default search action
3rd SECURWARE 2009: Athens/Vouliagmeni, Greece
- Rainer Falk, Wilson Goudalo, Eric Y. Chen, Reijo Savola, Manuela Popescu:
The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. IEEE Computer Society 2009, ISBN 978-0-7695-3668-2
ARCH I
- Aleksander Dikanski, Christian Emig, Sebastian Abeck:
Integration of a Security Product in Service-Oriented Architecture. 1-7 - Ángel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube, Alessandro Sorniotti:
A Security Pattern for Untraceable Secret Handshakes. 8-14 - Matti Mantere, Ilkka Uusitalo, Juha Röning:
Comparison of Static Code Analysis Tools. 15-22 - Kamil Reddy, Hein S. Venter:
Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model. 23-30
ARCH II
- Alireza Sadighian, Rasool Jalili:
AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems. 31-36 - Catalin V. Bîrjoveanu:
Secrecy for Bounded Security Protocols without Freshness Check. 37-41 - Mauro Migliardi, Valentina Resaz:
Distributed Intrusion Detection: Simulation and Evaluation of Two Methodologies. 42-48 - Rüdiger Grimm:
A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs. 49-56
ARCH III
- Gh. Rasool Begh, Ajaz Hussain Mir:
Quantification of the Effect of Security on Performance in Wireless LANs. 57-62 - Christian Seifert, Peter Komisarczuk, Ian Welch:
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. 63-69 - Mario Ibáñez, Natividad Martínez Madrid, Ralf Seepold:
Security Management with Virtual Gateway Platforms. 70-75 - Igor Podebrad, Klaus Hildebrandt, Bernd Klauer:
List of Criteria for a Secure Computer Architecture. 76-80
ARCH IV
- Benjamin Aziz, Geoff W. Hamilton:
Detecting Man-in-the-Middle Attacks by Precise Timing. 81-86 - Vicente Hernández, Lourdes López-Santidrián, Oscar Prieto, José-Fernán Martínez, Ana Belén García, Antonio da Silva:
Security Framework for DPWS Compliant Devices. 87-92 - Mucahit Mutlugun, Ibrahim Sogukpinar:
Multi-level Authentication Scheme Utilizing Smart Cards and Biometrics. 93-98 - Khaled Gaaloul, Philip Miseldine, François Charoy:
Towards Proactive Policies Supporting Event-Based Task Delegation. 99-104
ARCH V
- Wilson Goudalo, Dominique Seret:
The Process of Engineering of Security of Information Systems (ESIS): The Formalism of Business Processes. 105-113 - Jérémy Briffaut, Jean-François Lalande, Christian Toinard, Mathieu Blanc:
Enforcement of Security Properties for Dynamic MAC Policies. 114-120 - Reijo Savola, Habtamu Abie:
Identification of Basic Measurable Security Components for a Distributed Messaging System. 121-128 - Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
A Two-Step Execution Mechanism for Thin Secure Hypervisors. 129-135
INFOSEC I
- Heiko Klarl, Korbinian Molitorisz, Christian Emig, Karsten Klinger, Sebastian Abeck:
Extending Role-Based Access Control for Business Usage. 136-141 - Wolfgang Boehmer:
Survivability and Business Continuity Management System According to BS 25999. 142-147 - Imad M. Abbadi, Muntaha Alawneh:
Replay Attack of Dynamic Rights within an Authorised Domain. 148-154 - Hyangjin Lee, Inkyoung Jeun, Hyuncheol Jung:
Criteria for Evaluating the Privacy Protection Level of Identity Management Services. 155-160
INFOSEC II
- Cynthia Y. Lester, Frank Jamerson:
Incorporating Software Security into an Undergraduate Software Engineering Course. 161-166 - Ilkka Uusitalo, Josep M. Catot, Ramon Loureiro:
Phishing and Countermeasures in Spanish Online Banking. 167-172 - Gábor György Gulyás, Róbert Schulcz, Sándor Imre:
Modeling Role-Based Privacy in Social Networking Services. 173-178 - Cristian Varas, Thomas Hirsch:
Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall. 179-184
SYSSEC I
- Hossein Rezaei Ghaleh, Shahin Norouzi:
A New Approach to Protect the OS from Off-line Attacks Using the Smart Card. 185-190 - Rainer Falk, Hans-Joachim Hof:
Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks. 191-196 - Rainer Falk, Andreas Koepf, Hermann Seuschek, Ming-Yuh Huang, Mingyan Li:
Simulating a Multi-domain RFID System for Replacement Part Tracking. 197-202
SYSSEC II
- Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Security in Ad Hoc Networks: From Vulnerability to Risk Management. 203-209 - Stefan Kraxberger, Udo Payer:
Secure Routing Approach for Unstructured P2P Systems. 210-216 - Nuno Amálio:
Suspicion-Driven Formal Analysis of Security Requirements. 217-223 - Jérémy Briffaut, Xavier Kauffmann-Tourkestansky, Jean-François Lalande, Waleed W. Smari:
Generation of Role Based Access Control Security Policies for Java Collaborative Applications. 224-229
SECTECH
- Zahoor Ahmad Jhat, Ajaz Hussain Mir, Simeen Rubab:
Fingerprint Texture Feature for Discrimination and Personal Verification. 230-236 - Peipei Shi, Bo Zhu, Amr M. Youssef:
A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. 237-241 - Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Chit Wei Saw:
Runtime Protection via Dataflow Flattening. 242-248
MALWA
- Masaru Takesue:
Personalized Filtering of Polymorphic E-mail Spam. 249-254 - Vasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou:
On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks. 255-261 - Antonietta Stango, Neeli R. Prasad, Dimitris M. Kyriazanos:
A Threat Analysis Methodology for Security Evaluation and Enhancement Planning. 262-267 - Maryam Feily, Alireza Shahrestani, Sureswaran Ramadass:
A Survey of Botnet and Botnet Detection. 268-273
CRYPTO
- Hyewon Park, Zeen Kim, Kwangjo Kim:
Forward Secure ID-Based Group Key Agreement Protocol with Anonymity. 274-279 - Mohamed Abo El-Fotouh, Klaus Diepold:
The Pushdown Attack on AES. 280-285 - Peter Lory:
Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol. 286-291 - Bogdan Groza:
Analysis of a Password Strengthening Technique and Its Practical Use. 292-297
ECOSEC
- Su Chang, Thomas E. Daniels:
Correlation Based Node Behavior Profiling for Enterprise Network Security. 298-305 - Wei Zhou, Zhiqiang Wei, Mijun Kang, Paddy Nixon, Lang Jia:
A Credit-Based Incentive Mechanism for Recommendation Acquisition in Multihop Mobile Ad Hoc Networks. 306-311 - Davide Lorenzoli, George Spanoudakis:
Detection of Security and Dependability Threats: A Belief Based Reasoning Approach. 312-320 - Jan Nagy, Peter Pecho:
Social Networks Security. 321-325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.