switzerland
pp. 959-966

On the implementation of the Omega failure detector in the crash-recovery failure model (Abstract)

Cristian Martin , University of the Basque Country, Spain
Mikel Larrea , University of the Basque Country, Spain
Ernesto Jimenez , Universidad Polit?ecnica de Madrid, Spain
pp. 975-982

Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach (Abstract)

Azzedine Boukerche , University of Ottawa, Ottawa, Canada
Hisham Elkadiki , University of Ottawa, Ottawa, Canada
Mourad Elhadef , University of Ottawa, Ottawa, Canada
pp. 983-990

Self-Stabilization as a Foundation for Autonomic Computing (Abstract)

Olga Brukman , Ben-Gurion University, Israel
Shlomi Dolev , Ben-Gurion University, Israel
Yinnon Haviv , Ben-Gurion University, Israel
Reuven Yagel , Ben-Gurion University, Israel
pp. 991-998

On Programming Models for Service-Level High Availability (Abstract)

C. Leangsuksun , Louisiana Tech University, USA
C. Engelmann , University of Reading, UK
X. He , Tennessee Technological University, USA
S. L. Scott , Oak Ridge National Laboratory, USA
pp. 999-1008
First International Workshop on Secure Software Engineering (SecSE 2007)

Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process (Abstract)

Stefanos Gritzalis , University of the Aegean
Evangelia Kavakli , University of the Aegean
Christos Kalloniatis , University of the Aegean
pp. 1009-1017

How can the developer benefit from security modeling? (Abstract)

Per Hakon Meland , SINTEF ICT, Norway
Nahid Shahmehri , Linkopings universitet
Inger Anne Tondel , SINTEF ICT, Norway
David Byers , Linkopings universitet
Shanai Ardi , Linkopings universitet
pp. 1017-1025

AProSec: an Aspect for Programming Secure Web Applications (Abstract)

Laurence Duchien , LIFL - INRIA Jacquard Project, France
Gabriel Hermosillo , ITESM-CEM-Dpto. Ciencias Computacionales, Mexico
Roberto Gomez , ITESM-CEM-Dpto. Ciencias Computacionales, Mexico
Lionel Seinturier , LIFL - INRIA Jacquard Project, France
pp. 1026-1033

Empirical and statistical analysis of risk analysis-driven techniques for threat management (Abstract)

Bart De Win , DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
Koen Buyens , DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
Wouter Joosen , DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
pp. 1034-1041

Secure Software Development through Coding Conventions and Frameworks (Abstract)

Takao Okubo , Fujitsu Laboratories ltd., Institute of Information Security
Hidehiko Tanaka , Fujitsu Laboratories ltd., Institute of Information Security
pp. 1042-1051

Pastures: Towards Usable Security Policy Engineering (Abstract)

Doug McIlroy , Dartmouth College
Sean Smith , Dartmouth College
Alex Ferguson , Dartmouth College
Sergey Bratus , Dartmouth College
pp. 1052-1059

Security Objectives within a Security Testing Case Study (Abstract)

Reijo Savola , VTT Technical Research Centre of Finland, Oulu, Finland
Kaarina Karppinen , VTT Technical Research Centre of Finland, Oulu, Finland
Mikko Rapeli , VTT Technical Research Centre of Finland, Oulu, Finland
Esa Tikkala , VTT Technical Research Centre of Finland, Oulu, Finland
pp. 1060-1065

CppTest: A Prototype Tool for Testing C/C++ Programs (Abstract)

Yansheng Lu , College of Computer Scie. and Tech., Wuhan, Hubei 430074, China
Chengying Mao , Jiangxi Univ. of Finance & Economics Nanchang, Jiangxi 330013, China
pp. 1066-1073

A Novel Approach to Building Secure Systems (Abstract)

Dejan Simic , FON Belgrade
Dragan Vidakovic , Gimnazija Ivanjica
pp. 1074-1084
Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)

Exception Handling in an Event-Driven System (Abstract)

Jan Ploski , OFFIS Institute for Information Technology, Oldenburg, Germany
Wilhelm Hasselbring , University of Oldenburg, Germany
pp. 1085-1092

Issues in Testing Dependable Event-Based Systems at a Systems Integration Company (Abstract)

Armin Beer , Siemens Program and Systems Engineering, Vienna, Austria
Matthias Heindl , Siemens Program and Systems Engineering, Vienna, Austria
pp. 1093-1100

Optimizing Events Traffic in Event-based Systems by means of Evolutionary Algorithms (Abstract)

Jiri Kubalik , Technical University in Vienna
Richard Mordinyi , Vienna University of Technology
pp. 1101-1107

Event-Based Monitoring of Open Source Software Projects (Abstract)

