The Community for Technology Leaders
The Second International Conference on Availability, Reliability and Security (ARES'07) (2007)
Vienna, Austria
Apr. 10, 2007 to Apr. 13, 2007
ISBN: 0-7695-2775-2
TABLE OF CONTENTS
Introduction
Session 1: Trust Model & Trust Management

Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems (Abstract)

Oluwafemi Ajayi , University of Glasgow, UK
Richard Sinnott , University of Glasgow, UK
Anthony Stell , University of Glasgow, UK
pp. 3-10

From Trust to Dependability through Risk Analysis (Abstract)

Yudistira Asnar , University of Trento
Paolo Giorgini , University of Trento
Fabio Massacci , University of Trento
Nicola Zannone , University of Trento
pp. 19-26

Dynamic trust domains for secure, private, technology-assisted living (Abstract)

Jatinder Singh , University of Cambridge
Jean Bacon , University of Cambridge
Ken Moody , University of Cambridge
pp. 27-34

A Hybrid Trust Model for Enhancing Security in Distributed Systems (Abstract)

Ching Lin , Macquarie University, Sydney, Australia
Vijay Varadharajan , Macquarie University, Sydney, Australia
pp. 35-42

A Reliable Component-Based Architecture for E-Mail Filtering (Abstract)

Wilfried N. Gansterer , University of Vienna
Andreas G.K. Janecek , University of Vienna
Peter Lechner , University of Vienna
pp. 43-52
Session 2: Availability, Fault-Tolerant & Recovery

Availability and Performance of the Adaptive Voting Replication (Abstract)

Johannes Osrael , Vienna University of Technology
Lorenz Froihofer , Vienna University of Technology
Norbert Chlaupek , University of Applied Sciences fh-campus wien, Daumegasse 5, 1100 Vienna, Austria
Karl M. Goeschka , Vienna University of Technology
pp. 53-60

Distributed Stream Processing Analysis in High Availability Context (Abstract)

Marcin Gorawski , Silesian University of Technology, Poland
Pawel Marks , Silesian University of Technology, Poland
pp. 61-68

Implementing Network Partition-Aware Fault-Tolerant CORBA Systems (Abstract)

Stefan Beyer , Universidad Politecnica de Valencia
Francesc D. Munoz-Esco , Universidad Politecnica de Valencia
Pablo Galdamez , Universidad Politecnica de Valencia
pp. 69-76

Failure Recovery in Cooperative Data Stream Analysis (Abstract)

Bin Rong , RMIT University, Melbourne, Australia
Fred Douglis , IBM T. J. Watson Research Center Hawthorne, NY, USA
Cathy H. Xia , IBM T. J. Watson Research Center Hawthorne, NY, USA
Zhen Liu , IBM T.J. Watson Research Center, USA
pp. 77-84

A Recovery Protocol for Middleware Replicated Databases Providing GSI (Abstract)

J.E. Armendariz , Instituto Tecnologico de Informatica, Valencia, Spain
F.D. Munoz-Esco , Instituto Tecnologico de Informatica, Valencia, Spain
J.R. Juarez , Universidad Publica de Navarra, Spain
J.R. G. de Mendivil , Universidad Publica de Navarra, Spain
B. Kemme , McGill University, Canada
pp. 85-92

Revisiting Hot Passive Replication (Abstract)

Ruben de Juan-Marin , Universidad Politecnica de Valencia
Hendrik Decker , Universidad Politecnica de Valencia
Francesc D. Munoz-Esco , Universidad Politecnica de Valencia
pp. 93-102
Session 3: Reputation Management & Trust

Reputation Management Survey (Abstract)

Sini Ruohomaa , University of Helsinki
Lea Kutvonen , University of Helsinki
Eleni Koutrouli , National University of Athens
pp. 103-111

Dirichlet Reputation Systems (Abstract)

Audun Josang , Queensland University of Technology
Jochen Haller , SAP Research Germany
pp. 112-119

Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing (Abstract)

Sebastian Gajek , Ruhr-University Bochum, Germany
Ahmad-Reza Sadeghi , Ruhr-University Bochum, Germany
Christian Stuble , Ruhr-University Bochum, Germany
Marcel Winandy , Ruhr-University Bochum, Germany
pp. 120-127

Secure Anonymous Union Computation Among Malicious Partners (Abstract)

Stefan Bottcher , University of Paderborn, Germany
Sebastian Obermeier , University of Paderborn, Germany
pp. 128-138
Session 4: Privacy & Access Control

A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications (Abstract)

Oliver Jorns , Telecommunications Research, Vienna, Austria
Oliver Jung , Telecommunications Research, Vienna, Austria
Gerald Quirchmayr , University of Vienna
pp. 139-146

