default search action
ARES 2006: Vienna, Austria
- Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria. IEEE Computer Society 2006, ISBN 0-7695-2567-9
Introduction
- Message from the Organizing Committee.
- ARES and Workshops Committees.
Invited Talks
- Louis Marinos:
Risk Management and Risk Assessment at ENISA: Issues and Challenges. 2-3 - David A. Basin:
Model Driven Security. 4
Session 1: Trust Management
- Ching Lin, Vijay Varadharajan:
Trust Based Risk Management for Distributed System Security - A New Approach. 6-13 - Rajarajan Sampath, Deepak Goel:
RATING: Rigorous Assessment of Trust in Identity Management. 14-23 - Kilho Shin, Hiroshi Yasuda:
Provably Secure Anonymous Access Control for Heterogeneous Trusts. 24-33
Session 2: P2P Systems
- Amy Beth Corman, Scott Douglas, Peter Schachte, Vanessa Teague:
A Secure Event Agreement (SEA) protocol for peer-to-peer games. 34-41 - Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido, S. Misbah Deen:
Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay Networks. 42-49 - Alexander Zangerl:
Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures. 50-57 - Regine Endsuleit, Thilo Mie:
Censorship-Resistant and Anonymous P2P Filesharing. 58-65
Session 3: Mobile Network and Pervasive Systems
- Sheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri:
A Dependable Device Discovery Approach for Pervasive Computing Middleware. 66-73 - Saber Zrelli, Yoichi Shinoda:
Single sign-on framework for AAA operations within commercial mobile networks. 74-81 - Junyang Zhou, Joseph Kee-Yin Ng:
A Selector Method for Providing Mobile Location Estimation Services within a Radio Cellular Network. 82-89 - Leon Grabensek, Sasa Divjak:
Guidelines for Biometric Recognition in Wireless System for Payment Confirmation. 90-99
Session 4: Protocol and Communication
- V. H. Gupta, K. Gopinath:
An Extended Verifiable Secret Redistribution Protocol for Archival Systems. 100-107 - Thomas Berger:
Analysis of Current VPN Technologies. 108-115 - Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie:
Integration of Quantum Cryptography in 802.11 Networks. 116-123 - Alban Gabillon, Laurent Gallon:
Availability Constraints for Avionic Data Buses. 124-131
Session 5: Security as Quality of Service
- Yih Huang, David Arsenault, Arun Sood:
Securing DNS Services through System Self Cleansing and Hardware Enhancements. 132-139 - George Yee:
Personalized Security for E-Services. 140-147 - Juan Vera del Campo, Josep Pegueroles, Miguel Soriano:
Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. 148-155 - Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog:
Towards a Stochastic Model for Integrated Security and Dependability Evaluation. 156-165
Session 6: Networking and Fault Tolerance
- Mourad Elhadef, Shantanu Das, Amiya Nayak:
A Novel Artificial-Immune-Based Approach for System-Level Fault Diagnosis. 166-173 - René Rydhof Hansen, Christian W. Probst, Flemming Nielson:
Sandboxing in myKlaim. 174-181 - Frank Yeong-Sung Lin, Po-Hao Tsang, C.-H. Chen, Chung-Lien Tseng, Y.-L. Lin:
Evaluation of Network Robustness for Given Defense Resource Allocation Strategies. 182-189 - Gang Yao, Dengguo Feng:
Proxy Oblivious Transfer Protocol. 190-197
Session 7: Identification and Authentication
- Feng Cao, Cullen Jennings:
Providing Response Identity and Authentication in IP Telephony. 198-205 - Judith E. Y. Rossebø, Rolv Bræk:
Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition. 206-215 - Maurizio Adriano Strangio:
An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol. 216-223 - Hugo Proença, Luís A. Alexandre:
A Method for the Identification of Inaccuracies in Pupil Segmentation. 224-228 - Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard:
Availability Enforcement by Obligations and Aspects Identification. 229-239
Session 8: High Availability and Dependability
- Remko W. Helms, S. Van Oorschot, J. Herweijer, M. Plas:
An integral IT continuity framework for undisrupted business operations. 240-244 - Christian Storm, Oliver E. Theel:
Highly Adaptable Dynamic Quorum Schemes for Managing Replicated Data. 245-253 - Pablo Neira Ayuso, Laurent Lefèvre, Rafael M. Gasca:
High Availability support for the design of stateful networking equipments. 254-261 - Jiong Zhang, Mohammad Zulkernine:
A Hybrid Network Intrusion Detection Technique Using Random Forests. 262-269 - Wei Wang, Roberto Battiti:
Identifying Intrusions in Computer Networks with Principal Component Analysis. 270-279
Session 9: Reliability and Availability
- Sozo Inoue, Hiroto Yasuura, Daisuke Hagiwara:
