CONFERENCE INFORMATION PAPERS BY SESSION … · q Workflows in Dynamic and Restricted Delegation...

190
Published by ARES Conference The International Dependability Conference ARES 2009 16-19 March 2009 Fukuoka Institute of Technology Fukuoka, Japan CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS

Transcript of CONFERENCE INFORMATION PAPERS BY SESSION … · q Workflows in Dynamic and Restricted Delegation...

Published by

ARES ConferenceThe International Dependability Conference

ARES 200916-19 March 2009

Fukuoka Institute of TechnologyFukuoka, Japan

CONFERENCE INFORMATION

PAPERS BY SESSION

PAPERS BY AUTHOR

SEARCH

GETTING STARTED

TRADEMARKS

Conference Information

2009 International Conference on Availability, Reliabilityand Security

q Message from General Co-chairs

q Message from ARES Workshop Co-chairs

q Conference Officers

q Program Committee

q Message from DAWAM Workshop hairs

q DAWAM Organization Co-chairs

q DAWAM Program Committee

q DAWAM Reviewers

q Message from FARES Workshop Co-chairs

q FARES Organiz Committee

q FARES Program Committee

Co-c

ation

s'

Conference Information (cont.)

2009 International Conference on Availability, Reliabilityand Security

q FARES Reviewers

q Message from GloSec Workshop C

q GloSec Organization Committee

q GloSec Program Committee

q GloSec Reviewers

q Message from IWSS Workshop

q IWSS Organization Committee

q IWSS Program Committee

q IWSS Reviewers

q Message from OSA Workshop

q OSA Organization Committee

hair

Co-chairs

C hairso-c

Conference Information (cont.)

2009 International Conference on Availability, Reliabilityand Security

q OSA Program Committee

q OSA Reviewers

q Message from RIBC Workshop Co-chairs

q RIBC Organization Committee

q RIBC Program Committee

q RIBC Reviewers

q Message from SecSE Workshop C hairs

q SecSE Organiz Committee

q SecSE Program Committee

q SecSE Reviewers

q Message from SECUSAB Workshop Co-chair

o-c

ation

s

Conference Information (cont.)

2009 International Conference on Availability, Reliabilityand Security

q SECUSAB Organiz Committee

q SECUSAB Program Committee

q SECUSAB Reviewers

q Message from WAIS Workshop C hairs

q WAIS Organization Committee

q WAIS Program Committee

q WAIS Reviewers

q Message from WSDF Workshop Co-chairs

q WSDF Organization Committee

q WSDF Program Committee

q WSDF Reviewers

ation

o-c

Conference Information (cont.)

2009 International Conference on Availability, Reliabilityand Security

q Keynote 1: Pairing Based Cryptography - Theory, Implementationsand Applications

q Keynote 2: Digital Identity Protection - Concepts and Issues

q Keynote 3: Topological Analysis of Network Attack Vulnerability

q Invited Talk: Integrative Security Approach as a Key Success Factorof Dependability

q Title Page (Book version)

q Copyright Page (Book version)

q Table of Contents (Book version)

q Author Index (Book version)

q Publisher's Information (Book version)

Sessions

q Distributed Systems and Grid (ARES Full Papers)

q SOA Security (ARES Full Papers)

q Enterprise Security 1 (ARES Full Papers)

q Intrusion and Fraud Detection (ARES Full Papers)

q Enterprise Security 2 (ARES Full Papers)

q Digital Forensics and Security in Communication (ARES FullPapers)

q Availability and Reliability 1 (ARES Full Papers)

q Cryptography (ARES Full Papers)

q Software Security 1 (ARES Full Papers)

q Software Security 2 (ARES Full Papers)

q Availability and Reliability 2 (ARES Full Papers)

q Privacy and Trust (ARES Full Papers)

Sessions (cont.)

q Dependable Systems and Trusted Computing 1 (ARES ShortPapers)

q Dependable Systems and Trusted Computing 2 (ARES ShortPapers)

q Software Security (ARES Short Papers)

q Privacy and Trust (ARES Short Papers)

q Enterprise Security and Security Evaluation 1 (ARES Short Papers)

q Enterprise Security and Security Evaluation 2 (ARES Short Papers)

q Availability and Reliability (ARES Short Papers)

q Authentication and Authorization (ARES Short Papers)

q Cryptography 1 (ARES Short Papers)

q Cryptography 2 (ARES Short Papers)

q DAWAM 2009 - Security & Privacy Enhancement in DWHs

Sessions (cont.)

q DAWAM 2009 - Intrusion and Network Attack Prevention

q DAWAM 2009 - Dependability, Failure Analysis & Detection

q FARES 2009 - Authentication and Authorization

q FARES 2009 - Security in Distributed Systems

q FARES 2009 - Software Security and Digital Forensics

q FARES 2009 - Dependability Aspects

q GloSec 2009 - Session 1

q GloSec 2009 - Session 2

q IWSS 2009 - Security in Ad Hoc and Mesh Networks

q IWSS 2009 - Security in Contactless Systems

q OSA 2009 - Risk Management

q OSA 2009 - Security Management and Education

Sessions (cont.)

q OSA 2009 - Security Mangement

q RIBC 2009 - Authentication, Watermarking and Steganography

q RIBC 2009 - Authentication, Watermarking and Cryptosystems

q SecSE 2009 - Education and Other Vulnerabilities

q SecSE 2009 - Secure Software-Development Lifecycles and Reuse

q SecSE 2009 - Model-Driven Development and Checklists

q SecUSAB 2009 - Session 1

q SecUSAB 2009 - Session 2

q WAIS 2009 - Security Analysis

q WAIS 2009 - Network Security

q WAIS 2009 - Signature and Protection

q WAIS 2009 - Secure Systems

Sessions (cont.)

q WAIS 2009 - Information Security

q WSDF 2009 - Digital Forensics 1

q WSDF 2009 - Digital Forensics 2

Papers by Session

Distributed Systems and Grid (ARES Full Papers)

q A Pluggable Domain Management Approach for BuildingPractical Distributed CoalitionsYasuharu Katsuno, Yuji Watanabe, Michiharu Kudo, and Eiji Okamoto

q Retaining Data Control to the Client in Infrastructure CloudsMarco Descher, Philip Masser, Thomas Feilhauer, A. Min Tjoa, and David Huemer

q Workflows in Dynamic and Restricted DelegationMehran Ahsant and Jim Basney

Papers by Session

SOA Security (ARES Full Papers)

q The Accountability Problem of Flooding Attacks in Service-Oriented ArchitecturesMeiko Jensen and Jörg Schwenk

q Web Service Trust: Towards a Dynamic Assessment FrameworkGeorge Spanoudakis and Stephane LoPresti

q Security Requirements Specification in Service-OrientedBusiness Process ManagementMichael Menzel, Ivonne Thomas, and Christoph Meinel

Papers by Session

Enterprise Security 1 (ARES Full Papers)

q Quantitative Analysis of Secure Information Flow via Probabilistic SemanticsChunyan Mu and David Clark

q Deploying Security Policy in Intra and Inter WorkflowManagement SystemsSamiha Ayed, Nora Cuppens-Boulahia, and Frédéric Cuppens

q An Empirically Derived Loss Taxonomy Based on PubliclyKnown Security IncidentsFrank Innerhofer-Oberperfler and Ruth Breu

Papers by Session

Intrusion and Fraud Detection (ARES Full Papers)

q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent MonitoringJunghwan Rhee, Ryan Riley, Dongyan Xu, and Xuxian Jiang

q Server-Side Prediction of Source IP Addresses Using DensityEstimationMarkus Goldstein, Matthias Reif, Armin Stahl, and Thomas Breuel

q Detecting Stepping-Stone Connection Using Association RuleMiningYing-wei Kuo and Shou-Hsuan Stephen Huang

Papers by Session

Enterprise Security 2 (ARES Full Papers)

q Formal Analyses of Usage Control PoliciesAlexander Pretschner, Judith Rüesch, Christian Schaefer, and Thomas Walter

q A First Step towards Characterizing Stealthy BotnetsJustin Leonard, Shouhuai Xu, and Ravi Sandhu

q Intrusion Process Modeling for Security QuantificationJaafar Almasizadeh and Mohammad Abdollahi Azgomi

q Different Approaches to In-House Identity Management -Justification of an AssumptionL. Fuchs, C. Broser, and G. Pernul

Papers by Session

Digital Forensics and Security in Communication (ARES FullPapers)

q An LPN-Problem-Based Lightweight Authentication Protocol for Wireless CommunicationsYa-Fen Chang and Yen-Cheng Lai

q Revealing the Calling History of SIP VoIP Systems by TimingAttacksGe Zhang, Simone Fischer-Huebner, Leonardo A. Martucci, and Sven Ehlert

q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime DataBenjamin Turnbull, Robert Taylor, and Barry Blundell

q A Robust Image Watermarking Using Two Level DCT and Wavelet Packets DenoisingA.H. Taherinia and M. Jamzad

Papers by Session

Availability and Reliability 1 (ARES Full Papers)

q On Equilibrium Distribution Properties in Software ReliabilityModelingXiao Xiao and Tadashi Dohi

q An Analysis of Fault Effects and Propagations in AVRMicrocontroller ATmega103(L)Alireza Rohani and Hamid. R. Zarandi

q Blue Gene/L Log Analysis and Time to Interrupt EstimationNarate Taerat, Nichamon Naksinehaboon, Clayton Chandler, James Elliott,Chokchai Leangsuksun, George Ostrouchov, Stephen L. Scott, and Christian Engelmann