Privacy in Pervasive Computing and Open Issues (Abstract)

Pankaj Bhaskar , Marquette University, Milwaukee, WI, USA
Sheikh I Ahamed , Marquette University, Milwaukee, WI, USA
pp. 147-154

Context-Dependent Access Control for Contextual Information (Abstract)

Christin Groba , Technische Universitat Dresden, Germany
Stephan Grob , Technische Universitat Dresden, Germany
Thomas Springer , Technische Universitat Dresden, Germany
pp. 155-161

Bytecode Verification for Enhanced JVM Access Control (Abstract)

Dongxi Liu , University of Tokyo
pp. 162-172
Session 5: Failure Detection & Attack Prevention

Automatic Failure Detection with Separation of Concerns (Abstract)

P. Hazy , University of Waterloo, Canada
R. E. Seviora , University of Waterloo, Canada
pp. 173-181

A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor Networks (Abstract)

Mourad Elhadef , University of Ottawa, Ottawa, Canada
Azzedine Boukerche , University of Ottawa, Ottawa, Canada
pp. 182-189

Intrusion detection system for signal based SIP attacks through timed HCPN (Abstract)

Yanlan Ding , Graduate University of Chinese Academy of Sciences, Beijing
Guiping Su , Graduate University of Chinese Academy of Sciences, Beijing
pp. 190-197

3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model (Abstract)

Muhammad Sher , Technical University Berlin/Fokus Fraunhofer Telecommunication Institute, Germany
Thomas Magedanz , Technical University Berlin/Fokus Fraunhofer Telecommunication Institute, Germany
pp. 198-205

Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic (Abstract)

Meriam Ben Ghorbel , Digital Security Unit, Higher School of Communication,Tunis, Tunisia
Mehdi Talbi , Digital Security Unit, Higher School of Communication,Tunis, Tunisia
Mohamed Mejri , Laval University,Quebec, Canada
pp. 206-212

Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network (Abstract)

Frank Yeong-Sung Lin , National Taiwan University
Po-Hao Tsang , National Taiwan University
Yi-Luen Lin , National Taiwan University
pp. 213-222
Session 6: Authentication & Authorisation

Effects of Architectural Decisions in Authentication and Authorisation Infrastructures (Abstract)

Christian Schlager , University of Regensburg, Germany
Monika Ganslmayer , R&L Inc., Landshut, Germany
pp. 230-237

Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol (Abstract)

Tieyan Li , Institute for Infocomm Research, Singapore
Robert Deng , Singapore Management University
pp. 238-245

Authentication Mechanisms for Mobile Agents (Abstract)

Leila Ismail , United Arab Emirates University
pp. 246-253

Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning (Abstract)

Yuri Demchenko , University of Amsterdam
Leon Gommans , University of Amsterdam
Cees de Laat , University of Amsterdam
pp. 254-262

Implicit Authorization for Accessing Location Data in a Social Context (Abstract)

Georg Treu , Mobile and Distributed Systems Group, Institute for Informatics
Florian Fuchs , Mobile and Distributed Systems Group, Institute for Informatics
Christiane Dargatz , Ludwig-Maximilian University Munich, Germany
pp. 263-272
Session 7: Security Algorithm & Framework

A Reconfigurable Implementation of the New Secure Hash Algorithm (Abstract)

M. Zeghida , LESTER-University of South Brittany, Lorient, France
B. Bouallegue , Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
A. Baganne , LESTER-University of South Brittany, Lorient, France
M. Machhout , Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
R. Tourki , Electronics and Micro-Electronic Laboratory (LEME), Monastir, Tunisia
pp. 281-285

Applications for Provably Secure Intent Protection with Bounded Input-Size Programs (Abstract)

J. Todd McDonald , Air Force Institute of Technology, Wright Patterson AFB, OH
Alec Yasinsac , Florida State University
pp. 286-293

Static evaluation of Certificate Policies for GRID PKIs interoperability (Abstract)

N. Mazzocca , Dipt. di Informatica e Sistemistica, Naples Univ.
V. Casola , Dipt. di Informatica e Sistemistica, Naples Univ.
N. Mazzocca , Dipt. di Informatica e Sistemistica, Naples Univ.
V. Casola , Dipt. di Informatica e Sistemistica, Naples Univ.
pp. 391-399
Session 8: Software Security

Design of a Process for Software Security (Abstract)

David Byers , Linkopings universitet, SE-58183 Linkoping, Sweden
Nahid Shahmehri , Linkopings universitet, SE-58183 Linkoping, Sweden
pp. 301-309

STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks (Abstract)

Christoph Kraub , University of Technology, Darmstadt, Germany
Markus Schneider , Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany
Kpatcha Bayarou , Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany
Claudia Eckert , Darmstadt University of Technology, Darmstadt, Germany
pp. 310-317