Systematic Error Detection for RFID Reliability. 280-286 - Cas Cremers:
Feasibility of Multi-Protocol Attacks. 287-294 - Michael Jarrett, Rudolph E. Seviora:
Diversity to Enhance Autonomic Computing Self-Protection. 295-299 - Javier Cano-Montero, David Ríos Insua:
Reliability Forecasting in Complex Hardware/Software Systems. 300-304 - Hertong Song, Chokchai Leangsuksun, Raja Nassar:
Availability Modeling and Analysis on High Performance Cluster Computing Systems. 305-313
Session 10: Security and Privacy Issue
- Man Lin, Laurence Tianruo Yang:
Schedulability Driven Security Optimization in Real-time Systems. 314-320 - George Yee, Larry Korba, Ronggong Song:
Ensuring Privacy for E-Health Services. 321-328 - Nevena Stolba, Marko Banek, A Min Tjoa:
The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. 329-339 - Melanie Volkamer, Robert Krimmer:
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols. 340-347 - Zhiqiang Lin, Bing Mao, Li Xie:
A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. 348-357
Session 11: Security Management
- David Garcia Rosado, Eduardo Fernández-Medina, Mario Piattini, Carlos Gutiérrez:
A Study of Security Architectural Patterns. 358-365 - Thomas Neubauer, Christian Stummer, Edgar R. Weippl:
Workshop-based Multiobjective Security Safeguard Selection. 366-373 - Klaus Plößl, Thomas Nowey, Christian Mletzko:
Towards a Security Architecture for Vehicular Ad Hoc Networks. 374-381 - Yohann Thomas, Hervé Debar, Benjamin Morin:
Improving Security Management through Passive Network Observation. 382-389 - Serge Abiteboul, Bogdan Cautis, Amos Fiat, Tova Milo:
Digital Signatures for Modifiable Collections. 390-399
Session 12: Distributed Systems
- Johannes Osrael, Lorenz Froihofer, Karl M. Göschka, Stefan Beyer, Pablo Galdámez, Francesc D. Muñoz-Escoí:
A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems. 400-407 - Stefan Beyer, Alexander Sánchez, Francesc D. Muñoz-Escoí, Pablo Galdámez:
DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems. 408-415 - Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti:
Defense trees for economic evaluation of security investments. 416-423 - Amir Hayat, Thomas Rössler, Muhammad Alam:
Proposed Framework for Achieving Interoperable Services Between European Public Administrations. 424-431 - Davrondzhon Gafurov, Kirsi Helkala, Torkjel Søndrol:
Gait Recognition Using Acceleration from MEMS. 432-439
Session 13: Software Security and Dependability
- Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao:
Making Web Services Dependable. 440-448 - Rasa Remenyte, John D. Andrews:
A Simple Component Connection Approach for Fault Tree Conversion to Binary Decision Diagram. 449-457 - Thomas Neubauer, Markus D. Klemen, Stefan Biffl:
Secure Business Process Management: A Roadmap. 457-464 - Torsten Priebe, Wolfgang Dobmeier, Nora Kamprath:
Supporting Attribute-based Access Control with Ontologies. 465-472 - Calin Ciufudean, Adrian Graur, Constantin Filote, Cornel Turcu, Valentin Popa:
Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets. 473-481
International Symposium on Frontiers in Availability, Reliability and Security (FARES)
Session 1: IP Network and Adhoc Network
- Marc Conrad, Tim French, Wei Huang, Carsten Maple:
A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter?. 482-487 - Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard Barolli:
Secure 3G User Authentication in Adhoc Serving Networks. 488-495 - Feng Cao, Saadat Malik:
Security Analysis for IP-based Government Emergency Telephony Service. 496-501 - Muhammad Sher, Thomas Magedanz, Walter T. Penzhorn:
Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS). 502-509 - Hyangjin Lee, Jeeyeon Kim:
Privacy threats and issues in mobile RFID. 510-514
Session 2: Wireless and Sensor Network
- Dong Seong Kim, Khaja Mohammad Shazzad, Jong Sou Park:
A Framework of Survivability Model for Wireless Sensor Network. 515-522 - Valer Bocan, Vladimir Cretu:
Mitigating Denial of Service Threats in GSM Networks. 523-528 - Amirhosein Taherkordi, Majid Alkaee Taleghan, Mohsen Sharifi:
Achieving Availability and Reliability in Wireless Sensor Networks Applications. 529-535 - Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang:
Secure Enhanced Wireless Transfer Protocol. 536-543
Session 3: Authentication and Authorization
- Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini:
Quality of Password Management Policy. 544-550 - Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji:
A Proposal of An Anonymous Authentication Method For Flat-rate Service. 551-557 - Mingchu Li, Hongyan Yao, Jianbo Ma:
Recovery Mechanism of Online Certification Chain in Grid Computing. 558-562
Session 4: Trust Management and Recovery
- Cristina Satizábal, Rafael Páez, Jordi Forné:
PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model. 563-570 - Mingchu Li, Hongyan Yao:
Recovery Mechanism of Cooperative Process Chain in Grid. 571-576 - Naoyuki Nagatou, Takuo Watanabe:
Run-Time Detection of Covert Channels. 577-584
Session 5: Secure Information System
- Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:
Practical Approach of a Secure Management System based on ISO/IEC 17799. 585-592 - Gerd Saurer, Alexander Schatten:
Testing Complex Business Process Solutions. 593-600 - Jingde Cheng, Junichi Miura:
Deontic Relevant Logic as the Logical Basis for Specifying, Verifying, and Reasoning about Information Security and Information Assurance. 601-608 - Zude Li, Guoqiang Zhan, Xiaojun Ye:
Resource Management Continuity With Constraint Inheritance Relation. 609-616
Session 6: Availability
- José Daniel García, Jesús Carretero, Javier Fernández, Félix García, David E. Singh, Alejandro Calderón:
On the Reliability of Web Clusters with Partial Replication of Contents. 617-624 - Syed M. Rizwan, K. P. Ramachandran:
Reliability Modeling Strategy of an Industrial System. 625-630 - Jingde Cheng:
Persistent Computing Systems as Continuously Available, Reliable, and Secure Systems. 631-638 - Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin (Ben) He:
Active/Active Replication for Highly Available HPC System Services. 639-645
Session 7: Software Security 1
- Erland Jonsson:
Towards an Integrated Conceptual Model of Security and Dependability. 646-653 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements. 654-661 - Walter Binder:
Secure and Reliable Java-Based Middleware - Challenges and Solutions. 662-669
Session 8: Software Security 2
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Security Requirement with a UML 2.0 Profile. 670-677 - Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo:
Representing levels of abstraction to facilitate the Secure Multidimensional Modeling. 678-684 - Muhammad Alam, Ruth Breu, Michael Hafner:
Modeling permissions in a (U/X)ML world. 685-692
Session 9: Safety and Security
- E. M. Kelly, Lisa M. Bartlett:
Application of the Digraph Method in System Fault Diagnostics. 693-700 - Kenji Saito, Eiichi Morino, Jun Murai:
No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies. 701-708
Session 10: E-commerce and E-Government
- Christian Schläger, Thomas Nowey, José A. Montenegro:
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. 709-716 - Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Achieving Fairness and Timeliness in a Previous Electronic Contract Signing Protocol. 717-722 - Thomas Neubauer, Edgar R. Weippl, Stefan Biffl:
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. 723-731
Workshop on Dependable and Sustainable Peer-to-Peer Systems (DAS-P2P 2006)
Session 1: Construction of Dependable Overlay Networks
- Barbara Emmert, Andreas Binzenhöfer:
Efficient Link Failure Detection and Localization using P2P-Overlay Networks. 732-739 - Matthew John Leslie, Jim Davies, Todd Huffman:
Replication Strategies for Reliable Decentralised Storage. 740-747
Session 2: Security
- Yuuki Takano, Naoki Isozaki, Yoichi Shinoda:
Multipath Key Exchange on P2P Networks. 748-755 - Jochen Dinger, Hannes Hartenstein:
Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration. 756-763
Session 3: Social Front
- Kenji Saito, Eiichi Morino, Jun Murai:
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems. 764-771 - Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Tomohiro Ishihara, Yojiro Uo:
Ecosystem of Naming Systems: Discussions on a Framework to Induce Smart Space Naming Systems Development. 772-778 - Hameeda Alshabib, Omer F. Rana, Ali Shaikh Ali:
Deriving Ratings Through Social Network Structures. 779-787
Workshop on Bayesian Networks in Dependability (BND2006)
- Christophe Simon, Philippe Weber:
Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability Uncertainty. 788-793 - Sam Maes, Philippe Leray:
Multi-Agent Causal Models for Dependability Analysis. 794-798 - Véronique Delcroix, Mohamed-Amine Maalej, Sylvain Piechowiak:
Computing Multiple Diagnoses in Large Devices Using Bayesian Networks. 799-803 - Stefania Montani, Luigi Portinale, Andrea Bobbio, Daniele Codetta Raiteri:
Automatically Translating Dynamic Fault Trees into Dynamic Bayesian Networks by Means of a Software Tool. 804-809 - Ashley Russell, John Quigley, Robert Van der Meer:
Modeling the Reliability of Search and Rescue Operations within the UK Through Bayesian Belief Networks. 810-816 - Martin Neil, Manesh Tailor, Norman E. Fenton, David Marquez, Peter Stewart Hearty:
Modeling Dependable Systems using Hybrid Bayesian Networks. 817-823
Workshop on Dependability in Large-scale Service-oriented Systems (DILSOS)
- Jaka Mocnik, Piotr Karwaczynski:
An Architecture for Service Discovery Based on Capability Matching. 824-831 - Alexander Böhm, Carl-Christian Kanne, Guido Moerkotte:
A Declarative Control Language for Dependable XML Message Queues. 832-839 - Raman Kazhamiakin, Paritosh K. Pandya, Marco Pistore:
Timed Modelling and Analysis in Web Service Compositions. 840-846 - Lukasz Juszczyk, Jaroslaw Lazowski, Schahram Dustdar:
Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks. 847-854 - António Luís Sousa, Alfrânio Correia Jr., Francisco Moura, José Pereira, Rui Oliveira:
Evaluating Certification Protocols in the Partial Database State Machine. 855-863
Workshop: Security in E-Learning (SEL)
- Jordi Castellà-Roca, Jordi Herrera-Joancomartí, Aleix Dorca-Josa:
A Secure E-Exam Management System. 864-871 - Elke Franz, Katrin Borcea-Pfitzmann:
Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects. 872-878 - Elke Franz, Hagen Wahrig, Alexander Böttcher, Katrin Borcea-Pfitzmann:
Access Control in a Privacy-Aware eLearning Environment. 879-886 - Carine G. Webber, Maria de Fátima Webber do Prado Lima, Marcos E. Casa, Alexandre M. Ribeiro:
Adding Security to a Multiagent Learning Platform. 887-894 - Marek Hatala, Ty Mey Eap, Ashok Shah:
Unlocking Repositories: Federated Security Solution for Attribute and Policy Based Access to Repositories via Web Services. 895-903
Workshop - Dependability Aspects on Data WArehousing and Mining Applications (DAWAM 2006)
- Vasilis Aggelis:
Offline Internet Banking Fraud Detection. 904-905 - (Withdrawn) Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. 906-913
- Emilio Soler, Rodolfo Villarroel, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel. 914-921 - Agusti Solanas, Antoni Martínez-Ballesté, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz:
A 2d-Tree-Based Blocking Method for Microaggregating Very Large Data Sets. 922-928 - Carsten Maple, Vitaly Schetinin:
Using A Bayesian Averaging Model for Estimating the Reliability of Decisions in Multimodal Biometrics. 929-935 - Marcin Gorawski, Karol Stachurski:
On Efficiency and Data Privacy Level of Association Rules Mining Algorithms within Parallel Spatial Data Warehouse. 936-943 - H. Michael Chung:
Dependability in Data Mining: A Perspective from the Cost of Making Decisions. 944-949
Workshop on Bioinformatics and Security (BIOS 06)
- Richard O. Sinnott, Micha Bayer, A. J. Stell, Jos Koetsier:
Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project. 950-957 - Carsten Maple, Peter Norrington:
The Usability and Practicality of Biometric Authentication in the Workplace. 958-964 - Christophe Blanchet, Rémi Mollon, Gilbert Deléage:
Building an Encrypted File System on the EGEE grid: Application to Protein Sequence Analysis. 965-973
Workshop: Information Security Risk Management (ISRM)
- Christer Magnusson, Heidi Ola, Camilla Silversjo Holmqvist:
The knowledge pressure on Risk and Security managers is increasing. 974-979 - Ruedi Baer, Martin Dietrich:
Validation of IT-Security Measurement Tools. 980-981 - Sabine Delaître:
Risk Management approach on identity theft in biometric systems context. 982
Workshop - Dependability and Security in e-Government (DeSeGov 2006)
- Jeremy W. Bryans, Bev Littlewood, Peter Y. A. Ryan, Lorenzo Strigini:
E-voting: Dependability Requirements and Design for Dependability. 988-995 - Omar Batarfi, Lindsay F. Marshall:
Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy. 996-1003 - Daniel Beer, Raphael Kunis, Gudula Rünger:
A Component Based Software Architecture for E-Government Applications. 1004-1011 - Akiko Orita:
Designing mutual-aid model for RAQ (Rarely Asked Question) in e-Government: Practical use of anonymity. 1012-1016 - Rob Peters, Pim Jorg, Marco Meesters, Marcel Hoogwout, Edwin Stuart:
Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address. 1017-1024 - Carsten Maple, Helen Jacobs, Matthew Reeve:
Choosing the Right Wireless LAN Security Protocol for the Home and Business User. 1025-1032 - Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas:
An ontology for secure e-government applications. 1033-1037 - Semir Daskapan:
Building governments in e-government: settlement of trusted e-oligarchy. 1038-1044
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.