default search action
ARES 2009: Fukoka, Japan
- Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan. IEEE Computer Society 2009, ISBN 978-1-4244-3572-2
Distributed Systems and Grid
- Yasuharu Katsuno, Yuji Watanabe, Michiharu Kudo, Eiji Okamoto:
A Pluggable Domain Management Approach for Building Practical Distributed Coalitions. 1-8 - Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa, David Huemer:
Retaining Data Control to the Client in Infrastructure Clouds. 9-16 - Mehran Ahsant, Jim Basney:
Workflows in Dynamic and Restricted Delegation. 17-24
SOA Security
- Meiko Jensen, Jörg Schwenk:
The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. 25-32 - George Spanoudakis, Stephane LoPresti:
Web Service Trust: Towards a Dynamic Assessment Framework. 33-40 - Michael Menzel, Ivonne Thomas, Christoph Meinel:
Security Requirements Specification in Service-Oriented Business Process Management. 41-48
Enterprise Security 1
- Chunyan Mu, David Clark:
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics. 49-57 - Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Deploying Security Policy in Intra and Inter Workflow Management Systems. 58-65 - Frank Innerhofer-Oberperfler, Ruth Breu:
An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents. 66-73
Intrusion and Fraud Detection
- Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang:
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. 74-81 - Markus Goldstein, Matthias Reif, Armin Stahl, Thomas M. Breuel:
Server-Side Prediction of Source IP Addresses Using Density Estimation. 82-89 - Ying-Wei Kuo, Shou-Hsuan Stephen Huang:
Detecting Stepping-Stone Connection Using Association Rule Mining. 90-97
Enterprise Security 2
- Alexander Pretschner, Judith Rüesch, Christian Schaefer, Thomas Walter:
Formal Analyses of Usage Control Policies. 98-105 - Justin Leonard, Shouhuai Xu, Ravi S. Sandhu:
A First Step towards Characterizing Stealthy Botnets. 106-113 - Jaafar Almasizadeh, Mohammad Abdollahi Azgomi:
Intrusion Process Modeling for Security Quantification. 114-121 - Ludwig Fuchs, Christian Broser, Günther Pernul:
Different Approaches to In-House Identity Management - Justification of an Assumption. 122-129
Digital Forensics and Security in Communication
- Ya-Fen Chang, Yen-Cheng Lai:
An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications. 130-134 - Ge Zhang, Simone Fischer-Hübner, Leonardo A. Martucci, Sven Ehlert:
Revealing the Calling History of SIP VoIP Systems by Timing Attacks. 135-142 - Benjamin P. Turnbull, Robert Taylor, Barry Blundell:
The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime Data. 143-149 - Amirhossein Taherinia, Mansour Jamzad:
A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising. 150-157
Availability and Reliability 1
- Xiao Xiao, Tadashi Dohi:
On Equilibrium Distribution Properties in Software Reliability Modeling. 158-165 - Alireza Rohani, Hamid R. Zarandi:
An Analysis of Fault Effects and Propagations in AVR Microcontroller ATmega103(L). 166-172 - Narate Taerat, Nichamon Naksinehaboon, Clayton Chandler, James Elliott, Chokchai Leangsuksun, George Ostrouchov, Stephen L. Scott, Christian Engelmann:
Blue Gene/L Log Analysis and Time to Interrupt Estimation. 173-180
Cryptography
- Masami Izumi, Kazuo Sakiyama, Kazuo Ohta:
A New Approach for Implementing the MPL Method toward Higher SPA Resistance. 181-186 - Sandeep Hans, Sarat C. Addepalli, Anuj Gupta, Kannan Srinathan:
On Privacy Preserving Convex Hull. 187-192 - Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poornima, M. Divya:
Routing Protocol Security Using Symmetric Key Based Techniques. 193-200
Software Security 1
- David Byers, Nahid Shahmehri:
Prioritisation and Selection of Software Security Activities. 201-207 - Ping Chen, Yi Wang, Zhi Xin, Bing Mao, Li Xie:
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. 208-215 - Pierre Parrend:
Enhancing Automated Detection of Vulnerabilities in Java Components. 216-223
Software Security 2
- Daniel Mellado, Jesús Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. 224-231 - Koen Buyens, Bart De Win, Wouter Joosen:
Identifying and Resolving Least Privilege Violations in Software Architectures. 232-239 - Gerardo Canfora, Corrado Aaron Visaggio, Vito Paradiso:
A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases. 240-247
Availability and Reliability 2
- Hiroshi Fujinoki:
Improving Reliability for Multi-home Inbound Traffic: MHLB/I Packet-Level Inter-domain Load-Balancing. 248-256 - Song Fu, Cheng-Zhong Xu:
Proactive Resource Management for Failure Resilient High Performance Computing Clusters. 257-264 - Mourad Elhadef:
A Perceptron Neural Network for Asymmetric Comparison-Based System-Level Fault Diagnosis. 265-272 - Raimundo José de Araújo Macêdo, Sérgio Gorender:
Perfect Failure Detection in the Partitioned Synchronous Distributed System Model. 273-280
Privacy and Trust
- Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula:
Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols. 281-288 - Hugo L. Jonker, Sjouke Mauw, Jun Pang:
Measuring Voter-Controlled Privacy. 289-298 - Jan Paul Kolter, Günther Pernul:
Generating User-Understandable Privacy Preferences. 299-306 - George O. M. Yee:
An Automatic Privacy Policy Agreement Checker for E-services. 307-315
Dependable Systems and Trusted Computing 1
- Mohammad-Hamed Razmkhah, Seyed Ghassem Miremadi, Alireza Ejlali:
A Micro-FT-UART for Safety-Critical SoC-Based Applications. 316-321 - Thomas Butter, Markus Aleksy:
MixVM - An Approach to Service Isolation and Data Protection in Mobile Context-Sensitive Applications. 322-328 - Jörn-Marc Schmidt, Stefan Tillich:
On the Security of Untrusted Memory. 329-334
Dependable Systems and Trusted Computing 2
- Pin Zhang, Xiangwei Kong:
Detecting Image Tampering Using Feature Fusion. 335-340 - Antonio Muñoz, Antonio Maña, Daniel Serrano:
SecMiLiA: An Approach in the Agent Protection. 341-348 - Yi Wang, Ping Chen, Yi Ge, Bing Mao, Li Xie:
Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. 349-354
Software Security
- Hyung Chan Kim, Angelos D. Keromytis, Michael Covington, Ravi Sahita:
Capturing Information Flow with Concatenated Dynamic Taint Analysis. 355-362 - Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Risk-Driven Architectural Decomposition. 363-368 - Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya:
Reducing the Cost of Session Key Establishment. 369-373
Privacy and Trust
- Tim Storer, Russell Lock:
Accuracy: The Fundamental Requirement for Voting Systems. 374-379 - Jostein Jensen, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, Herbjørn Andresen:
Reusable Security Requirements for Healthcare Applications. 380-385 - Maryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas:
P2F: A User-Centric Privacy Protection Framework. 386-391
Enterprise Security and Security Evaluation 1
- Wolfgang Boehmer:
Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001. 392-399 - Marcelo Masera, Igor Nai Fovino:
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. 400-405 - Omar Khadeer Hussain, Tharam S. Dillon:
Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method. 406-411
Enterprise Security and Security Evaluation 2
- Christophe Feltus, Michaël Petit:
Building a Responsibility Model Including Accountability, Capability and Commitment. 412-419 - Antonio Muñoz, Antonio Maña, Daniel Serrano:
AVISPA in the Validation of Ambient Intelligence Scenarios. 420-426 - Ryutaro Fujimoto, Hiroyuki Okamura, Tadashi Dohi:
Security Evaluation of an Intrusion Tolerant System with MRSPNs. 427-432 - Sebastian Mödersheim:
Algebraic Properties in Alice and Bob Notation. 433-440
Availability and Reliability
- Ao Ma, Yang Yin, Wenwu Na, Xiaoxuan Meng, Qingzhong Bu, Lu Xu:
Scrubbing in Storage Virtualization Platform for Long-Term Backup Application. 441-447 - Mehrtash Manoochehri, Alireza Ejlali, Seyed Ghassem Miremadi:
Fault Tolerant and Low Energy Write-Back Heterogeneous Set Associative Cache for DSM Technologies. 448-453 - Ali Kanso, Maria Toeroe, Abdelwahab Hamou-Lhadj, Ferhat Khendek:
Generating AMF Configurations from Software Vendor Constraints and User Requirements. 454-461
Authentication and Authorization
- George Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, Lisa M. Marvel:
Using XACML for Embedded and Fine-Grained Access Control Policy. 462-468 - Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt:
A-COLD: Access Control of Web OLAP over Multi-data Warehouse. 469-474 - Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson:
Package-Role Based Authorization Control Model for Wireless Network Services. 475-480 - Mehran Ahsant, Esteban Talavera Gonzalez, Jim Basney:
Security Credential Mapping in Grids. 481-486
Cryptography 1
- Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. 487-492 - Stefan Rass, Peter Schartner:
Security in Quantum Networks as an Optimization Problem. 493-498 - Kimmo Halunen, Pauli Rikula, Juha Röning:
Finding Preimages of Multiple Passwords Secured with VSH. 499-503
Cryptography 2
- Nurdan Buz Saran, Ali Doganaksoy:
Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack. 504-509 - Ganugula Umadevi, Sarat C. Addepalli, Kannan Srinathan:
Generalized Robust Combiners for Oblivious Transfer. 510-515
DAWAM 2009 - Security & Privacy Enhancement in DWHs
- Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Including Security Rules Support in an MDA Approach for Secure DWs. 516-521 - Marcin Gorawski, Szymon Panfil:
A System of Privacy Preserving Distributed Spatial Data Warehouse Using Relation Decomposition. 522-527 - Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. 528-533
DAWAM 2009 - Intrusion and Network Attack Prevention
- Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Identity-Based Hybrid Signcryption. 534-539 - Vik Tor Goh, Jacob Zimmermann, Mark Looi:
Towards Intrusion Detection for Encrypted Networks. 540-545 - Virginia N. L. Franqueira, Pascal van Eck, Roel J. Wieringa, Raul H. C. Lopes:
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation. 546-553
DAWAM 2009 - Dependability, Failure Analysis & Detection
- Toshiya Fujii, Tadashi Dohi:
Statistical Failure Analysis of a Web Server System. 554-559 - Jun Li, Bryan Stephenson, Sharad Singhal:
A Policy Framework for Data Management in Services Marketplaces. 560-565 - Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki:
Modeling Misuse Patterns. 566-571 - (Withdrawn) Novel Algorithms for Subgroup Detection in Terrorist Networks. 572-577
FARES 2009 - Authentication and Authorization
- Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka:
QR-TAN: Secure Mobile Transaction Authentication. 578-583 - Xiaowei Shi, Fenlin Liu, Daofu Gong, Jing Jing:
An Authentication Watermark Algorithm for JPEG images. 584-588 - Amirhossein Taherinia, Mehran Fotouhi, Mansour Jamzad:
A New Watermarking Attack Using Long-Range Correlation Image Restoration. 589-594
FARES 2009 - Security in Distributed Systems
- Frederik Orellana, Christian Ulrik Søttrup, Anders Wäänänen, Daniel Kalici, Michael Grønager:
The Case for a Simpler Security Model in Grid Computing. 595-599 - Sarat C. Addepalli, Piyush Bansal, Kannan Srinathan, K. Madhava Krishna:
Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots. 600-605 - Marco Descher, Thomas Feilhauer, Thomas Ludescher, Philip Masser, B. Wenzel, Peter Brezany, Ibrahim Elsayed, Alexander Wöhrer, A Min Tjoa, David Huemer:
Position Paper: Secure Infrastructure for Scientific Data Life Cycle Management. 606-611
FARES 2009 - Software Security and Digital Forensics
- S. Hamid Amiri, Mansour Jamzad:
A Robust Image Watermarking Method in Wavelet Domain Using Genetic Algorithm. 612-617 - Alka Agrawal, Shalini Chandra, Raees Ahmad Khan:
An Efficient Measurement of Object Oriented Design Vulnerability. 618-623 - Kenichi Yajima, Shoichi Morimoto, Daisuke Horie, Noor Sheila Azreen, Yuichi Goto, Jingde Cheng:
FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408. 624-629
FARES 2009 - Dependability Aspects
- Bagher Rahimpour Cami, Mohammad Reza Matash Brujerdi:
Using Hybrid Trust Model for Handling Inaccurate Resource. 630-634 - Alireza Namazi, Seyed Ghassem Miremadi, Alireza Ejlali:
A High Speed and Low Cost Error Correction Technique for the Carry Select Adder. 635-640 - Youcheng Chen, Mohammad Reza Selim, Yuichi Goto, Jingde Cheng:
An Improvement of REM: A Replication Oriented Event-Based Middleware. 641-646
GloSec 2009
- Xianglin Deng, Malcolm Shore:
Advanced Flooding Attack on a SIP Server. 647-651 - Sopheak Cheang, Sinawong Sang:
State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia. 652-657 - Solange Ghernaouti-Helie:
An Inclusive Information Society Needs a Global Approach of Information Security. 658-662 - Binbin Wang, Zhitang Li, Hao Tu, Jie Ma:
Measuring Peer-to-Peer Botnets Using Control Flow Stability. 663-669 - Igli Tashi:
Regulatory Compliance and Information Security Assurance. 670-674 - David John Simms:
Information Security Optimization: From Theory to Practice. 675-680
IWSS 2009 - Security in Ad Hoc and Mesh Networks
- Vegar Westerlund, Thomas Pronstad, Inger Anne Tøndel, Leendert W. M. Wienhofen:
Trusting User Defined Context in MANETs: Experience from the MIDAS Approach. 681-686 - Mohaned Kafi, Sylvain Guilley, Sandra Marcello, David Naccache:
Deconvolving Protected Signals. 687-694
IWSS 2009 - Security in Contactless Systems
- Collin Mulliner:
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones. 695-700 - Vincent Alimi, Marc Pasquet:
Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element. 701-705 - George Poulopoulos, Konstantinos Markantonakis, Keith Mayes:
A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems. 706-711
OSA 2009 - Risk Management
- Gholamreza Latif Shabgahi, F. Tajarrod:
A New Approach for the Construction of Fault Trees from System Simulink. 712-717 - Siv Hilde Houmb, Virginia N. L. Franqueira:
Estimating ToE Risk Level Using CVSS. 718-725 - Amril Syalim, Yoshiaki Hori, Kouichi Sakurai:
Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. 726-731
OSA 2009 - Security Management and Education
- Juhani Anttila, Jorma Kajava:
Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments. 732-737 - Ronald C. Dodge, Brian Hay, Kara L. Nance:
Standards-Based Cyber Exercises. 738-743 - Luanna Lopes Lobato, Eduardo B. Fernández, Sérgio Donizetti Zorzo:
Patterns to Support the Development of Privacy Policies. 744-749
OSA 2009 - Security Mangement
- Sebastian Sowa, Roland Gabriel:
Multidimensional Management of Information Security - A Metrics Based Approach Merging Business and Information Security Topics. 750-755 - Igli Tashi, Solange Ghernaouti-Helie:
A Security Management Assurance Model to Holistically Assess the Information Security Posture. 756-761 - Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau, André Adelsbach, Marc Camy:
Methodology to Align Business and IT Policies: Use Case from an IT Company. 762-767
RIBC 2009 - Authentication, Watermarking and Steganography
- Claude Carlet:
On the Higher Order Nonlinearities of Boolean Functions and S-boxes. 768 - Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. 769-773 - Kotaro Yamamoto, Munetoshi Iwakiri:
A Standard MIDI File Steganography Based on Fluctuation of Duration. 774-779 - Kohei Tatara, Kouichi Sakurai:
A Signature Scheme Associated with Universal Re-signcryption. 780-785
RIBC 2009 - Authentication, Watermarking and Cryptosystems
- Kotaro Yamamoto, Munetoshi Iwakiri:
Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument. 786-791 - Hiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, Yoshio Yoshioka:
A Reconfigurable-Permutation Algorithm for M_S-Box. 792-797
SecSE 2009 - Education and Other Vulnerabilities
- Yves Younan, Frank Piessens, Wouter Joosen:
Protecting Global and Static Variables from Buffer Overflow Attacks. 798-803 - Dejan Baca, Kai Petersen, Bengt Carlsson, Lars Lundberg:
Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter? 804-810 - Øyvind Nerbråten, Lillian Røstad:
hACMEgame: A Tool for Teaching Software Security. 811-816
SecSE 2009 - Secure Software-Development Lifecycles and Reuse
- Ilkka Uusitalo, Kaarina Karppinen, Pasi Ahonen, Heimo Pentikäinen:
Towards Evaluation of Security Assurance during the Software Development Lifecycle. 817-822 - Per Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri, Inger Anne Tøndel:
An Architectural Foundation for Security Model Sharing and Reuse. 823-828 - Francisco José Barreto Nunes, Arnaldo Dias Belchior, Adriano Bessa Albuquerque:
A Knowledge Management Approach to Support a Secure Software Development. 829-834