An Efficient eAuction Protocol (Abstract)

Brian Curtis , Australian Catholic University
Josef Pieprzyk , Macquarie University
Jan Seruga , Australian Catholic University
pp. 417-421
Session 8: Software Security

Collection of Quantitative Data on Security Incidents (Abstract)

Thomas Nowey , University of Regensburg Germany
Hannes Federrath , University of Regensburg Germany
pp. 325-334
Session 9: Security Models

Security vulnerabilities in DNS and DNSSEC (Abstract)

Suranjith Ariyapperuma , University of London
Chris J. Mitchell , University of London
pp. 335-342

Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems (Abstract)

Lorenz Froihofer , Vienna University of Technology
Johannes Osrael , Vienna University of Technology
Karl M. Goeschka , Vienna University of Technology
pp. 443-450

Dependability Aspects of Ubiquitous Computing (Abstract)

Lu Yan , University College London
Kaisa Sere , Abo Akademi University, Finland
pp. 451-453
Session 9: Security Models

A Pattern System for Security Requirements Engineering (Abstract)

Denis Hatebur , University Duisburg-Essen, Germany
Maritta Heisel , University Duisburg-Essen, Germany
Holger Schmidt , University Duisburg-Essen, Germany
pp. 356-365

Security Requirements for a Semantic Service-oriented Architecture (Abstract)

Stefan Durbeck , University of Regensburg
Rolf Schillinger , University of Regensburg
Jan Kolter , University of Regensburg
pp. 366-373

Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management (Abstract)

Ludwig Fuchs , University of Regensburg, Germany
Gunther Pernul , University of Regensburg, Germany
pp. 374-384
Session 10: Miscellaneous Security Techniques

A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking (Abstract)

Vidar Evenrud Seeberg , Norsvin, Hamar, Norway
Slobodan Petrovic , Gjovik University College, P.O. box 191, N-2802 Gjovik, Norway
pp. 385-390

Static evaluation of Certificate Policies for GRID PKIs interoperability (Abstract)

Valentina Casola , University of Naples, Federico II, Italy
Nicola Mazzocca , University of Naples, Federico II, Italy
Jesus Luna , Universitat Polit?cnica de Catalunya, Spain
Oscar Manso , Universitat Polit?cnica de Catalunya, Spain
Manel Medina , Universitat Polit?cnica de Catalunya, Spain
pp. 391-399

RWAR: A Resilient Window-consistent Asynchronous Replication Protocol (Abstract)

Yanlong Wang , Northwestern Polytechnical University
Zhanhuai Li , Northwestern Polytechnical University
Wei Lin , Northwestern Polytechnical University
pp. 499-505
Session 10: Miscellaneous Security Techniques

Universally Composable Three-Party Key Distribution (Abstract)

TingMao Chang , Information Engineering University,Henan, China
YueFei Zhu , Information Engineering University,Henan, China
Jin Zhou , Information Engineering University,Henan, China
YaJuan Zhang , Guangzhou University, China
pp. 408-416
Session 11: eAuction & eVoting Protocol

An Efficient eAuction Protocol (Abstract)

Brian Curtis , Australian Catholic University
Josef Pieprzyk , Macquarie University
Jan Seruga , Australian Catholic University
pp. 417-421

Access Control Model for Web Services with Attribute Disclosure Restriction (Abstract)

Vipin Singh Mewar , Indian Institute of Technology, Kharagpur, India
Subhendu Aich , Indian Institute of Technology, Kharagpur, India
Shamik Sural , Indian Institute of Technology, Kharagpur, India
pp. 524-531
Session 11: eAuction & eVoting Protocol

A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network (Abstract)

Orhan Cetinkaya , Institute of Applied Mathematics,METU, Ankara, Turkey
Ali Doganaksoy , METU, Ankara, Turkey
pp. 432-442
Session 12: Dependability in Distributed & Ubiquitous Computing

Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems (Abstract)

Lorenz Froihofer , Vienna University of Technology
Johannes Osrael , Vienna University of Technology
Karl M. Goeschka , Vienna University of Technology
pp. 443-450

Dependability Aspects of Ubiquitous Computing (Abstract)

Lu Yan , University College London
Kaisa Sere , Abo Akademi University, Finland
pp. 451-453

Concurrency Control using Subject- and Purpose-Oriented (SPO) View (Abstract)

Tomoya Enokido , Rissho University
Makoto Takizawa , Tokyo Denki University
pp. 454-464
Session 13: Anomaly & Intrusion Detection

Comparing Classifier Combining Techniques for Mobile-Masquerader Detection (Abstract)

Oleksiy Mazhelis , University of Jyvaskyla, Finland
Seppo Puuronen , University of Jyvaskyla, Finland
pp. 465-472