Papers by Session

Cryptography (ARES Full Papers)

q A New Approach for Implementing the MPL Method toward Higher SPA ResistanceMasami Izumi, Kazuo Sakiyama, and Kazuo Ohta

q On Privacy Preserving Convex HullSandeep Hans, Sarat C. Addepalli, Anuj Gupta, and Kannan Srinathan

q Routing Protocol Security Using Symmetric Key BasedTechniquesBezawada Bruhadeshwar, Kishore Kothapalli, M. Poornima, and M. Divya

Papers by Session

Software Security 1 (ARES Full Papers)

q Prioritisation and Selection of Software Security ActivitiesDavid Byers and Nahid Shahmehri

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based VulnerabilityPing Chen, Yi Wang, Zhi Xin, Bing Mao, and Li Xie

q Enhancing Automated Detection of Vulnerabilities in JavaComponentsPierre Parrend

Papers by Session

Software Security 2 (ARES Full Papers)

q Automated Support for Security Requirements Engineering in Software Product Line Domain EngineeringDaniel Mellado, Jesus Rodríguez, Eduardo Fernández-Medina, and Mario Piattini

q Identifying and Resolving Least Privilege Violations in SoftwareArchitecturesKoen Buyens, Bart De Win, and Wouter Joosen

q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational DatabasesGerardo Canfora, Corrado Aaron Visaggio, and Vito Paradiso

Papers by Session

Availability and Reliability 2 (ARES Full Papers)

q Improving Reliability for Multi-home Inbound Traffic: MHLB/IPacket-Level Inter-domain Load-BalancingHiroshi Fujinoki

q Proactive Resource Management for Failure Resilient HighPerformance Computing ClustersSong Fu and Cheng-Zhong Xu

q A Perceptron Neural Network for AsymmetricComparison-Based System-Level Fault DiagnosisMourad Elhadef

q Perfect Failure Detection in the Partitioned SynchronousDistributed System ModelRaimundo José de Araújo Macêdo and Sérgio Gorender

Papers by Session

Privacy and Trust (ARES Full Papers)

q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting ProtocolsMehdi Talbi, Valérie Viet Triem Tong, and Adel Bouhoula

q Measuring Voter-Controlled PrivacyHugo Jonker, Sjouke Mauw, and Jun Pang

q Generating User-Understandable Privacy PreferencesJan Kolter and Günther Pernul

q An Automatic Privacy Policy Agreement Checker for E-servicesGeorge O.M. Yee

Papers by Session

Dependable Systems and Trusted Computing 1 (ARES ShortPapers)

q A Micro-FT-UART for Safety-Critical SoC-Based ApplicationsMohammad-Hamed Razmkhah, Seyed Ghassem Miremadi, and Alireza Ejlali

q MixVM - An Approach to Service Isolation and Data Protectionin Mobile Context-Sensitive ApplicationsThomas Butter and Markus Aleksy

q On the Security of Untrusted MemoryJörn-Marc Schmidt and Stefan Tillich

Papers by Session

Dependable Systems and Trusted Computing 2 (ARES ShortPapers)

q Detecting Image Tampering Using Feature FusionPin Zhang and Xiangwei Kong

q SecMiLiA: An Approach in the Agent ProtectionAntonio Muñoz, Antonio Maña, and Daniel Serrano

q Traffic Controller: A Practical Approach to Block Network CovertTiming ChannelYi Wang, Ping Chen, Yi Ge, Bing Mao, and Li Xie

Papers by Session

Software Security (ARES Short Papers)

q Capturing Information Flow with Concatenated Dynamic TaintAnalysisHyung Chan Kim, Angelos D. Keromytis, Michael Covington, and Ravi Sahita

q Risk-Driven Architectural DecompositionThomas Heyman, Riccardo Scandariato, and Wouter Joosen

q Reducing the Cost of Session Key EstablishmentBezawada Bruhadeshwar, Kishore Kothapalli, and Maddi Sree Deepya

Papers by Session

Privacy and Trust (ARES Short Papers)

q Accuracy: The Fundamental Requirement for Voting SystemsTim Storer and Russell Lock

q Reusable Security Requirements for Healthcare ApplicationsJostein Jensen, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, and Herbjørn Andresen

q P2F: A User-Centric Privacy Protection FrameworkMaryam Jafari-lafti, Chin-Tser Huang, and Csilla Farkas

Papers by Session

Enterprise Security and Security Evaluation 1 (ARES ShortPapers)

q Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001Wolfgang Boehmer

q Methodology for Experimental ICT Industrial and CriticalInfrastructure Security TestsMarcelo Masera and Igor Nai Fovino

q Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo MethodOmar Hussain and Tharam Dillon

Papers by Session

Enterprise Security and Security Evaluation 2 (ARES ShortPapers)

q Building a Responsibility Model Including Accountability,Capability and CommitmentChristophe Feltus and Michaël Petit

q AVISPA in the Validation of Ambient Intelligence ScenariosAntonio Muñoz, Antonio Maña, and Daniel Serrano

q Security Evaluation of an Intrusion Tolerant System with MRSPNsRyutaro Fujimoto, Hiroyuki Okamura, and Tadashi Dohi

q Algebraic Properties in Alice and Bob NotationSebastian Mödersheim

Papers by Session

Availability and Reliability (ARES Short Papers)

q Scrubbing in Storage Virtualization Platform for Long-TermBackup ApplicationAo Ma, Yang Yin, Wenwu Na, Xiaoxuan Meng, Qingzhong Bu, and Lu Xu

q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM TechnologiesMehrtash Manoochehri, Alireza Ejlali, and Seyed Ghassem Miremadi

q Generating AMF Configurations from Software VendorConstraints and User RequirementsA. Kanso, M. Toeroe, A. Hamou-Lhadj, and F. Khendek

Papers by Session

Authentication and Authorization (ARES Short Papers)

q Using XACML for Embedded and Fine-Grained Access ControlPolicyGeorge Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, and Lisa Marvel

q A-COLD: Access Control of Web OLAP over Multi-dataWarehouseSomchart Fugkeaw, Piyawit Manpanpanich, and Sekpon Juntapremjitt

q Package-Role Based Authorization Control Model for WirelessNetwork ServicesHuy Hoang Ngo, Xianping Wu, Phu Dung Le, and Campbell Wilson

q Security Credential Mapping in GridsMehran Ahsant, Esteban Talavera Gonzalez, and Jim Basney

Papers by Session

Cryptography 1 (ARES Short Papers)

q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute StatisticsKeita Emura, Atsuko Miyaji, and Kazumasa Omote

q Security in Quantum Networks as an Optimization ProblemStefan Rass and Peter Schartner

q Finding Preimages of Multiple Passwords Secured with VSHKimmo Halunen, Pauli Rikula, and Juha Röning

Papers by Session

Cryptography 2 (ARES Short Papers)

q Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off AttackNurdan Saran and Ali Doğanaksoy

q Generalized Robust Combiners for Oblivious TransferGanugula Umadevi, Sarat C. Addepalli, and Kannan Srinathan

Papers by Session

DAWAM 2009 - Security & Privacy Enhancement in DWHs

q Including Security Rules Support in an MDA Approach for Secure DWsCarlos Blanco, Ignacio García-Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo,and Mario Piattini

q A System of Privacy Preserving Distributed Spatial DataWarehouse Using Relation DecompositionMarcin Gorawski and Szymon Panfil

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWsCarlos Blanco, Ignacio García-Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo,and Mario Piattini

Papers by Session

DAWAM 2009 - Intrusion and Network Attack Prevention

q Identity-Based Hybrid SigncryptionFagen Li, Masaaki Shirase, and Tsuyoshi Takagi

q Towards Intrusion Detection for Encrypted NetworksVik Tor Goh, Jacob Zimmermann, and Mark Looi

q A Mobile Ambients-Based Approach for Network AttackModelling and SimulationVirginia N.L. Franqueira, Pascal van Eck, Roel Wieringa, and Raul H.C. Lopes

Papers by Session

DAWAM 2009 - Dependability, Failure Analysis & Detection

q Statistical Failure Analysis of a Web Server SystemToshiya Fujii and Tadashi Dohi

q A Policy Framework for Data Management in ServicesMarketplacesJun Li, Bryan Stephenson, and Sharad Singhal

q Modeling Misuse PatternsEduardo B. Fernandez, Nobukazu Yoshioka, and Hironori Washizaki

q Novel Algorithms for Subgroup Detection in Terrorist NetworksNasrullah Memon, Abdul Rasool Qureshi, Uffe Kock Wiil, and David L. Hicks

Papers by Session

FARES 2009 - Authentication and Authorization

q QR-TAN: Secure Mobile Transaction AuthenticationGuenther Starnberger, Lorenz Froihofer, and Karl M. Goeschka

q An Authentication Watermark Algorithm for JPEG imagesXiaowei Shi, Fenlin Liu, Daofu Gong, and Jing Jing

q A New Watermarking Attack Using Long-Range CorrelationImage RestorationA.H. Taherinia, M. Fotouhi, and M. Jamzad

Papers by Session

FARES 2009 - Security in Distributed Systems

q The Case for a Simpler Security Model in Grid ComputingFrederik Orellana, Christian Ulrik Søttrup, Anders Wäänänen, Daniel Kalici, and Michael Grønager

q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobotsSarat C. Addepalli, Piyush Bansal, Kannan Srinathan, and K. Madhava Krishna

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle ManagementM. Descher, T. Feilhauer, T. Ludescher, P. Masser, B. Wenzel, P. Brezany, I. Elsayed, A. Woehrer,A.M. Tjoa, and D. Huemer

