The Community for Technology Leaders
2010 International Workshop on Innovative Architecture for Future Generation High Performance (2006)
Royal Holloway, United Kingdom
Apr. 13, 2006 to Apr. 14, 2006
ISBN: 0-7695-2564-4
TABLE OF CONTENTS
Introduction

Program Committee (PDF)

pp. viii
Session I: Intrusion Detection and Prevention I

The LAIDS/LIDS Framework for Systematic IPS Design (Abstract)

Simon P. Chung , University of Texas at Austin
Aloysius K. Mok , University of Texas at Austin
pp. 3-11

Active Event Correlation in Bro IDS to Detect Multi-stage Attacks (Abstract)

Bing Chen , University of Central Florida
Joohan Lee , University of Central Florida
Annie S. Wu , University of Central Florida
pp. 32-50
Session II: Evaluation and Criteria

Designing a Secure Point-of-Sale System (Abstract)

Anders Hedegaard , A-2 A/S, Hellerup, Denmark
Allan Pedersen , Navi Partner, Birkerod, Denmark
Robin Sharp , Technical University of Denmark
pp. 51-65

High Robustness Requirements in a Common Criteria Protection Profile (Abstract)

Cynthia E. Irvine , Naval Postgraduate School, Monterey, California
Thuy D. Nguyen , Naval Postgraduate School, Monterey, California
Timothy E. Levin , Naval Postgraduate School, Monterey, California
pp. 66-78
Session III: Modeling and Engineering Software Security

Ensuring Compliance between Policies, Requirements and Software Design: A Case Study (Abstract)

Paul Otto , North Carolina State University
Qingfeng He , US Corporate Research Center, Raleigh, NC
Laurie Jones , Mills College, Oakland, CA
Annie I. Anton , North Carolina State University
pp. 79-92
Session IV: Defending Communication Systems

Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks (Abstract)

Heinz-Dieter Richmann , Stadt Koln, Berufsfeuerwehr, Germany
Roland Legat , Stadt Koln, Berufsfeuerwehr, Germany
Nils Aschenbruck , University of Bonn, Germany
Peter Martini , University of Bonn, Germany
Jens Tolle , FGAN - FKIE/KOM, Wachtberg, Germany
Matthias Frank , University of Bonn, Germany
pp. 103-108
Session V: Intrusion Detection and Prevention II

An Application of Information Theory to Intrusion Detection (Abstract)

Lorie M. Liebrock , New Mexico Inst. of Mining and Technology, Socorro, New Mexico USA
E. Earl Eiland , New Mexico Inst. of Mining and Technology, Socorro, New Mexico
pp. 119-134

HonIDS: Enhancing Honeypot System with Intrusion Detection Models (Abstract)

Jie Wang , National University of Defense Technology, Changsha Hunan, China
XiCheng Lu , National University of Defense Technology, Changsha Hunan, China
HuaPing Hu , National University of Defense Technology, Changsha Hunan, China
Yong Tang , National University of Defense Technology, Changsha Hunan, China
pp. 135-143

POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System (Abstract)

Damiano Bolzoni , University of Twente, Netherlands
Pieter Hartel , University of Twente, Netherlands
Emmanuele Zambon , Universita Ca Foscari di Venezia, Italy
Sandro Etalle , University of Twente, Netherlands
pp. 144-156
Session VI: Modeling Security

Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets (Abstract)

Ole Martin Dahl , Gjovik University College, Norway
Stephen D. Wolthusen , Gjovik University College, Norway
pp. 157-168

Factoring High Level Information Flow Specifications into Low Level Access Controls (Abstract)

Manigandan Radhakrishnan , University of Illinois at Chicago
Kevin Kahley , University of Illinois at Chicago
Jon A. Solworth , University of Illinois at Chicago
pp. 169-186
Author Index

Author Index (PDF)

pp. 187
107 ms
(Ver )