The Community for Technology Leaders
International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems (IWIA'06) (2006)
Royal Holloway, United Kingdom
Apr. 13, 2006 to Apr. 14, 2006
ISBN: 0-7695-2564-4
TABLE OF CONTENTS
Introduction

Program Committee (PDF)

pp. viii
Session I: Intrusion Detection and Prevention I

The LAIDS/LIDS Framework for Systematic IPS Design (Abstract)

Simon P. Chung , University of Texas at Austin
Aloysius K. Mok , University of Texas at Austin
pp. 3-11

Active Event Correlation in Bro IDS to Detect Multi-stage Attacks (Abstract)

Bing Chen , University of Central Florida
Joohan Lee , University of Central Florida
Annie S. Wu , University of Central Florida
pp. 32-50
Session II: Evaluation and Criteria

Designing a Secure Point-of-Sale System (Abstract)

Allan Pedersen , Navi Partner, Birkerod, Denmark
Anders Hedegaard , A-2 A/S, Hellerup, Denmark
Robin Sharp , Technical University of Denmark
pp. 51-65

High Robustness Requirements in a Common Criteria Protection Profile (Abstract)

Thuy D. Nguyen , Naval Postgraduate School, Monterey, California
Timothy E. Levin , Naval Postgraduate School, Monterey, California
Cynthia E. Irvine , Naval Postgraduate School, Monterey, California
pp. 66-78
Session III: Modeling and Engineering Software Security

Ensuring Compliance between Policies, Requirements and Software Design: A Case Study (Abstract)

Qingfeng He , US Corporate Research Center, Raleigh, NC
Paul Otto , North Carolina State University
Annie I. Anton , North Carolina State University
Laurie Jones , Mills College, Oakland, CA
pp. 79-92
Session IV: Defending Communication Systems

Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks (Abstract)

Nils Aschenbruck , University of Bonn, Germany
Matthias Frank , University of Bonn, Germany
Peter Martini , University of Bonn, Germany
Jens Tolle , FGAN - FKIE/KOM, Wachtberg, Germany
Roland Legat , Stadt Koln, Berufsfeuerwehr, Germany
Heinz-Dieter Richmann , Stadt Koln, Berufsfeuerwehr, Germany
pp. 103-108
Session V: Intrusion Detection and Prevention II

An Application of Information Theory to Intrusion Detection (Abstract)

E. Earl Eiland , New Mexico Inst. of Mining and Technology, Socorro, New Mexico
Lorie M. Liebrock , New Mexico Inst. of Mining and Technology, Socorro, New Mexico USA
pp. 119-134

HonIDS: Enhancing Honeypot System with Intrusion Detection Models (Abstract)

Yong Tang , National University of Defense Technology, Changsha Hunan, China
HuaPing Hu , National University of Defense Technology, Changsha Hunan, China
XiCheng Lu , National University of Defense Technology, Changsha Hunan, China
Jie Wang , National University of Defense Technology, Changsha Hunan, China
pp. 135-143

POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System (Abstract)

Damiano Bolzoni , University of Twente, Netherlands
Sandro Etalle , University of Twente, Netherlands
Pieter Hartel , University of Twente, Netherlands
Emmanuele Zambon , Universita Ca Foscari di Venezia, Italy
pp. 144-156
Session VI: Modeling Security

Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets (Abstract)

Ole Martin Dahl , Gjovik University College, Norway
Stephen D. Wolthusen , Gjovik University College, Norway
pp. 157-168

Factoring High Level Information Flow Specifications into Low Level Access Controls (Abstract)

Kevin Kahley , University of Illinois at Chicago
Manigandan Radhakrishnan , University of Illinois at Chicago
Jon A. Solworth , University of Illinois at Chicago
pp. 169-186
Author Index

Author Index (PDF)

pp. 187
79 ms
(Ver 3.3 (11022016))