Papers by Session

FARES 2009 - Software Security and Digital Forensics

q A Robust Image Watermarking Method in Wavelet DomainUsing Genetic AlgorithmS. Hamid Amiri and Mansour Jamzad

q An Efficient Measurement of Object Oriented DesignVulnerabilityAlka Agrawal, Shalini Chandra, and Raees Ahmad Khan

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408Kenichi Yajima, Shoichi Morimoto, Daisuke Horie, Noor Sheila Azreen, Yuichi Goto, and Jingde Cheng

Papers by Session

FARES 2009 - Dependability Aspects

q Using Hybrid Trust Model for Handling Inaccurate ResourceBagher Rahimpour Cami and Mohammad Reza Matash Brujerdi

q A High Speed and Low Cost Error Correction Technique for the Carry Select AdderAlireza Namazi, Seyed Ghassem Miremadi, and Alireza Ejlali

q An Improvement of REM: A Replication Oriented Event-BasedMiddlewareYoucheng Chen, Mohammad Reza Selim, Yuichi Goto, and Jingde Cheng

Papers by Session

GloSec 2009 - Session 1

q Advanced Flooding Attack on a SIP ServerXianglin Deng and Malcolm Shore

q State of Cybersecurity and the Roadmap to Secure CyberCommunity in CambodiaSopheak Cheang and Sinawong Sang

q An Inclusive Information Society Needs a Global Approach of Information SecuritySolange Ghernaouti-Hélie

Papers by Session

GloSec 2009 - Session 2

q Measuring Peer-to-Peer Botnets Using Control Flow StabilityBinbin Wang, Zhitang Li, Hao Tu, and Jie Ma

q Regulatory Compliance and Information Security AssuranceIgli Tashi

q Information Security Optimization: From Theory to PracticeDavid John Simms

Papers by Session

IWSS 2009 - Security in Ad Hoc and Mesh Networks

q Trusting User Defined Context in MANETs: Experience from the MIDAS ApproachVegar Westerlund, Thomas Pronstad, Inger Anne Tøndel, and Leendert Wienhofen

q Deconvolving Protected SignalsMohaned Kafi and Sylvain Guilley

Papers by Session

IWSS 2009 - Security in Contactless Systems

q Vulnerability Analysis and Attacks on NFC-Enabled MobilePhonesCollin Mulliner

q Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure ElementVincent Alimi and Marc Pasquet

q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID SystemsGeorge Poulopoulos, Konstantinos Markantonakis, and Keith Mayes

Papers by Session

OSA 2009 - Risk Management

q A New Approach for the Construction of Fault Trees from System SimulinkG. Latif-Shabgahi and F. Tajarrod

q Estimating ToE Risk Level Using CVSSSiv Hilde Houmb and Virginia N.L. Franqueira

q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management GuideAmril Syalim, Yoshiaki Hori, and Kouichi Sakurai

Papers by Session

OSA 2009 - Security Management and Education

q Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business EnvironmentsJuhani Anttila and Jorma Kajava

q Standards-Based Cyber ExercisesRonald Dodge, Brian Hay, and Kara Nance

q Patterns to Support the Development of Privacy PoliciesLuanna Lopes Lobato, Eduardo B. Fernandez, and Sergio Donizetti Zorzo

Papers by Session

OSA 2009 - Security Mangement

q Multidimensional Management of Information Security – AMetrics Based Approach Merging Business and InformationSecurity TopicsSebastian Sowa and Roland Gabriel

q A Security Management Assurance Model to Holistically Assessthe Information Security PostureIgli Tashi and Solange Ghernaouti-Hélie

q Methodology to Align Business and IT Policies: Use Case from an IT CompanyChristophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gateau, André Adelsbach,and Marc Camy

Papers by Session

RIBC 2009 - Authentication, Watermarking and Steganography

q On the Higher Order Nonlinearities of Boolean Functions and S-boxesClaude Carlet

q A Certificate Revocable Anonymous Authentication Schemewith Designated VerifierKeita Emura, Atsuko Miyaji, and Kazumasa Omote

q A Standard MIDI File Steganography Based on Fluctuation of DurationKotaro Yamamoto and Munetoshi Iwakiri

q A Signature Scheme Associated with Universal Re-signcryptionKohei Tatara and Kouichi Sakurai

Papers by Session

RIBC 2009 - Authentication, Watermarking and Cryptosystems

q Real-Time Audio Watermarking with Wavetable Alternation in Digital InstrumentKotaro Yamamoto and Munetoshi Iwakiri

q A Reconfigurable-Permutation Algorithm for M_S-BoxHiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, and Yoshio Yoshioka

Papers by Session

SecSE 2009 - Education and Other Vulnerabilities

q Protecting Global and Static Variables from Buffer OverflowAttacksYves Younan, Frank Piessens, and Wouter Joosen

q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?Dejan Baca, Kai Petersen, Bengt Carlsson, and Lars Lundberg

q hACMEgame: A Tool for Teaching Software SecurityØyvind Nerbråten and Lillian Røstad

Papers by Session

SecSE 2009 - Secure Software-Development Lifecycles and Reuse

q Towards Evaluation of Security Assurance during the SoftwareDevelopment LifecycleIlkka Uusitalo, Kaarina Karppinen, Pasi Ahonen, and Heimo Pentikäinen

q An Architectural Foundation for Security Model Sharing and ReusePer Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri,and Inger Anne Tøndel

q A Knowledge Management Approach to Support a SecureSoftware DevelopmentFrancisco José Barreto Nunes, Arnaldo Dias Belchior, and Adriano Bessa Albuquerque

Papers by Session

SecSE 2009 - Model-Driven Development and Checklists

q A Practical Framework for the Dataflow Pointcut in AspectJAmine Boukhtouta, Dima Alhadidi, and Mourad Debbabi

q SecureMDD: A Model-Driven Development Method for SecureSmart Card ApplicationsNina Moebius, Kurt Stenzel, Holger Grandy, and Wolfgang Reif

q Linking Privacy Solutions to Developer GoalsKim Wuyts, Riccardo Scandariato, Bart De Decker, and Wouter Joosen

q Software Inspections Using Guided Checklists to EnsureSecurity GoalsFrank Elberzhager, Alexander Klaus, and Marek Jawurek

Papers by Session

SecUSAB 2009 - Session 1

q Managing Rights and Value of Digital MediaFilippo Chiariglione, Giacomo Cosenza, and Sergio Matone

q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMSCharlott Eliasson, Markus Fiedler, and Ivar Jørstad

q The User-Centric Vision Matches Credentials ExchangesMikaël Ates, Jacques Fayolle, Christophe Gravier, and Jeremy Lardon

Papers by Session

SecUSAB 2009 - Session 2

q Patient-Administered Access Control: A Usability StudyLillian Røstad and Ole Andreas Alsos

q An Experimental System for Studying the Tradeoff between Usability and SecurityNoam Ben-Asher, Joachim Meyer, Sebastian Möller, and Roman Englert

Papers by Session

WAIS 2009 - Security Analysis

q Rank Swapping for Partial Orders and Continuous VariablesVicenç Torra

q An Improved Authentication Protocol Based on One-Way HashFunctions and Diffie-Hellman Key ExchangeMarko Hölbl and Tatjana Welzer

q Security Analysis for P2P Routing ProtocolsTatsuro Fujii, Yizhi Ren, Yoshiaki Hori, and Kouichi Sakurai

Papers by Session

WAIS 2009 - Network Security

q Secrecy Capacity of Wireless LANRyuzou Nishi, Yoshiaki Hori, and Kouichi Sakurai

q Privacy-Preserving Collaborative Filtering SchemesHiroaki Kikuchi, Hiroyasu Kizawa, and Minako Tada

q A Framework for Understanding BotnetsJustin Leonard, Shouhuai Xu, and Ravi Sandhu

Papers by Session

WAIS 2009 - Signature and Protection

q Enterprise-Oriented Digital Rights Management Mechanism:eDRMChia-Chen Lin, Shih-Chi Wu, Po-Hsuan Chiang, and Chang-Chi Chen

q Utility and Risk of JPEG-Based Continuous Microdata ProtectionMethodsJavier Jiménez and Vicenç Torra

q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear PairingsYuh-Min Tseng, Tsu-Yang Wu, and Jui-Di Wu

q Yet Another Sanitizable Signature from Bilinear MapsTetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, and Masahiko Takenaka

Papers by Session

WAIS 2009 - Secure Systems

q Generation of Prototypes for Masking Sequences of EventsAida Valls, Cristina Gómez-Alonso, and Vicenç Torra

q Enhancing Control of Service Compositions in Service-OrientedArchitecturesChristian Schneider, Frederic Stumpf, and Claudia Eckert

q Truly Anonymous Paper Submission and Review SchemeChun-I Fan, Ming-Te Chen, and Lung-Hsien Chen

q An Implementation of the Binding Mechanism in the WebBrowser for Preventing XSS Attacks: Introducing the Bind-Value HeadersGenta Iha and Hiroshi Doi

Papers by Session

WAIS 2009 - Information Security

q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network PacketsKohei Tatara, Yoshiaki Hori, and Kouichi Sakurai

q Automated Instruction-Set Randomization for WebApplications in Diversified Redundant SystemsFrédéric Majorczyk and Jonathan-Christofer Demay

q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute InformationYoshio Kakizaki, Yoshiaki Yoshida, and Hidekazu Tsuji

q Making Use of Human Visual Capability to Improve InformationSecurityMasakatsu Nishigaki and Takumi Yamamoto

Papers by Session

WSDF 2009 - Digital Forensics 1

q Enhancement of Forensic Computing Investigations through Memory Forensic TechniquesMatthew Simon and Jill Slay

q Improving Performance in Digital Forensics: A Case UsingPattern Matching BoardJooyoung Lee, Sungkyung Un, and Dowon Hong

q Computer Forensics in Japan: A Preliminary StudyJigang Liu and Tetsutaro Uehara