Process Profiling Using Frequencies of System Calls (Abstract)

Surekha Mariam Varghese , M.A. College of Engineering Kothamangalam, India
K.Poulose Jacob , Cochin University of Science and Technology, Kochi, India
pp. 473-479

Terrorist Networks Analysis through Argument Driven Hypotheses Model (Abstract)

D. M. Akbar Hussain , Aalborg University Esbjerg, Denmark
pp. 480-492
Session 1: Fault-Tolerant & Availability

High Availability for Network Management Applications (Abstract)

S. Prabhu , Cisco Systems, Inc.
R. Venkat , Cisco Systems, Inc.
pp. 493-498

RWAR: A Resilient Window-consistent Asynchronous Replication Protocol (Abstract)

Yanlong Wang , Northwestern Polytechnical University
Zhanhuai Li , Northwestern Polytechnical University
Wei Lin , Northwestern Polytechnical University
pp. 499-505

Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model (Abstract)

Keiji Ozaki , Tokyo Denki University, Japan
Naohiro Hayashibara , Tokyo Denki University, Japan
Tomoya Enokido , Rissho University, Japan
Makoto Takizawa , Tokyo Denki University, Japan
pp. 506-516
Session 2: Access Control

Access Control Model for Web Services with Attribute Disclosure Restriction (Abstract)

Vipin Singh Mewar , Indian Institute of Technology, Kharagpur, India
Subhendu Aich , Indian Institute of Technology, Kharagpur, India
Shamik Sural , Indian Institute of Technology, Kharagpur, India
pp. 524-531

Aggregating and Deploying Network Access Control Policies (Abstract)

Joaquin G. Alfaro , Universitat Oberta de Catalunya
Frederic Cuppens , GET/ENST-Bretagne, France
Nora Cuppens-Boulahia , GET/ENST-Bretagne, France
pp. 532-542

Securing Medical Sensor Environments: The CodeBlue Framework Case (Abstract)

Georgios Kambourakis , University of the Aegean, Karlovassi, Greece
Eleni Klaoudatou , University of the Aegean, Karlovassi, Greece
Stefanos Gritzalis , University of the Aegean, Karlovassi, Greece
pp. 637-643

A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses (Abstract)

Emilio Soler , University of Matanzas, Cuba
Juan Trujillo , University of Alicante
Eduardo Fernandez-Medina , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
pp. 644-654
Session 3: Authentication

A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications (Abstract)

HE Yijun , Central South University
XU Nan , City University of Hong Kong, Kowloon
LI Jie , City University of Hong Kong, Kowloon
pp. 558-563

Improved Client-to-Client Password-Authenticated Key Exchange Protocol (Abstract)

Yao Gang , Graduate University of Chinese Academy of Sciences
Feng Dengguo , Graduate University of Chinese Academy of Sciences
Han Xiaoxi , Graduate University of Chinese Academy of Sciences
pp. 564-574

A research agenda for Autonomous Business Process Management (Abstract)

Thomas Neubauer , Secure Business Austria
Gernot Goluch , Secure Business Austria
Bernhard Riedl , Secure Business Austria
pp. 670-680

Secure Web Application Development and Global Regulation (Abstract)

William Bradley Glisson , University of Glasgow
L. Milton Glisson , N. C. A&T State University
Ray Welland , N. C. A&T State University
pp. 681-688
Session 4: Real-Time System & Sensor Network

A Near-Real-Time Behaviour Control Framework (Abstract)

Bastian Preindl , Vienna University of Technology
Alexander Schatten , Vienna University of Technology
pp. 588-598
Session 5: RFID Techniques & Applications

RFID Security Issues in Military Supply Chains (Abstract)

Qinghan Xiao , Defence Research and Development Canada Ottawa
Cam Boulet , Defence Research and Development Canada Ottawa
Thomas Gibbons , Operational Support Transformation - CANOSCOM
pp. 599-605

Web Engineering Security: Essential Elements (Abstract)

William Bradley Glisson , University of Glasgow
Ray Welland , University of Glasgow
pp. 707-714
Session 5: RFID Techniques & Applications

Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards (Abstract)

Geethapriya Venkataramani , Applied Research Group, Satyam Computers Services Limited
Srividya Gopalan , Applied Research Group, Satyam Computers Services Limited
pp. 610-620
Session 6: Secure Solution & Applications

A Modular Architecture for Secure and Reliable Distributed Communication (Abstract)

C.M. Jayalath , Apache Software Foundation
R.U. Fernando , Apache Software Foundation
pp. 621-628

Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials (Abstract)

Anthony Stell , University of Glasgow
Richard Sinnott , University of Glasgow
Oluwafemi Ajayi , University of Glasgow
Jipu Jiang , University of Glasgow
pp. 629-636

