The Community for Technology Leaders
Fourth IEEE International Workshop on Information Assurance (IWIA'06) (2006)
Royal Holloway, United Kingdom
Apr. 13, 2006 to Apr. 14, 2006
ISBN: 0-7695-2564-4
TABLE OF CONTENTS
Introduction
Introduction

Program Committee (PDF)

pp. viii
Session I: Intrusion Detection and Prevention I

The LAIDS/LIDS Framework for Systematic IPS Design (Abstract)

Simon P. Chung , University of Texas at Austin
Aloysius K. Mok , University of Texas at Austin
pp. 3-11

Active Event Correlation in Bro IDS to Detect Multi-stage Attacks (Abstract)

Bing Chen , University of Central Florida
Joohan Lee , University of Central Florida
Annie S. Wu , University of Central Florida
pp. 32-50
Session II: Evaluation and Criteria

Designing a Secure Point-of-Sale System (Abstract)

Allan Pedersen , Navi Partner, Birkerod, Denmark
Anders Hedegaard , A-2 A/S, Hellerup, Denmark
Robin Sharp , Technical University of Denmark
pp. 51-65

High Robustness Requirements in a Common Criteria Protection Profile (Abstract)

Thuy D. Nguyen , Naval Postgraduate School, Monterey, California
Timothy E. Levin , Naval Postgraduate School, Monterey, California
Cynthia E. Irvine , Naval Postgraduate School, Monterey, California
pp. 66-78
Session III: Modeling and Engineering Software Security

Ensuring Compliance between Policies, Requirements and Software Design: A Case Study (Abstract)

Qingfeng He , US Corporate Research Center, Raleigh, NC
Paul Otto , North Carolina State University
Annie I. Anton , North Carolina State University
Laurie Jones , Mills College, Oakland, CA
pp. 79-92
Session IV: Defending Communication Systems

Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks (Abstract)

Nils Aschenbruck , University of Bonn, Germany
Matthias Frank , University of Bonn, Germany
Peter Martini , University of Bonn, Germany
Jens Tolle , FGAN - FKIE/KOM, Wachtberg, Germany
Roland Legat , Stadt Koln, Berufsfeuerwehr, Germany
Heinz-Dieter Richmann , Stadt Koln, Berufsfeuerwehr, Germany
pp. 103-108
Session V: Intrusion Detection and Prevention II

An Application of Information Theory to Intrusion Detection (Abstract)

E. Earl Eiland , New Mexico Inst. of Mining and Technology, Socorro, New Mexico
Lorie M. Liebrock , New Mexico Inst. of Mining and Technology, Socorro, New Mexico USA
pp. 119-134

HonIDS: Enhancing Honeypot System with Intrusion Detection Models (Abstract)

Yong Tang , National University of Defense Technology, Changsha Hunan, China
HuaPing Hu , National University of Defense Technology, Changsha Hunan, China
XiCheng Lu , National University of Defense Technology, Changsha Hunan, China
Jie Wang , National University of Defense Technology, Changsha Hunan, China
pp. 135-143

POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System (Abstract)

Damiano Bolzoni , University of Twente, Netherlands
Sandro Etalle , University of Twente, Netherlands
Pieter Hartel , University of Twente, Netherlands
Emmanuele Zambon , Universita Ca Foscari di Venezia, Italy
pp. 144-156
Session VI: Modeling Security

Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets (Abstract)

Ole Martin Dahl , Gjovik University College, Norway
Stephen D. Wolthusen , Gjovik University College, Norway
pp. 157-168

Factoring High Level Information Flow Specifications into Low Level Access Controls (Abstract)

Kevin Kahley , University of Illinois at Chicago
Manigandan Radhakrishnan , University of Illinois at Chicago
Jon A. Solworth , University of Illinois at Chicago
pp. 169-186
Author Index

Author Index (PDF)

pp. 187
91 ms
(Ver 3.3 (11022016))