Papers by Session

WSDF 2009 - Digital Forensics 2

q Enhancing Computer Forensics Investigation through Visualisation and Data ExploitationGrant Osborne and Benjamin Turnbull

q A Post-Mortem Incident Modeling MethodShanai Ardi and Nahid Shahmehri

q Investigating the Implications of Virtual Machine Introspectionfor Digital ForensicsKara Nance, Matt Bishop, and Brian Hay

Papers by Author

A

q Addepalli, Sarat C.

q Adelsbach, André

q Agrawal, Alka

q Ahonen, Pasi

q Ahsant, Mehran

q Albuquerque, Adriano Bessa

q Aleksy, Markus

q Alhadidi, Dima

q Alimi, Vincent

q Almasizadeh, Jaafar

q Alsos, Ole Andreas

q Amiri, S. Hamid

q Andresen, Herbjørn

q Anttila, Juhani

q Ardi, Shanai

q Ates, Mikaël

q Aubert, Jocelyn

q Ayed, Samiha

q Azgomi, MohammadAbdollahi

q Azreen, Noor Sheila

B

q Baca, Dejan

Papers by Author

q Bansal, Piyush

q Basney, Jim

q Belchior, Arnaldo Dias

q Ben-Asher, Noam

q Bishop, Matt

q Blanco, Carlos

q Blundell, Barry

q Boehmer, Wolfgang

q Bouhoula, Adel

q Boukhtouta, Amine

q Breu, Ruth

q Breuel, Thomas

q Brezany, P.

q Broser, C.

q Bruhadeshwar, Bezawada

q Brujerdi, Mohammad RezaMatash

q Bu, Qingzhong

q Butter, Thomas

q Buyens, Koen

q Byers, David

C

q Cami, Bagher Rahimpour

q Camy, Marc

q Canfora, Gerardo

Papers by Author

q Carlet, Claude

q Carlsson, Bengt

q Chandler, Clayton

q Chandra, Shalini

q Chang, Ya-Fen

q Cheang, Sopheak

q Chen, Chang-Chi

q Chen, Lung-Hsien

q Chen, Ming-Te

q Chen, Ping

q Chen, Youcheng

q Cheng, Jingde

q Chiang, Po-Hsuan

q Chiariglione, Filippo

q Clark, David

q Cosenza, Giacomo

q Covington, Michael

q Cuppens, Frédéric

q Cuppens-Boulahia, Nora

d

q de Guzmán, IgnacioGarcía-Rodríguez

D

q De Decker, Bart

q Debbabi, Mourad

Papers by Author

q Deepya, Maddi Sree

q Demay, Jonathan-Christofer

q Deng, Xianglin

q Descher, M.

q Descher, Marco

q Dillon, Tharam

q Divya, M.

q Dodge, Ronald

q Doğanaksoy, Ali

q Dohi, Tadashi

q Doi, Hiroshi

E

q Eckert, Claudia

q Ehlert, Sven

q Ejlali, Alireza

q Elberzhager, Frank

q Elhadef, Mourad

q Eliasson, Charlott

q Elliott, James

q Elsayed, I.

q Emamali, Gerald

q Emura, Keita

q Engelmann, Christian

Papers by Author

q Englert, Roman

F

q Fan, Chun-I

q Farkas, Csilla

q Fayolle, Jacques

q Feilhauer, T.

q Feilhauer, Thomas

q Feltus, Christophe

q Fernandez, Eduardo B.

q Fernández-Medina, Eduardo

q Fiedler, Markus

q Fischer-Huebner, Simone

q Foster, Keith

q Fotouhi, M.

q Fovino, Igor Nai

q Franqueira, Virginia N.L.

q Froihofer, Lorenz

q Fu, Song

q Fuchs, L.

q Fugkeaw, Somchart

q Fujii, Tatsuro

q Fujii, Toshiya

q Fujimoto, Ryutaro

q Fujinoki, Hiroshi

Papers by Author

G

q Gabriel, Roland

q Gateau, Benjamin

q Ge, Yi

q Ghernaouti-Hélie, Solange

q Goeschka, Karl M.

q Goh, Vik Tor

q Goldstein, Markus

q Gómez-Alonso, Cristina

q Gong, Daofu

q Gonzalez, Esteban Talavera

q Gorawski, Marcin

q Gorender, Sérgio

q Goto, Yuichi

q Grandy, Holger

q Gravier, Christophe

q Grønager, Michael

q Guilley, Sylvain

q Gupta, Anuj

H

q Halunen, Kimmo

q Hamou-Lhadj, A.

q Hans, Sandeep

q Hay, Brian

Papers by Author

q Heyman, Thomas

q Hicks, David L.

q Hölbl, Marko

q Hong, Dowon

q Hori, Yoshiaki

q Horie, Daisuke

q Houmb, Siv Hilde

q Hsieh, George

q Huang, Chin-Tser

q Huang, Shou-Hsuan Stephen

q Huemer, D.

q Huemer, David

q Hussain, Omar

I

q Iha, Genta

q Incoul, Christophe

q Innerhofer-Oberperfler, Frank

q Iwakiri, Munetoshi

q Izu, Tetsuya

q Izumi, Masami

J

q Jaatun, Martin Gilje

q Jafari-lafti, Maryam

q Jamzad, M.

q Jamzad, Mansour

Papers by Author

q Jawurek, Marek

q Jensen, Jostein

q Jensen, Meiko

q Jiang, Xuxian

q Jiménez, Javier

q Jing, Jing

q Jonker, Hugo

q Joosen, Wouter

q Jørstad, Ivar

q Juntapremjitt, Sekpon

K

q Kafi, Mohaned

q Kajava, Jorma

q Kakizaki, Yoshio

q Kalici, Daniel

q Kanso, A.

q Karppinen, Kaarina

q Katsuno, Yasuharu

q Keromytis, Angelos D.

q Khan, Raees Ahmad

q Khendek, F.

q Kikuchi, Hiroaki

q Kim, Hyung Chan

q Kizawa, Hiroyasu

q Klaus, Alexander

Papers by Author

q Kolter, Jan

q Kong, Xiangwei

q Kothapalli, Kishore

q Krishna, K. Madhava

q Kudo, Michiharu

q Kudou, Hiroshi

q Kunihiro, Noboru

q Kuo, Ying-wei

L

q Lai, Yen-Cheng

q Lardon, Jeremy

q Latif-Shabgahi, G.

q Le, Phu Dung

q Leangsuksun, Chokchai

q Lee, Jooyoung

q Leonard, Justin

q Li, Fagen

q Li, Jun

q Li, Zhitang

q Lin, Chia-Chen

q Liu, Fenlin

q Liu, Jigang

q Lobato, Luanna Lopes

q Lock, Russell

q Looi, Mark

Papers by Author

q Lopes, Raul H.C.

q LoPresti, Stephane

q Ludescher, T.

q Lundberg, Lars

M

q Ma, Ao

q Ma, Jie

q Macêdo, Raimundo José de Araújo

q Majorczyk, Frédéric

q Maña, Antonio

q Manoochehri, Mehrtash

q Manpanpanich, Piyawit

q Mao, Bing

q Markantonakis, Konstantinos

q Martucci, Leonardo A.

q Marvel, Lisa

q Masera, Marcelo

q Masser, P.

q Masser, Philip

q Matone, Sergio

q Mauw, Sjouke

q Mayes, Keith

q Meinel, Christoph

q Meland, Per Håkon

Papers by Author

q Mellado, Daniel

q Memon, Nasrullah

q Meng, Xiaoxuan

q Menzel, Michael

q Meyer, Joachim

q Miremadi, Seyed Ghassem

q Miyaji, Atsuko

q Mödersheim, Sebastian

q Moebius, Nina

q Möller, Sebastian

q Morimoto, Shoichi

q Mu, Chunyan

q Mulliner, Collin

q Muñoz, Antonio

N

q Na, Wenwu

q Nagase, Tomoyuki

q Nakayama, Shunn-ichiro

q Naksinehaboon, Nichamon

q Namazi, Alireza

q Nance, Kara

q Nerbråten, Øyvind

q Ngo, Huy Hoang

q Nishi, Ryuzou

q Nishigaki, Masakatsu

Papers by Author

q Nunes, Francisco José Barreto

O

q Ohta, Kazuo

q Okamoto, Eiji

q Okamura, Hiroyuki

q Omote, Kazumasa

q Orellana, Frederik

q Osborne, Grant

q Ostrouchov, George

P

q Panfil, Szymon

q Pang, Jun

q Paradiso, Vito

q Parrend, Pierre

q Pasquet, Marc

q Patrick, Gregory

q Pentikäinen, Heimo

q Pernul, G.

q Pernul, Günther

q Petersen, Kai

q Petit, Michaël

q Piattini, Mario

q Piessens, Frank

q Poornima, M.

q Poulopoulos, George

Papers by Author

q Pretschner, Alexander

q Pronstad, Thomas

Q

q Qureshi, Abdul Rasool

R

q Rass, Stefan

q Razmkhah,Mohammad-Hamed

q Reif, Matthias

q Reif, Wolfgang

q Ren, Yizhi

q Rhee, Junghwan

q Rikula, Pauli

q Riley, Ryan

q Rios, Erkuden

q Rodríguez, Jesus

q Rohani, Alireza

q Röning, Juha

q Røstad, Lillian

q Rüesch, Judith

S

q Sahita, Ravi

q Sakiyama, Kazuo

q Sakurai, Kouichi

Papers by Author

q Sanchez, Txus

q Sandhu, Ravi

q Sang, Sinawong

q Sano, Makoto

q Saran, Nurdan

q Scandariato, Riccardo

q Schaefer, Christian

q Schartner, Peter

q Schmidt, Jörn-Marc

q Schneider, Christian

q Schwenk, Jörg

q Scott, Stephen L.