Trust in global computing systems as a limit property emerging from short range random interactions (Abstract)

V. Liagkou , University of Patras
E. Makri , University of the Aegean
P. Spirakis , University of Patras
Y.C. Stamatiou , University of Ioannina
pp. 741-748
Session 6: Secure Solution & Applications

A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses (Abstract)

Emilio Soler , University of Matanzas, Cuba
Juan Trujillo , University of Alicante
Eduardo Fern?ndez-Medina , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
pp. 644-654
Session 7: Security Issue in Business Management

Agent Alliances: A Means for Practical Threshold Signature (Abstract)

Regine Endsuleit , Universitat Karlsruhe (TH) IAKS Germany
Christoph Amma , Universitat Karlsruhe (TH) IAKS Germany
pp. 655-662

A Semantic and Time Related Recommendation-Feedback Trust Model (Abstract)

Zhang Lin , Nanjing University, China
Xu Feng , Nanjing University, China
Wang Yuan , Nanjing University, China
Lv Jian , Nanjing University, China
pp. 765-774
Session 7: Security Issue in Business Management

A research agenda for Autonomous Business Process Management (Abstract)

Thomas Neubauer , Secure Business Austria
Gernot Goluch , Secure Business Austria
Bernhard Riedl , Secure Business Austria
pp. 670-680

Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments (Abstract)

Niraj Swami , Marquette University, Milwaukee, WI, USA
Sheikh I Ahamed , Marquette University, Milwaukee, WI, USA
pp. 783-790

A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS (Abstract)

Rafael Paez , Technical University of Catalonia, Barcelona, Spain
Cristina Satizabal , Pamplona University, Pamplona, Colombia
Jordi Forne , Technical University of Catalonia, Barcelona, Spain
pp. 791-798
Session 8: Web, XML, Content Management

A Reflection-Based Framework for Content Validation (Abstract)

Lars-Helge Netland , University of Bergen
Yngve Espelid , University of Bergen
Khalid A. Mughal , University of Bergen
pp. 697-706

Research and Design of Mobile Impeachment System with Semi-cryptonym (Abstract)

Chaobo Yang , South China University of Technology, Guangzhou, 510640 China
Ming Qi , South China University of Technology, Guangzhou, 510640 China
pp. 806-811
Session 9: Security Policies & Techniques

Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology (Abstract)

Januszkiewicz Paulina , Academy of Business in D?browa G?rnicza, Poland
Pyka Marek , Academy of Business in D?browa G?rnicza, Poland
pp. 715-722

CSP-Based Firewall Rule Set Diagnosis using Security Policies (Abstract)

S. Pozo , University of Seville, Spain
R. Ceballos , University of Seville, Spain
R. M. Gasca , University of Seville, Spain
pp. 723-729

CASSIS - Computer-based Academy for Security and Safety in Information Systems (Abstract)

Gernot Goluch , Secure Business Austria
Andreas Ekelhart , Secure Business Austria
Stefan Fenz , Secure Business Austria
Stefan Jakoubi , Secure Business Austria
Bernhard Riedl , Secure Business Austria
Simon Tjoa , Secure Business Austria
pp. 730-740
Session 10: Trust Management & Trust Model

Trust in global computing systems as a limit property emerging from short range random interactions (Abstract)

V. Liagkou , University of Patras
E. Makri , University of the Aegean
P. Spirakis , University of Patras
Y.C. Stamatiou , University of Ioannina
pp. 741-748

A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam (Abstract)

Jimmy McGibney , Waterford Institute of Technology
Dmitri Botvich , Waterford Institute of Technology
pp. 749-756
Session 11: Miscellaneous Applications

AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification (Abstract)

Mohammad Raihan , Queen?s University, Kingston
Mohammad Zulkernine , Queen?s University, Kingston
pp. 775-782

Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments (Abstract)

Niraj Swami , Marquette University, Milwaukee, WI, USA
Sheikh I Ahamed , Marquette University, Milwaukee, WI, USA
pp. 783-790

A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS (Abstract)

Rafael P?ez , Technical University of Catalonia, Barcelona, Spain
Cristina Satiz?bal , Pamplona University, Pamplona, Colombia
Jordi Forne , Technical University of Catalonia, Barcelona, Spain
pp. 791-798

On the Assessment of the Interaction Quality of Users with Cerebral Palsy (Abstract)

C. Mauri , Lleida University, Spain
T. Granollers , Lleida University, Spain
A. Solanas , Universitat Rovira i Virgili, Spain
pp. 799-805

Research and Design of Mobile Impeachment System with Semi-cryptonym (Abstract)