Dindin Wahyudin , Vienna University of Technology
A Min Tjoa , Vienna University of Technology
pp. 1108-1115

Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management System (Abstract)

Marcus Mor , Vienna University of Technology
Richard Mordinyi , Vienna University of Technology
Johannes Riemer , Vienna University of Technology
pp. 1116-1123

Indexing and Search of Correlated Business Events (Abstract)

Roland Vecera , senactive.com
Szabolcs Rozsnyai , securityresearch.at
Heinz Roth , senactive.com
pp. 1124-1134
First International Workshop on Advances in Information Security (WAIS 2007)

An Approach for Adaptive Intrusion Prevention Based on The Danger (Abstract)

Alexander Krizhanovsky , Moscow Aviation Institute, Moscow, Russia
Alexander Marasanov , Moscow Aviation Institute, Moscow, Russia
pp. 1135-1142

A Human-Verifiable Authentication Protocol Using Visible Laser Light (Abstract)

Rene Mayrhofer , Lancaster University
Martyn Welch , Lancaster University
pp. 1143-1148

Insider-secure Hybrid Signcryption SchemeWithout Random Oracles (Abstract)

Chik How Tan , Gjovik University College, Norway
pp. 1148-1154

A Policy Language for the Extended Reference Monitor in Trusted Operating Systems (Abstract)

R.S. Ramakrishna , Gwangju Institute of Science and Technology, Korea
Wook Shin , University of Illinois at Urbana-Champaign
Hyung Chan Kim , Gwangju Institute of Science and Technology, Korea
Kouichi Sakurai , Kyushu University, Fukuoka 812-8581, Japan
pp. 1160-1166

Analysis on Bleichenbacher?s Forgery Attack (Abstract)

Tetsuya Izu , FUJITSU LABORATORIES Ltd.
Masahiko Takenaka , FUJITSU LABORATORIES Ltd.
Takeshi Shimoyama , FUJITSU LABORATORIES Ltd.
pp. 1167-1174

A New Method for Reducing the Revocation Delay in the Attribute Authentication (Abstract)

Hidekazu TSUJI , Tokai University
Yoshio KAKIZAKI , Tokai University Unified Graduate School
pp. 1175-1182

Efficient Multiparty Computation for Comparator Networks (Abstract)

Koji Chida , NTT Corporation
Hiroaki Kikuchi , Tokai University
Keiichi Hirota , NTT Corporation
Gembu Morohashi , NTT Corporation
pp. 1183-1189

Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols (Abstract)

Orhan Cetinkaya , METU, Ankara, Turkey
Ali Doganaksoy , METU, Ankara, Turkey
pp. 1190-1196

Attacks are Protocols Too (Abstract)

Anders Moen Hagalisletto , University of Oslo
pp. 1197-1206

Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms (Abstract)

Josep Pegueroles , Technical University of Catalonia
Miguel Soriano , Technical University of Catalonia
Luis Zarza , Universidad Tecnol?gica de la Mixteca
pp. 1207-1213

On the use of one-way chain based authentication protocols in secure control systems (Abstract)

Bogdan Groza , Politehnica University of Timisoara, Romania
Toma-Leonida Dragomir , Politehnica University of Timisoara, Romania
pp. 1214-1221

Bypassing Data Execution Prevention on MicrosoftWindows XP SP2 (Abstract)

Nenad Stojanovski , Macedonian Telecommunication
Danilo Gligoroski , Norwegian University of Science and Technology, Trondheim, Norway
Marjan Gusev , St. Cyril and Methodious University, Republic of Macedonia
Svein.J. Knapskog , Norwegian University of Science and Technology, Trondheim, Norway
pp. 1222-1226

A Security Framework in RFID Multi-domain System (Abstract)

Taek-Hyun Shin , Hankuk Aviation University, Seoul, Korea
Jong Sou Park , Hankuk Aviation University, Seoul, Korea
Dong Seong Kim , Hankuk Aviation University, Seoul, Korea
pp. 1227-1234
Workshop on "Security in E-Learning" (SEL)

Blended Learning Technology in Information Security Management Courses (Abstract)

Gerald Quirchmayr , Institute of Distributed and Multimedia Systems
pp. 1240-1244

Defining a Trusted Service-Oriented Network Environment (Abstract)

J.H.P. Eloff , University of Pretoria, South Africa
Emmanuel A. Adigun , University of Pretoria, South Africa
pp. 1245-1250

Designing a Cryptographic Scheme for e-Surveys in Higher-Education Institutions (Abstract)

Jordi Castella Roca , Rovira i Virgili University of Tarragona
Alan Ward , University of Andorra
Alex Dorca Josa , University of Andorra
pp. 1251-1255
Author Index

Author Index (PDF)

pp. 1256
97 ms
(Ver )