q Selim, Mohammad Reza

q Serrano, Daniel

q Shahmehri, Nahid

q Shi, Xiaowei

q Shirase, Masaaki

q Shore, Malcolm

q Simms, David John

q Simon, Matthew

q Singhal, Sharad

q Slay, Jill

q Søttrup, Christian Ulrik

q Sowa, Sebastian

q Spanoudakis, George

q Srinathan, Kannan

Papers by Author

q Stahl, Armin

q Starnberger, Guenther

q Stenzel, Kurt

q Stephenson, Bryan

q Storer, Tim

q Stumpf, Frederic

q Syalim, Amril

T

q Tada, Minako

q Taerat, Narate

q Taherinia, A.H.

q Tajarrod, F.

q Takagi, Tsuyoshi

q Takenaka, Masahiko

q Talbi, Mehdi

q Tashi, Igli

q Tatara, Kohei

q Taylor, Robert

q Thomas, Ivonne

q Tillich, Stefan

q Tjoa, A. Min

q Tjoa, A.M.

q Toeroe, M.

q Tøndel, Inger Anne

q Tong, Valérie Viet Triem

Papers by Author

q Torra, Vicenç

q Trujillo, Juan

q Tseng, Yuh-Min

q Tsuji, Hidekazu

q Tu, Hao

q Turnbull, Benjamin

U

q Uehara, Tetsutaro

q Umadevi, Ganugula

q Un, Sungkyung

q Uusitalo, Ilkka

v

q van Eck, Pascal

V

q Valls, Aida

q Visaggio, Corrado Aaron

W

q Wäänänen, Anders

q Walter, Thomas

q Wang, Binbin

q Wang, Yi

q Washizaki, Hironori

Papers by Author

q Watanabe, Atsushi

q Watanabe, Yuji

q Welzer, Tatjana

q Wenzel, B.

q Westerlund, Vegar

q Wienhofen, Leendert

q Wieringa, Roel

q Wiil, Uffe Kock

q Wilson, Campbell

q Win, Bart De

q Woehrer, A.

q Wu, Jui-Di

q Wu, Shih-Chi

q Wu, Tsu-Yang

q Wu, Xianping

q Wuyts, Kim

X

q Xiao, Xiao

q Xie, Li

q Xin, Zhi

q Xu, Cheng-Zhong

q Xu, Dongyan

q Xu, Lu

q Xu, Shouhuai

Papers by Author

Y

q Yajima, Kenichi

q Yamamoto, Kotaro

q Yamamoto, Takumi

q Yee, George O.M.

q Yin, Yang

q Yoshida, Yoshiaki

q Yoshioka, Nobukazu

q Yoshioka, Yoshio

q Younan, Yves

Z

q Zarandi, Hamid. R.

q Zhang, Ge

q Zhang, Pin

q Zimmermann, Jacob

q Zorzo, Sergio Donizetti

Papers by Author

Addepalli, Sarat C.

q On Privacy Preserving Convex Hull

q Generalized Robust Combiners for Oblivious Transfer

q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots

Adelsbach, André

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Agrawal, Alka

q An Efficient Measurement of Object Oriented DesignVulnerability

Papers by Author

Ahonen, Pasi

q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle

Ahsant, Mehran

q Workflows in Dynamic and Restricted Delegation

q Security Credential Mapping in Grids

Albuquerque, Adriano Bessa

q A Knowledge Management Approach to Support a SecureSoftware Development

Papers by Author

Aleksy, Markus

q MixVM - An Approach to Service Isolation and Data Protectionin Mobile Context-Sensitive Applications

Alhadidi, Dima

q A Practical Framework for the Dataflow Pointcut in AspectJ

Alimi, Vincent

q Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element

Almasizadeh, Jaafar

q Intrusion Process Modeling for Security Quantification

Papers by Author

Alsos, Ole Andreas

q Patient-Administered Access Control: A Usability Study

Amiri, S. Hamid

q A Robust Image Watermarking Method in Wavelet DomainUsing Genetic Algorithm

Andresen, Herbjørn

q Reusable Security Requirements for Healthcare Applications

Anttila, Juhani

q Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments

Papers by Author

Ardi, Shanai

q An Architectural Foundation for Security Model Sharing and Reuse

q A Post-Mortem Incident Modeling Method

Ates, Mikaël

q The User-Centric Vision Matches Credentials Exchanges

Aubert, Jocelyn

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Papers by Author

Ayed, Samiha

q Deploying Security Policy in Intra and Inter WorkflowManagement Systems

Azgomi, Mohammad Abdollahi

q Intrusion Process Modeling for Security Quantification

Azreen, Noor Sheila

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

Baca, Dejan

q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?

Papers by Author

Bansal, Piyush

q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots

Basney, Jim

q Workflows in Dynamic and Restricted Delegation

q Security Credential Mapping in Grids

Belchior, Arnaldo Dias

q A Knowledge Management Approach to Support a SecureSoftware Development

Papers by Author

Ben-Asher, Noam

q An Experimental System for Studying the Tradeoff between Usability and Security

Bishop, Matt

q Investigating the Implications of Virtual Machine Introspectionfor Digital Forensics

Blanco, Carlos

q Including Security Rules Support in an MDA Approach for Secure DWs

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs

Papers by Author

Blundell, Barry

q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime Data

Boehmer, Wolfgang

q Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001

Bouhoula, Adel

q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting Protocols

Boukhtouta, Amine

q A Practical Framework for the Dataflow Pointcut in AspectJ

Papers by Author

Breu, Ruth

q An Empirically Derived Loss Taxonomy Based on PubliclyKnown Security Incidents

Breuel, Thomas

q Server-Side Prediction of Source IP Addresses Using DensityEstimation

Brezany, P.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Broser, C.

q Different Approaches to In-House Identity Management -Justification of an Assumption

Papers by Author

Bruhadeshwar, Bezawada

q Routing Protocol Security Using Symmetric Key BasedTechniques

q Reducing the Cost of Session Key Establishment

Brujerdi, Mohammad Reza Matash

q Using Hybrid Trust Model for Handling Inaccurate Resource

Bu, Qingzhong

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Papers by Author

Butter, Thomas

q MixVM - An Approach to Service Isolation and Data Protectionin Mobile Context-Sensitive Applications

Buyens, Koen

q Identifying and Resolving Least Privilege Violations in SoftwareArchitectures

Byers, David

q Prioritisation and Selection of Software Security Activities

Cami, Bagher Rahimpour

q Using Hybrid Trust Model for Handling Inaccurate Resource

Papers by Author

Camy, Marc

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Canfora, Gerardo

q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational Databases

Carlet, Claude

q On the Higher Order Nonlinearities of Boolean Functions and S-boxes

Carlsson, Bengt

q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?

Papers by Author

Chandler, Clayton

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Chandra, Shalini

q An Efficient Measurement of Object Oriented DesignVulnerability

Chang, Ya-Fen

q An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications

Cheang, Sopheak

q State of Cybersecurity and the Roadmap to Secure CyberCommunity in Cambodia

Papers by Author

Chen, Chang-Chi

q Enterprise-Oriented Digital Rights Management Mechanism:eDRM

Chen, Lung-Hsien

q Truly Anonymous Paper Submission and Review Scheme

Chen, Ming-Te

q Truly Anonymous Paper Submission and Review Scheme

Chen, Ping

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability

q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel

Papers by Author

Chen, Youcheng

q An Improvement of REM: A Replication Oriented Event-BasedMiddleware

Cheng, Jingde

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

q An Improvement of REM: A Replication Oriented Event-BasedMiddleware

Chiang, Po-Hsuan

q Enterprise-Oriented Digital Rights Management Mechanism:eDRM

Papers by Author

Chiariglione, Filippo

q Managing Rights and Value of Digital Media

Clark, David

q Quantitative Analysis of Secure Information Flow via Probabilistic Semantics

Cosenza, Giacomo

q Managing Rights and Value of Digital Media

Covington, Michael

q Capturing Information Flow with Concatenated Dynamic TaintAnalysis

Papers by Author

Cuppens, Frédéric

q Deploying Security Policy in Intra and Inter WorkflowManagement Systems

Cuppens-Boulahia, Nora

q Deploying Security Policy in Intra and Inter WorkflowManagement Systems

De Decker, Bart

q Linking Privacy Solutions to Developer Goals

de Guzmán, Ignacio García-Rodríguez

q Including Security Rules Support in an MDA Approach for Secure DWs

Papers by Author

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs

Debbabi, Mourad

q A Practical Framework for the Dataflow Pointcut in AspectJ

Deepya, Maddi Sree

q Reducing the Cost of Session Key Establishment

Demay, Jonathan-Christofer

q Automated Instruction-Set Randomization for WebApplications in Diversified Redundant Systems

Deng, Xianglin

q Advanced Flooding Attack on a SIP Server

Papers by Author

Descher, M.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Descher, Marco

q Retaining Data Control to the Client in Infrastructure Clouds

Dillon, Tharam

q Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method

Divya, M.

q Routing Protocol Security Using Symmetric Key BasedTechniques

Papers by Author

Dodge, Ronald

q Standards-Based Cyber Exercises

Doğanaksoy, Ali

q Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack

Dohi, Tadashi

q On Equilibrium Distribution Properties in Software ReliabilityModeling

q Security Evaluation of an Intrusion Tolerant System with MRSPNs

q Statistical Failure Analysis of a Web Server System

Papers by Author

Doi, Hiroshi

q An Implementation of the Binding Mechanism in the WebBrowser for Preventing XSS Attacks: Introducing the Bind-Value Headers