SecSE 2009 - Model-Driven Development and Checklists
- Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi:
A Practical Framework for the Dataflow Pointcut in AspectJ. 835-840 - Nina Moebius, Kurt Stenzel, Holger Grandy, Wolfgang Reif:
SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. 841-846 - Kim Wuyts, Riccardo Scandariato, Bart De Decker, Wouter Joosen:
Linking Privacy Solutions to Developer Goals. 847-852 - Frank Elberzhager, Alexander Klaus, Marek Jawurek:
Software Inspections Using Guided Checklists to Ensure Security Goals. 853-858
SecUSAB 2009
- Filippo Chiariglione, Giacomo Cosenza, Sergio Matone:
Managing Rights and Value of Digital Media. 859-864 - Charlott Eliasson, Markus Fiedler, Ivar Jørstad:
A Criteria-Based Evaluation Framework for Authentication Schemes in IMS. 865-869 - Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon:
The User-Centric Vision Matches Credentials Exchanges. 870-876 - Lillian Røstad, Ole Andreas Alsos:
Patient-Administered Access Control: A Usability Study. 877-881 - Noam Ben-Asher, Joachim Meyer, Sebastian Möller, Roman Englert:
An Experimental System for Studying the Tradeoff between Usability and Security. 882-887
WAIS 2009 - Security Analysis
- Vicenç Torra:
Rank Swapping for Partial Orders and Continuous Variables. 888-893 - Marko Hölbl, Tatjana Welzer:
An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange. 894-898 - Tatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Security Analysis for P2P Routing Protocols. 899-904
WAIS 2009 - Network Security
- Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai:
Secrecy Capacity of Wireless LAN. 905-910 - Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada:
Privacy-Preserving Collaborative Filtering Schemes. 911-916 - Justin Leonard, Shouhuai Xu, Ravi S. Sandhu:
A Framework for Understanding Botnets. 917-922
WAIS 2009 - Signature and Protection
- Chia-Chen Lin, Shih-Chi Wu, Po-Hsuan Chiang, Chang-Chi Chen:
Enterprise-Oriented Digital Rights Management Mechanism: eDRM. 923-928 - Javier Jiménez, Vicenç Torra:
Utility and Risk of JPEG-Based Continuous Microdata Protection Methods. 929-934 - Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu:
Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings. 935-940 - Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka:
Yet Another Sanitizable Signature from Bilinear Maps. 941-946
WAIS 2009 - Secure Systems
- Aïda Valls, Cristina Gómez-Alonso, Vicenç Torra:
Generation of Prototypes for Masking Sequences of Events. 947-952 - Christian A. Schneider, Frederic Stumpf, Claudia Eckert:
Enhancing Control of Service Compositions in Service-Oriented Architectures. 953-959 - Chun-I Fan, Ming-Te Chen, Lung-Hsien Chen:
Truly Anonymous Paper Submission and Review Scheme. 960-965 - Genta Iha, Hiroshi Doi:
An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers. 966-971
WAIS 2009 - Information Security
- Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai:
Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. 972-977 - Frédéric Majorczyk, Jonathan-Christofer Demay:
Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems. 978-983 - Yoshio Kakizaki, Yoshiaki Yoshida, Hidekazu Tsuji:
An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information. 984-989 - Masakatsu Nishigaki, Takumi Yamamoto:
Making Use of Human Visual Capability to Improve Information Security. 990-994
WSDF 2009 - Digital Forensics
- Matthew Simon, Jill Slay:
Enhancement of Forensic Computing Investigations through Memory Forensic Techniques. 995-1000 - Jooyoung Lee, Sungkyung Un, Dowon Hong:
Improving Performance in Digital Forensics: A Case Using Pattern Matching Board. 1001-1005 - Jigang Liu, Tetsutaro Uehara:
Computer Forensics in Japan: A Preliminary Study. 1006-1011 - Grant Osborne, Benjamin P. Turnbull:
Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. 1012-1017 - Shanai Ardi, Nahid Shahmehri:
A Post-Mortem Incident Modeling Method. 1018-1023 - Kara L. Nance, Brian Hay, Matt Bishop:
Investigating the Implications of Virtual Machine Introspection for Digital Forensics. 1024-1029
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.