Chaobo Yang , South China University of Technology, Guangzhou, 510640 China
Ming Qi , South China University of Technology, Guangzhou, 510640 China
pp. 806-811

Efficient Malicious Agreement in a Virtual Subnet Network (Abstract)

Shu-Ching Wang , Chaoyang University of Technology, Taiwan
Shyi-Ching Liang , Chaoyang University of Technology, Taiwan
Kuo-Qin Yan , Chaoyang University of Technology, Taiwan
Guang-Yan Zheng , Chaoyang University of Technology, Taiwan
pp. 812-820
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)

Extended RBAC - Based Design and Implementation for a Secure Data Warehouse (Abstract)

Bhavani Thuraisingham , The University of Texas at Dallas
Srinivasan Iyer , The University of Texas at Dallas
pp. 821-828

Application of QVT for the Development of Secure Data Warehouses: A case study (Abstract)

Emilio Soler , University of Matanzas, Cuba
Juan Trujillo , University of Alicante, Spain
Eduardo Fern?ndez-Medina , University of Castilla-La Mancha, Spain
Mario Piattini , University of Castilla-La Mancha, Spain
pp. 829-836

Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse (Abstract)

Marcin Gorawski , Silesian University of Technology
Jakub Bularz , Silesian University of Technology
pp. 837-844

Applying a Flexible Mining Architecture to Intrusion Detection (Abstract)

Marcello Castellano , Politecnico di Bari
Giuseppe Mastronardi , Politecnico di Bari
Angela Aprile , Politecnico di Bari
Giuliano Bellone de Grecis , ACG srl - An IBM Company
Flaviano Fiorino , ACG srl - An IBM Company
pp. 845-852
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)

A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace (Abstract)

Dalia El-Mansy , Southern Methodist University, Texas, USA
Ahmed Sameh , American University in Cairo, Cairo, Egypt
pp. 878-885

Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach (Abstract)

Mourad Elhadef , University of Ottawa, Ottawa, Canada
Azzedine Boukerche , University of Ottawa, Ottawa, Canada
Hisham Elkadiki , University of Ottawa, Ottawa, Canada
pp. 983-990
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)

Requirements and Evaluation Procedures for eVoting (Abstract)

Melanie Volkamer , German Research Center for Artificial Intelligence
Margaret McGaley , NUI Maynooth
pp. 895-902

Towards Secure E-Elections in Turkey: Requirements and Principles (Abstract)

Orhan Cetinkaya , METU, Ankara, Turkey
Deniz Cetinkaya , METU, Ankara, Turkey
pp. 903-907

Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process (Abstract)

Christos Kalloniatis , University of the Aegean
Evangelia Kavakli , University of the Aegean
Stefanos Gritzalis , University of the Aegean
pp. 1009-1017
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)

eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope (Abstract)

Judith E. Y. Rossebo , NTNU, Department of Telematics, Norway
Scott Cadzow , Cadzow Communications (C3L), 10 Yewlands
Paul Sijben , EemValley Technology, Contrabaserf, Netherlands
pp. 925-933

Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies (Abstract)

K. Bhoopalam , Old Dominion University
K. Maly , Old Dominion University
R. Mukkamala , Old Dominion University
M. Zubair , Old Dominion University
pp. 934-940

Secure Distributed Dossier Management in the Legal Domain (Abstract)

Martijn Warnier , VU University Amsterdam
Frances Brazier , VU University Amsterdam
Martin Apistola , VU University Amsterdam
Anja Oskamp , VU University Amsterdam
pp. 941-947

Pastures: Towards Usable Security Policy Engineering (Abstract)

Sergey Bratus , Dartmouth College
Alex Ferguson , Dartmouth College
Doug McIlroy , Dartmouth College
Sean Smith , Dartmouth College
pp. 1052-1059
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)

A Universal Construction for Concurrent Objects (Abstract)

Rachid GUERRAOUI , EPFL, Lausanne, Switzerland
Michel RAYNAL , IRISA, Campus de Beaulieu, 35042 Rennes Cedex, France
pp. 959-966

CppTest: A Prototype Tool for Testing C/C++ Programs (Abstract)

Chengying Mao , Jiangxi Univ. of Finance & Economics Nanchang, Jiangxi 330013, China
Yansheng Lu , College of Computer Scie. and Tech., Wuhan, Hubei 430074, China
pp. 1066-1073
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)

On the implementation of the Omega failure detector in the crash-recovery failure model (Abstract)

Cristian Martin , University of the Basque Country, Spain
Mikel Larrea , University of the Basque Country, Spain
Ernesto Jimenez , Universidad Polit?ecnica de Madrid, Spain
pp. 975-982

Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach (Abstract)