Eckert, Claudia

q Enhancing Control of Service Compositions in Service-OrientedArchitectures

Ehlert, Sven

q Revealing the Calling History of SIP VoIP Systems by TimingAttacks

Ejlali, Alireza

q A Micro-FT-UART for Safety-Critical SoC-Based Applications

Papers by Author

q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM Technologies

q A High Speed and Low Cost Error Correction Technique for the Carry Select Adder

Elberzhager, Frank

q Software Inspections Using Guided Checklists to EnsureSecurity Goals

Elhadef, Mourad

q A Perceptron Neural Network for AsymmetricComparison-Based System-Level Fault Diagnosis

Papers by Author

Eliasson, Charlott

q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMS

Elliott, James

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Elsayed, I.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Emamali, Gerald

q Using XACML for Embedded and Fine-Grained Access ControlPolicy

Papers by Author

Emura, Keita

q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics

q A Certificate Revocable Anonymous Authentication Schemewith Designated Verifier

Engelmann, Christian

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Englert, Roman

q An Experimental System for Studying the Tradeoff between Usability and Security

Papers by Author

Fan, Chun-I

q Truly Anonymous Paper Submission and Review Scheme

Farkas, Csilla

q P2F: A User-Centric Privacy Protection Framework

Fayolle, Jacques

q The User-Centric Vision Matches Credentials Exchanges

Feilhauer, T.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Feilhauer, Thomas

q Retaining Data Control to the Client in Infrastructure Clouds

Papers by Author

Feltus, Christophe

q Building a Responsibility Model Including Accountability,Capability and Commitment

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Fernandez, Eduardo B.

q Modeling Misuse Patterns

q Patterns to Support the Development of Privacy Policies

Fernández-Medina, Eduardo

q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering

Papers by Author

q Including Security Rules Support in an MDA Approach for Secure DWs

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs

Fiedler, Markus

q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMS

Fischer-Huebner, Simone

q Revealing the Calling History of SIP VoIP Systems by TimingAttacks

Papers by Author

Foster, Keith

q Using XACML for Embedded and Fine-Grained Access ControlPolicy

Fotouhi, M.

q A New Watermarking Attack Using Long-Range CorrelationImage Restoration

Fovino, Igor Nai

q Methodology for Experimental ICT Industrial and CriticalInfrastructure Security Tests

Franqueira, Virginia N.L.

q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation

Papers by Author

q Estimating ToE Risk Level Using CVSS

Froihofer, Lorenz

q QR-TAN: Secure Mobile Transaction Authentication

Fu, Song

q Proactive Resource Management for Failure Resilient HighPerformance Computing Clusters

Fuchs, L.

q Different Approaches to In-House Identity Management -Justification of an Assumption

Papers by Author

Fugkeaw, Somchart

q A-COLD: Access Control of Web OLAP over Multi-dataWarehouse

Fujii, Tatsuro

q Security Analysis for P2P Routing Protocols

Fujii, Toshiya

q Statistical Failure Analysis of a Web Server System

Fujimoto, Ryutaro

q Security Evaluation of an Intrusion Tolerant System with MRSPNs

Papers by Author

Fujinoki, Hiroshi

q Improving Reliability for Multi-home Inbound Traffic: MHLB/IPacket-Level Inter-domain Load-Balancing

Gabriel, Roland

q Multidimensional Management of Information Security – AMetrics Based Approach Merging Business and InformationSecurity Topics

Gateau, Benjamin

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Papers by Author

Ge, Yi

q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel

Ghernaouti-Hélie, Solange

q An Inclusive Information Society Needs a Global Approach of Information Security

q A Security Management Assurance Model to Holistically Assessthe Information Security Posture

Goeschka, Karl M.

q QR-TAN: Secure Mobile Transaction Authentication

Goh, Vik Tor

q Towards Intrusion Detection for Encrypted Networks

Papers by Author

Goldstein, Markus

q Server-Side Prediction of Source IP Addresses Using DensityEstimation

Gómez-Alonso, Cristina

q Generation of Prototypes for Masking Sequences of Events

Gong, Daofu

q An Authentication Watermark Algorithm for JPEG images

Gonzalez, Esteban Talavera

q Security Credential Mapping in Grids

Papers by Author

Gorawski, Marcin

q A System of Privacy Preserving Distributed Spatial DataWarehouse Using Relation Decomposition

Gorender, Sérgio

q Perfect Failure Detection in the Partitioned SynchronousDistributed System Model

Goto, Yuichi

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

q An Improvement of REM: A Replication Oriented Event-BasedMiddleware

Papers by Author

Grandy, Holger

q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications

Gravier, Christophe

q The User-Centric Vision Matches Credentials Exchanges

Grønager, Michael

q The Case for a Simpler Security Model in Grid Computing

Guilley, Sylvain

q Deconvolving Protected Signals

Gupta, Anuj

q On Privacy Preserving Convex Hull

Papers by Author

Halunen, Kimmo

q Finding Preimages of Multiple Passwords Secured with VSH

Hamou-Lhadj, A.

q Generating AMF Configurations from Software VendorConstraints and User Requirements

Hans, Sandeep

q On Privacy Preserving Convex Hull

Hay, Brian

q Standards-Based Cyber Exercises

q Investigating the Implications of Virtual Machine Introspectionfor Digital Forensics

Papers by Author

Heyman, Thomas

q Risk-Driven Architectural Decomposition

Hicks, David L.

q Novel Algorithms for Subgroup Detection in Terrorist Networks

Hölbl, Marko

q An Improved Authentication Protocol Based on One-Way HashFunctions and Diffie-Hellman Key Exchange

Hong, Dowon

q Improving Performance in Digital Forensics: A Case UsingPattern Matching Board

Papers by Author

Hori, Yoshiaki

q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management Guide

q Security Analysis for P2P Routing Protocols

q Secrecy Capacity of Wireless LAN

q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets

Horie, Daisuke

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

Houmb, Siv Hilde

q Estimating ToE Risk Level Using CVSS

Papers by Author

Hsieh, George

q Using XACML for Embedded and Fine-Grained Access ControlPolicy

Huang, Chin-Tser

q P2F: A User-Centric Privacy Protection Framework

Huang, Shou-Hsuan Stephen

q Detecting Stepping-Stone Connection Using Association RuleMining

Huemer, D.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Papers by Author

Huemer, David

q Retaining Data Control to the Client in Infrastructure Clouds

Hussain, Omar

q Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method

Iha, Genta

q An Implementation of the Binding Mechanism in the WebBrowser for Preventing XSS Attacks: Introducing the Bind-Value Headers

Incoul, Christophe

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Papers by Author

Innerhofer-Oberperfler, Frank

q An Empirically Derived Loss Taxonomy Based on PubliclyKnown Security Incidents

Iwakiri, Munetoshi

q A Standard MIDI File Steganography Based on Fluctuation of Duration

q Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument

Izu, Tetsuya

q Yet Another Sanitizable Signature from Bilinear Maps

Papers by Author

Izumi, Masami

q A New Approach for Implementing the MPL Method toward Higher SPA Resistance

Jaatun, Martin Gilje

q Reusable Security Requirements for Healthcare Applications

Jafari-lafti, Maryam

q P2F: A User-Centric Privacy Protection Framework

Jamzad, M.

q A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising

q A New Watermarking Attack Using Long-Range CorrelationImage Restoration

Papers by Author

Jamzad, Mansour

q A Robust Image Watermarking Method in Wavelet DomainUsing Genetic Algorithm

Jawurek, Marek

q Software Inspections Using Guided Checklists to EnsureSecurity Goals

Jensen, Jostein

q Reusable Security Requirements for Healthcare Applications

q An Architectural Foundation for Security Model Sharing and Reuse

Papers by Author

Jensen, Meiko

q The Accountability Problem of Flooding Attacks in Service-Oriented Architectures

Jiang, Xuxian

q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring

Jiménez, Javier

q Utility and Risk of JPEG-Based Continuous Microdata ProtectionMethods

Jing, Jing

q An Authentication Watermark Algorithm for JPEG images

Papers by Author

Jonker, Hugo

q Measuring Voter-Controlled Privacy

Joosen, Wouter

q Identifying and Resolving Least Privilege Violations in SoftwareArchitectures

q Risk-Driven Architectural Decomposition

q Protecting Global and Static Variables from Buffer OverflowAttacks

q Linking Privacy Solutions to Developer Goals

Jørstad, Ivar

q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMS

Papers by Author

Juntapremjitt, Sekpon

q A-COLD: Access Control of Web OLAP over Multi-dataWarehouse

Kafi, Mohaned

q Deconvolving Protected Signals

Kajava, Jorma

q Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments

Kakizaki, Yoshio

q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information

Papers by Author

Kalici, Daniel

q The Case for a Simpler Security Model in Grid Computing

Kanso, A.

q Generating AMF Configurations from Software VendorConstraints and User Requirements

Karppinen, Kaarina

q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle

Katsuno, Yasuharu

q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions

Papers by Author

Keromytis, Angelos D.

q Capturing Information Flow with Concatenated Dynamic TaintAnalysis

Khan, Raees Ahmad

q An Efficient Measurement of Object Oriented DesignVulnerability

Khendek, F.

q Generating AMF Configurations from Software VendorConstraints and User Requirements

Kikuchi, Hiroaki

q Privacy-Preserving Collaborative Filtering Schemes

Papers by Author

Kim, Hyung Chan

q Capturing Information Flow with Concatenated Dynamic TaintAnalysis

Kizawa, Hiroyasu

q Privacy-Preserving Collaborative Filtering Schemes

Klaus, Alexander

q Software Inspections Using Guided Checklists to EnsureSecurity Goals

Kolter, Jan

q Generating User-Understandable Privacy Preferences

Papers by Author

Kong, Xiangwei

q Detecting Image Tampering Using Feature Fusion

Kothapalli, Kishore

q Routing Protocol Security Using Symmetric Key BasedTechniques

q Reducing the Cost of Session Key Establishment

Krishna, K. Madhava

q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots

Papers by Author

Kudo, Michiharu

q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions

Kudou, Hiroshi

q A Reconfigurable-Permutation Algorithm for M_S-Box

Kunihiro, Noboru

q Yet Another Sanitizable Signature from Bilinear Maps

Kuo, Ying-wei

q Detecting Stepping-Stone Connection Using Association RuleMining

Papers by Author

Lai, Yen-Cheng

q An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications

Lardon, Jeremy

q The User-Centric Vision Matches Credentials Exchanges

Latif-Shabgahi, G.

q A New Approach for the Construction of Fault Trees from System Simulink

Le, Phu Dung

q Package-Role Based Authorization Control Model for WirelessNetwork Services

Papers by Author

Leangsuksun, Chokchai

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Lee, Jooyoung

q Improving Performance in Digital Forensics: A Case UsingPattern Matching Board

Leonard, Justin

q A First Step towards Characterizing Stealthy Botnets

q A Framework for Understanding Botnets

Li, Fagen

q Identity-Based Hybrid Signcryption

Papers by Author

Li, Jun

q A Policy Framework for Data Management in ServicesMarketplaces

Li, Zhitang

q Measuring Peer-to-Peer Botnets Using Control Flow Stability

Lin, Chia-Chen

q Enterprise-Oriented Digital Rights Management Mechanism:eDRM

Liu, Fenlin

q An Authentication Watermark Algorithm for JPEG images

Papers by Author

Liu, Jigang

q Computer Forensics in Japan: A Preliminary Study

Lobato, Luanna Lopes

q Patterns to Support the Development of Privacy Policies

Lock, Russell

q Accuracy: The Fundamental Requirement for Voting Systems

Looi, Mark

q Towards Intrusion Detection for Encrypted Networks

Papers by Author

Lopes, Raul H.C.

q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation

LoPresti, Stephane

q Web Service Trust: Towards a Dynamic Assessment Framework

Ludescher, T.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Lundberg, Lars

q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?

Papers by Author

Ma, Ao

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Ma, Jie

q Measuring Peer-to-Peer Botnets Using Control Flow Stability

Macêdo, Raimundo José de Araújo

q Perfect Failure Detection in the Partitioned SynchronousDistributed System Model

Majorczyk, Frédéric

q Automated Instruction-Set Randomization for WebApplications in Diversified Redundant Systems

Papers by Author

Maña, Antonio

q SecMiLiA: An Approach in the Agent Protection

q AVISPA in the Validation of Ambient Intelligence Scenarios

Manoochehri, Mehrtash

q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM Technologies

Manpanpanich, Piyawit

q A-COLD: Access Control of Web OLAP over Multi-dataWarehouse

Papers by Author

Mao, Bing

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability

q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel

Markantonakis, Konstantinos

q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems

Martucci, Leonardo A.

q Revealing the Calling History of SIP VoIP Systems by TimingAttacks

Papers by Author

Marvel, Lisa

q Using XACML for Embedded and Fine-Grained Access ControlPolicy

Masera, Marcelo

q Methodology for Experimental ICT Industrial and CriticalInfrastructure Security Tests

Masser, P.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Masser, Philip

q Retaining Data Control to the Client in Infrastructure Clouds

Papers by Author

Matone, Sergio

q Managing Rights and Value of Digital Media

Mauw, Sjouke

q Measuring Voter-Controlled Privacy

Mayes, Keith

q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems

Meinel, Christoph

q Security Requirements Specification in Service-OrientedBusiness Process Management

Papers by Author

Meland, Per Håkon

q Reusable Security Requirements for Healthcare Applications

q An Architectural Foundation for Security Model Sharing and Reuse

Mellado, Daniel

q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering

Memon, Nasrullah

q Novel Algorithms for Subgroup Detection in Terrorist Networks

Papers by Author

Meng, Xiaoxuan

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Menzel, Michael

q Security Requirements Specification in Service-OrientedBusiness Process Management

Meyer, Joachim

q An Experimental System for Studying the Tradeoff between Usability and Security

Miremadi, Seyed Ghassem

q A Micro-FT-UART for Safety-Critical SoC-Based Applications

Papers by Author

q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM Technologies

q A High Speed and Low Cost Error Correction Technique for the Carry Select Adder

Miyaji, Atsuko

q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics

q A Certificate Revocable Anonymous Authentication Schemewith Designated Verifier

Mödersheim, Sebastian

q Algebraic Properties in Alice and Bob Notation

Papers by Author

Moebius, Nina

q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications

Möller, Sebastian

q An Experimental System for Studying the Tradeoff between Usability and Security

Morimoto, Shoichi

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

Mu, Chunyan

q Quantitative Analysis of Secure Information Flow via Probabilistic Semantics

Papers by Author

Mulliner, Collin

q Vulnerability Analysis and Attacks on NFC-Enabled MobilePhones

Muñoz, Antonio

q SecMiLiA: An Approach in the Agent Protection

q AVISPA in the Validation of Ambient Intelligence Scenarios

Na, Wenwu

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Nagase, Tomoyuki

q A Reconfigurable-Permutation Algorithm for M_S-Box

Papers by Author

Nakayama, Shunn-ichiro

q A Reconfigurable-Permutation Algorithm for M_S-Box

Naksinehaboon, Nichamon

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Namazi, Alireza

q A High Speed and Low Cost Error Correction Technique for the Carry Select Adder

Nance, Kara

q Standards-Based Cyber Exercises

q Investigating the Implications of Virtual Machine Introspectionfor Digital Forensics

Papers by Author

Nerbråten, Øyvind

q hACMEgame: A Tool for Teaching Software Security

Ngo, Huy Hoang

q Package-Role Based Authorization Control Model for WirelessNetwork Services

Nishi, Ryuzou

q Secrecy Capacity of Wireless LAN

Nishigaki, Masakatsu

q Making Use of Human Visual Capability to Improve InformationSecurity

Papers by Author

Nunes, Francisco José Barreto

q A Knowledge Management Approach to Support a SecureSoftware Development

Ohta, Kazuo

q A New Approach for Implementing the MPL Method toward Higher SPA Resistance

q Yet Another Sanitizable Signature from Bilinear Maps

Okamoto, Eiji

q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions

Papers by Author

Okamura, Hiroyuki

q Security Evaluation of an Intrusion Tolerant System with MRSPNs

Omote, Kazumasa

q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics

q A Certificate Revocable Anonymous Authentication Schemewith Designated Verifier

Orellana, Frederik

q The Case for a Simpler Security Model in Grid Computing

Papers by Author

Osborne, Grant

q Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation

Ostrouchov, George

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Panfil, Szymon

q A System of Privacy Preserving Distributed Spatial DataWarehouse Using Relation Decomposition

Pang, Jun

q Measuring Voter-Controlled Privacy

Papers by Author

Paradiso, Vito

q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational Databases

Parrend, Pierre

q Enhancing Automated Detection of Vulnerabilities in JavaComponents

Pasquet, Marc

q Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element

Patrick, Gregory

q Using XACML for Embedded and Fine-Grained Access ControlPolicy

Papers by Author

Pentikäinen, Heimo

q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle

Pernul, G.

q Different Approaches to In-House Identity Management -Justification of an Assumption

Pernul, Günther

q Generating User-Understandable Privacy Preferences

Petersen, Kai

q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?

Papers by Author

Petit, Michaël

q Building a Responsibility Model Including Accountability,Capability and Commitment

Piattini, Mario

q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering

q Including Security Rules Support in an MDA Approach for Secure DWs

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs

Papers by Author

Piessens, Frank

q Protecting Global and Static Variables from Buffer OverflowAttacks

Poornima, M.

q Routing Protocol Security Using Symmetric Key BasedTechniques

Poulopoulos, George

q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems

Pretschner, Alexander

q Formal Analyses of Usage Control Policies

Papers by Author

Pronstad, Thomas

q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach

Qureshi, Abdul Rasool

q Novel Algorithms for Subgroup Detection in Terrorist Networks

Rass, Stefan

q Security in Quantum Networks as an Optimization Problem

Razmkhah, Mohammad-Hamed

q A Micro-FT-UART for Safety-Critical SoC-Based Applications

Papers by Author

Reif, Matthias

q Server-Side Prediction of Source IP Addresses Using DensityEstimation

Reif, Wolfgang

q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications

Ren, Yizhi

q Security Analysis for P2P Routing Protocols

Rhee, Junghwan

q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring

Papers by Author

Rikula, Pauli

q Finding Preimages of Multiple Passwords Secured with VSH

Riley, Ryan

q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring

Rios, Erkuden

q An Architectural Foundation for Security Model Sharing and Reuse

Rodríguez, Jesus

q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering

Papers by Author

Rohani, Alireza

q An Analysis of Fault Effects and Propagations in AVRMicrocontroller ATmega103(L)