Mourad Elhadef , University of Ottawa, Ottawa, Canada
Azzedine Boukerche , University of Ottawa, Ottawa, Canada
Hisham Elkadiki , University of Ottawa, Ottawa, Canada
pp. 983-990

Self-Stabilization as a Foundation for Autonomic Computing (Abstract)

Olga Brukman , Ben-Gurion University, Israel
Shlomi Dolev , Ben-Gurion University, Israel
Yinnon Haviv , Ben-Gurion University, Israel
Reuven Yagel , Ben-Gurion University, Israel
pp. 991-998

On Programming Models for Service-Level High Availability (Abstract)

C. Engelmann , University of Reading, UK
S. L. Scott , Oak Ridge National Laboratory, USA
C. Leangsuksun , Louisiana Tech University, USA
X. He , Tennessee Technological University, USA
pp. 999-1008
First International Workshop on Secure Software Engineering (SecSE 2007)

Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process (Abstract)

Christos Kalloniatis , University of the Aegean
Evangelia Kavakli , University of the Aegean
Stefanos Gritzalis , University of the Aegean
pp. 1009-1017

How can the developer benefit from security modeling? (Abstract)

Shanai Ardi , Linkopings universitet
David Byers , Linkopings universitet
Per Hakon Meland , SINTEF ICT, Norway
Inger Anne Tondel , SINTEF ICT, Norway
Nahid Shahmehri , Linkopings universitet
pp. 1017-1025

AProSec: an Aspect for Programming Secure Web Applications (Abstract)

Gabriel Hermosillo , ITESM-CEM-Dpto. Ciencias Computacionales, Mexico
Roberto Gomez , ITESM-CEM-Dpto. Ciencias Computacionales, Mexico
Lionel Seinturier , LIFL - INRIA Jacquard Project, France
Laurence Duchien , LIFL - INRIA Jacquard Project, France
pp. 1026-1033

Empirical and statistical analysis of risk analysis-driven techniques for threat management (Abstract)

Koen Buyens , DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
Bart De Win , DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
Wouter Joosen , DistriNet research group, Department of Computer Science, K.U.Leuven, Belgium
pp. 1034-1041

Secure Software Development through Coding Conventions and Frameworks (Abstract)

Takao Okubo , Fujitsu Laboratories ltd., Institute of Information Security
Hidehiko Tanaka , Fujitsu Laboratories ltd., Institute of Information Security
pp. 1042-1051

Insider-secure Hybrid Signcryption SchemeWithout Random Oracles (Abstract)

Chik How Tan , Gjovik University College, Norway
pp. 1148-1154
First International Workshop on Secure Software Engineering (SecSE 2007)

Security Objectives within a Security Testing Case Study (Abstract)

Kaarina Karppinen , VTT Technical Research Centre of Finland, Oulu, Finland
Reijo Savola , VTT Technical Research Centre of Finland, Oulu, Finland
Mikko Rapeli , VTT Technical Research Centre of Finland, Oulu, Finland
Esa Tikkala , VTT Technical Research Centre of Finland, Oulu, Finland
pp. 1060-1065

CppTest: A Prototype Tool for Testing C/C++ Programs (Abstract)

Chengying Mao , Jiangxi Univ. of Finance & Economics Nanchang, Jiangxi 330013, China
Yansheng Lu , College of Computer Scie. and Tech., Wuhan, Hubei 430074, China
pp. 1066-1073

A Novel Approach to Building Secure Systems (Abstract)

Dragan Vidakovic , Gimnazija Ivanjica
Dejan Simic , FON Belgrade
pp. 1074-1084
Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)

Exception Handling in an Event-Driven System (Abstract)

Jan Ploski , OFFIS Institute for Information Technology, Oldenburg, Germany
Wilhelm Hasselbring , University of Oldenburg, Germany
pp. 1085-1092

Issues in Testing Dependable Event-Based Systems at a Systems Integration Company (Abstract)

Armin Beer , Siemens Program and Systems Engineering, Vienna, Austria
Matthias Heindl , Siemens Program and Systems Engineering, Vienna, Austria
pp. 1093-1100

Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols (Abstract)

Orhan Cetinkaya , METU, Ankara, Turkey
Ali Doganaksoy , METU, Ankara, Turkey
pp. 1190-1196
Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)

Event-Based Monitoring of Open Source Software Projects (Abstract)

Dindin Wahyudin , Vienna University of Technology
A Min Tjoa , Vienna University of Technology
pp. 1108-1115

Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management System (Abstract)

Marcus Mor , Vienna University of Technology
Richard Mordinyi , Vienna University of Technology
Johannes Riemer , Vienna University of Technology
pp. 1116-1123

Indexing and Search of Correlated Business Events (Abstract)