Röning, Juha

q Finding Preimages of Multiple Passwords Secured with VSH

Røstad, Lillian

q hACMEgame: A Tool for Teaching Software Security

q Patient-Administered Access Control: A Usability Study

Rüesch, Judith

q Formal Analyses of Usage Control Policies

Papers by Author

Sahita, Ravi

q Capturing Information Flow with Concatenated Dynamic TaintAnalysis

Sakiyama, Kazuo

q A New Approach for Implementing the MPL Method toward Higher SPA Resistance

Sakurai, Kouichi

q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management Guide

q A Signature Scheme Associated with Universal Re-signcryption

q Security Analysis for P2P Routing Protocols

q Secrecy Capacity of Wireless LAN

Papers by Author

q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets

Sanchez, Txus

q An Architectural Foundation for Security Model Sharing and Reuse

Sandhu, Ravi

q A First Step towards Characterizing Stealthy Botnets

q A Framework for Understanding Botnets

Sang, Sinawong

q State of Cybersecurity and the Roadmap to Secure CyberCommunity in Cambodia

Papers by Author

Sano, Makoto

q Yet Another Sanitizable Signature from Bilinear Maps

Saran, Nurdan

q Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack

Scandariato, Riccardo

q Risk-Driven Architectural Decomposition

q Linking Privacy Solutions to Developer Goals

Schaefer, Christian

q Formal Analyses of Usage Control Policies

Papers by Author

Schartner, Peter

q Security in Quantum Networks as an Optimization Problem

Schmidt, Jörn-Marc

q On the Security of Untrusted Memory

Schneider, Christian

q Enhancing Control of Service Compositions in Service-OrientedArchitectures

Schwenk, Jörg

q The Accountability Problem of Flooding Attacks in Service-Oriented Architectures

Papers by Author

Scott, Stephen L.

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Selim, Mohammad Reza

q An Improvement of REM: A Replication Oriented Event-BasedMiddleware

Serrano, Daniel

q SecMiLiA: An Approach in the Agent Protection

q AVISPA in the Validation of Ambient Intelligence Scenarios

Shahmehri, Nahid

q Prioritisation and Selection of Software Security Activities

Papers by Author

q An Architectural Foundation for Security Model Sharing and Reuse

q A Post-Mortem Incident Modeling Method

Shi, Xiaowei

q An Authentication Watermark Algorithm for JPEG images

Shirase, Masaaki

q Identity-Based Hybrid Signcryption

Shore, Malcolm

q Advanced Flooding Attack on a SIP Server

Simms, David John

q Information Security Optimization: From Theory to Practice

Papers by Author

Simon, Matthew

q Enhancement of Forensic Computing Investigations through Memory Forensic Techniques

Singhal, Sharad

q A Policy Framework for Data Management in ServicesMarketplaces

Slay, Jill

q Enhancement of Forensic Computing Investigations through Memory Forensic Techniques

Søttrup, Christian Ulrik

q The Case for a Simpler Security Model in Grid Computing

Papers by Author

Sowa, Sebastian

q Multidimensional Management of Information Security – AMetrics Based Approach Merging Business and InformationSecurity Topics

Spanoudakis, George

q Web Service Trust: Towards a Dynamic Assessment Framework

Srinathan, Kannan

q On Privacy Preserving Convex Hull

q Generalized Robust Combiners for Oblivious Transfer

q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots

Papers by Author

Stahl, Armin

q Server-Side Prediction of Source IP Addresses Using DensityEstimation

Starnberger, Guenther

q QR-TAN: Secure Mobile Transaction Authentication

Stenzel, Kurt

q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications

Stephenson, Bryan

q A Policy Framework for Data Management in ServicesMarketplaces

Papers by Author

Storer, Tim

q Accuracy: The Fundamental Requirement for Voting Systems

Stumpf, Frederic

q Enhancing Control of Service Compositions in Service-OrientedArchitectures

Syalim, Amril

q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management Guide

Tada, Minako

q Privacy-Preserving Collaborative Filtering Schemes

Papers by Author

Taerat, Narate

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Taherinia, A.H.

q A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising

q A New Watermarking Attack Using Long-Range CorrelationImage Restoration

Tajarrod, F.

q A New Approach for the Construction of Fault Trees from System Simulink

Takagi, Tsuyoshi

q Identity-Based Hybrid Signcryption

Papers by Author

Takenaka, Masahiko

q Yet Another Sanitizable Signature from Bilinear Maps

Talbi, Mehdi

q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting Protocols

Tashi, Igli

q Regulatory Compliance and Information Security Assurance

q A Security Management Assurance Model to Holistically Assessthe Information Security Posture

Tatara, Kohei

q A Signature Scheme Associated with Universal Re-signcryption

Papers by Author

q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets

Taylor, Robert

q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime Data

Thomas, Ivonne

q Security Requirements Specification in Service-OrientedBusiness Process Management

Tillich, Stefan

q On the Security of Untrusted Memory

Tjoa, A. Min

q Retaining Data Control to the Client in Infrastructure Clouds

Papers by Author

Tjoa, A.M.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Toeroe, M.

q Generating AMF Configurations from Software VendorConstraints and User Requirements

Tøndel, Inger Anne

q Reusable Security Requirements for Healthcare Applications

q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach

q An Architectural Foundation for Security Model Sharing and Reuse

Papers by Author

Tong, Valérie Viet Triem

q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting Protocols

Torra, Vicenç

q Rank Swapping for Partial Orders and Continuous Variables

q Utility and Risk of JPEG-Based Continuous Microdata ProtectionMethods

q Generation of Prototypes for Masking Sequences of Events

Trujillo, Juan

q Including Security Rules Support in an MDA Approach for Secure DWs

Papers by Author

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs

Tseng, Yuh-Min

q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear Pairings

Tsuji, Hidekazu

q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information

Tu, Hao

q Measuring Peer-to-Peer Botnets Using Control Flow Stability

Papers by Author

Turnbull, Benjamin

q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime Data

q Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation

Uehara, Tetsutaro

q Computer Forensics in Japan: A Preliminary Study

Umadevi, Ganugula

q Generalized Robust Combiners for Oblivious Transfer

Papers by Author

Un, Sungkyung

q Improving Performance in Digital Forensics: A Case UsingPattern Matching Board

Uusitalo, Ilkka

q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle

Valls, Aida

q Generation of Prototypes for Masking Sequences of Events

van Eck, Pascal

q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation

Papers by Author

Visaggio, Corrado Aaron

q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational Databases

Wäänänen, Anders

q The Case for a Simpler Security Model in Grid Computing

Walter, Thomas

q Formal Analyses of Usage Control Policies

Wang, Binbin

q Measuring Peer-to-Peer Botnets Using Control Flow Stability

Papers by Author

Wang, Yi

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability

q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel

Washizaki, Hironori

q Modeling Misuse Patterns

Watanabe, Atsushi

q A Reconfigurable-Permutation Algorithm for M_S-Box

Papers by Author

Watanabe, Yuji

q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions

Welzer, Tatjana

q An Improved Authentication Protocol Based on One-Way HashFunctions and Diffie-Hellman Key Exchange

Wenzel, B.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Westerlund, Vegar

q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach

Papers by Author

Wienhofen, Leendert

q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach

Wieringa, Roel

q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation

Wiil, Uffe Kock

q Novel Algorithms for Subgroup Detection in Terrorist Networks

Wilson, Campbell

q Package-Role Based Authorization Control Model for WirelessNetwork Services

Papers by Author

Win, Bart De

q Identifying and Resolving Least Privilege Violations in SoftwareArchitectures

Woehrer, A.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Wu, Jui-Di

q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear Pairings

Wu, Shih-Chi

q Enterprise-Oriented Digital Rights Management Mechanism:eDRM

Papers by Author

Wu, Tsu-Yang

q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear Pairings

Wu, Xianping

q Package-Role Based Authorization Control Model for WirelessNetwork Services

Wuyts, Kim

q Linking Privacy Solutions to Developer Goals

Xiao, Xiao

q On Equilibrium Distribution Properties in Software ReliabilityModeling

Papers by Author

Xie, Li

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability

q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel

Xin, Zhi

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability

Xu, Cheng-Zhong

q Proactive Resource Management for Failure Resilient HighPerformance Computing Clusters

Papers by Author

Xu, Dongyan

q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring

Xu, Lu

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Xu, Shouhuai

q A First Step towards Characterizing Stealthy Botnets

q A Framework for Understanding Botnets

Papers by Author

Yajima, Kenichi

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

Yamamoto, Kotaro

q A Standard MIDI File Steganography Based on Fluctuation of Duration

q Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument

Yamamoto, Takumi

q Making Use of Human Visual Capability to Improve InformationSecurity

Papers by Author

Yee, George O.M.

q An Automatic Privacy Policy Agreement Checker for E-services

Yin, Yang

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Yoshida, Yoshiaki

q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information

Yoshioka, Nobukazu

q Modeling Misuse Patterns

Papers by Author

Yoshioka, Yoshio

q A Reconfigurable-Permutation Algorithm for M_S-Box

Younan, Yves

q Protecting Global and Static Variables from Buffer OverflowAttacks

Zarandi, Hamid. R.

q An Analysis of Fault Effects and Propagations in AVRMicrocontroller ATmega103(L)

Zhang, Ge

q Revealing the Calling History of SIP VoIP Systems by TimingAttacks

Papers by Author

Zhang, Pin

q Detecting Image Tampering Using Feature Fusion

Zimmermann, Jacob

q Towards Intrusion Detection for Encrypted Networks

Zorzo, Sergio Donizetti

q Patterns to Support the Development of Privacy Policies

Papers by Author

A B C D E F G

H I J K L M N

O P Q R S T U

V W X Y Z