Roland Vecera , senactive.com
Szabolcs Rozsnyai , securityresearch.at
Heinz Roth , senactive.com
pp. 1124-1134
First International Workshop on Advances in Information Security (WAIS 2007)

An Approach for Adaptive Intrusion Prevention Based on The Danger (Abstract)

Alexander Krizhanovsky , Moscow Aviation Institute, Moscow, Russia
Alexander Marasanov , Moscow Aviation Institute, Moscow, Russia
pp. 1135-1142

A Security Framework in RFID Multi-domain System (Abstract)

Dong Seong Kim , Hankuk Aviation University, Seoul, Korea
Taek-Hyun Shin , Hankuk Aviation University, Seoul, Korea
Jong Sou Park , Hankuk Aviation University, Seoul, Korea
pp. 1227-1234
First International Workshop on Advances in Information Security (WAIS 2007)

Insider-secure Hybrid Signcryption SchemeWithout Random Oracles (Abstract)

Chik How Tan , Gjovik University College, Norway
pp. 1148-1154

Blended Learning Technology in Information Security Management Courses (Abstract)

Gerald Quirchmayr , Institute of Distributed and Multimedia Systems
pp. 1240-1244
First International Workshop on Advances in Information Security (WAIS 2007)

A Policy Language for the Extended Reference Monitor in Trusted Operating Systems (Abstract)

Hyung Chan Kim , Gwangju Institute of Science and Technology, Korea
R.S. Ramakrishna , Gwangju Institute of Science and Technology, Korea
Wook Shin , University of Illinois at Urbana-Champaign
Kouichi Sakurai , Kyushu University, Fukuoka 812-8581, Japan
pp. 1160-1166

Analysis on Bleichenbacher?s Forgery Attack (Abstract)

Tetsuya Izu , FUJITSU LABORATORIES Ltd.
Masahiko Takenaka , FUJITSU LABORATORIES Ltd.
Takeshi Shimoyama , FUJITSU LABORATORIES Ltd.
pp. 1167-1174

A New Method for Reducing the Revocation Delay in the Attribute Authentication (Abstract)

Yoshio KAKIZAKI , Tokai University Unified Graduate School
Hidekazu TSUJI , Tokai University
pp. 1175-1182

Efficient Multiparty Computation for Comparator Networks (Abstract)

Koji Chida , NTT Corporation
Hiroaki Kikuchi , Tokai University
Gembu Morohashi , NTT Corporation
Keiichi Hirota , NTT Corporation
pp. 1183-1189

Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols (Abstract)

Orhan Cetinkaya , METU, Ankara, Turkey
Ali Doganaksoy , METU, Ankara, Turkey
pp. 1190-1196

Attacks are Protocols Too (Abstract)

Anders Moen Hagalisletto , University of Oslo
pp. 1197-1206

Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms (Abstract)

Luis Zarza , Universidad Tecnol?gica de la Mixteca
Josep Pegueroles , Technical University of Catalonia
Miguel Soriano , Technical University of Catalonia
pp. 1207-1213

On the use of one-way chain based authentication protocols in secure control systems (Abstract)

Bogdan Groza , Politehnica University of Timisoara, Romania
Toma-Leonida Dragomir , Politehnica University of Timisoara, Romania
pp. 1214-1221

Bypassing Data Execution Prevention on MicrosoftWindows XP SP2 (Abstract)

Nenad Stojanovski , Macedonian Telecommunication
Marjan Gusev , St. Cyril and Methodious University, Republic of Macedonia
Danilo Gligoroski , Norwegian University of Science and Technology, Trondheim, Norway
Svein.J. Knapskog , Norwegian University of Science and Technology, Trondheim, Norway
pp. 1222-1226

A Security Framework in RFID Multi-domain System (Abstract)

Dong Seong Kim , Hankuk Aviation University, Seoul, Korea
Taek-Hyun Shin , Hankuk Aviation University, Seoul, Korea
Jong Sou Park , Hankuk Aviation University, Seoul, Korea
pp. 1227-1234
Workshop on "Security in E-Learning" (SEL)

Blended Learning Technology in Information Security Management Courses (Abstract)

Gerald Quirchmayr , Institute of Distributed and Multimedia Systems
pp. 1240-1244

Defining a Trusted Service-Oriented Network Environment (Abstract)

Emmanuel A. Adigun , University of Pretoria, South Africa
J.H.P. Eloff , University of Pretoria, South Africa
pp. 1245-1250

Designing a Cryptographic Scheme for e-Surveys in Higher-Education Institutions (Abstract)

Alan Ward , University of Andorra
Jordi Castella Roca , Rovira i Virgili University of Tarragona
Alex Dorca Josa , University of Andorra
pp. 1251-1255
Author Index

Author Index (PDF)

pp. 1256
95 ms
(Ver 3.3 (11022016))