conference information papers by session … · conference information papers by session papers by...

190
Published by ARES Conference The International Dependability Conference ARES 2009 16-19 March 2009 Fukuoka Institute of Technology Fukuoka, Japan CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS

Upload: phamlien

Post on 07-Apr-2018

224 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Published by

ARES ConferenceThe International Dependability Conference

ARES 200916-19 March 2009

Fukuoka Institute of TechnologyFukuoka, Japan

CONFERENCE INFORMATION

PAPERS BY SESSION

PAPERS BY AUTHOR

SEARCH

GETTING STARTED

TRADEMARKS

Page 2: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Conference Information

2009 International Conference on Availability, Reliabilityand Security

q Message from General Co-chairs

q Message from ARES Workshop Co-chairs

q Conference Officers

q Program Committee

q Message from DAWAM Workshop hairs

q DAWAM Organization Co-chairs

q DAWAM Program Committee

q DAWAM Reviewers

q Message from FARES Workshop Co-chairs

q FARES Organiz Committee

q FARES Program Committee

Co-c

ation

s'

Page 3: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Conference Information (cont.)

2009 International Conference on Availability, Reliabilityand Security

q FARES Reviewers

q Message from GloSec Workshop C

q GloSec Organization Committee

q GloSec Program Committee

q GloSec Reviewers

q Message from IWSS Workshop

q IWSS Organization Committee

q IWSS Program Committee

q IWSS Reviewers

q Message from OSA Workshop

q OSA Organization Committee

hair

Co-chairs

C hairso-c

Page 4: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Conference Information (cont.)

2009 International Conference on Availability, Reliabilityand Security

q OSA Program Committee

q OSA Reviewers

q Message from RIBC Workshop Co-chairs

q RIBC Organization Committee

q RIBC Program Committee

q RIBC Reviewers

q Message from SecSE Workshop C hairs

q SecSE Organiz Committee

q SecSE Program Committee

q SecSE Reviewers

q Message from SECUSAB Workshop Co-chair

o-c

ation

s

Page 5: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Conference Information (cont.)

2009 International Conference on Availability, Reliabilityand Security

q SECUSAB Organiz Committee

q SECUSAB Program Committee

q SECUSAB Reviewers

q Message from WAIS Workshop C hairs

q WAIS Organization Committee

q WAIS Program Committee

q WAIS Reviewers

q Message from WSDF Workshop Co-chairs

q WSDF Organization Committee

q WSDF Program Committee

q WSDF Reviewers

ation

o-c

Page 6: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Conference Information (cont.)

2009 International Conference on Availability, Reliabilityand Security

q Keynote 1: Pairing Based Cryptography - Theory, Implementationsand Applications

q Keynote 2: Digital Identity Protection - Concepts and Issues

q Keynote 3: Topological Analysis of Network Attack Vulnerability

q Invited Talk: Integrative Security Approach as a Key Success Factorof Dependability

q Title Page (Book version)

q Copyright Page (Book version)

q Table of Contents (Book version)

q Author Index (Book version)

q Publisher's Information (Book version)

Page 7: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Sessions

q Distributed Systems and Grid (ARES Full Papers)

q SOA Security (ARES Full Papers)

q Enterprise Security 1 (ARES Full Papers)

q Intrusion and Fraud Detection (ARES Full Papers)

q Enterprise Security 2 (ARES Full Papers)

q Digital Forensics and Security in Communication (ARES FullPapers)

q Availability and Reliability 1 (ARES Full Papers)

q Cryptography (ARES Full Papers)

q Software Security 1 (ARES Full Papers)

q Software Security 2 (ARES Full Papers)

q Availability and Reliability 2 (ARES Full Papers)

q Privacy and Trust (ARES Full Papers)

Page 8: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Sessions (cont.)

q Dependable Systems and Trusted Computing 1 (ARES ShortPapers)

q Dependable Systems and Trusted Computing 2 (ARES ShortPapers)

q Software Security (ARES Short Papers)

q Privacy and Trust (ARES Short Papers)

q Enterprise Security and Security Evaluation 1 (ARES Short Papers)

q Enterprise Security and Security Evaluation 2 (ARES Short Papers)

q Availability and Reliability (ARES Short Papers)

q Authentication and Authorization (ARES Short Papers)

q Cryptography 1 (ARES Short Papers)

q Cryptography 2 (ARES Short Papers)

q DAWAM 2009 - Security & Privacy Enhancement in DWHs

Page 9: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Sessions (cont.)

q DAWAM 2009 - Intrusion and Network Attack Prevention

q DAWAM 2009 - Dependability, Failure Analysis & Detection

q FARES 2009 - Authentication and Authorization

q FARES 2009 - Security in Distributed Systems

q FARES 2009 - Software Security and Digital Forensics

q FARES 2009 - Dependability Aspects

q GloSec 2009 - Session 1

q GloSec 2009 - Session 2

q IWSS 2009 - Security in Ad Hoc and Mesh Networks

q IWSS 2009 - Security in Contactless Systems

q OSA 2009 - Risk Management

q OSA 2009 - Security Management and Education

Page 10: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Sessions (cont.)

q OSA 2009 - Security Mangement

q RIBC 2009 - Authentication, Watermarking and Steganography

q RIBC 2009 - Authentication, Watermarking and Cryptosystems

q SecSE 2009 - Education and Other Vulnerabilities

q SecSE 2009 - Secure Software-Development Lifecycles and Reuse

q SecSE 2009 - Model-Driven Development and Checklists

q SecUSAB 2009 - Session 1

q SecUSAB 2009 - Session 2

q WAIS 2009 - Security Analysis

q WAIS 2009 - Network Security

q WAIS 2009 - Signature and Protection

q WAIS 2009 - Secure Systems

Page 11: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Sessions (cont.)

q WAIS 2009 - Information Security

q WSDF 2009 - Digital Forensics 1

q WSDF 2009 - Digital Forensics 2

Page 12: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Distributed Systems and Grid (ARES Full Papers)

q A Pluggable Domain Management Approach for BuildingPractical Distributed CoalitionsYasuharu Katsuno, Yuji Watanabe, Michiharu Kudo, and Eiji Okamoto

q Retaining Data Control to the Client in Infrastructure CloudsMarco Descher, Philip Masser, Thomas Feilhauer, A. Min Tjoa, and David Huemer

q Workflows in Dynamic and Restricted DelegationMehran Ahsant and Jim Basney

Page 13: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

SOA Security (ARES Full Papers)

q The Accountability Problem of Flooding Attacks in Service-Oriented ArchitecturesMeiko Jensen and Jörg Schwenk

q Web Service Trust: Towards a Dynamic Assessment FrameworkGeorge Spanoudakis and Stephane LoPresti

q Security Requirements Specification in Service-OrientedBusiness Process ManagementMichael Menzel, Ivonne Thomas, and Christoph Meinel

Page 14: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Enterprise Security 1 (ARES Full Papers)

q Quantitative Analysis of Secure Information Flow via Probabilistic SemanticsChunyan Mu and David Clark

q Deploying Security Policy in Intra and Inter WorkflowManagement SystemsSamiha Ayed, Nora Cuppens-Boulahia, and Frédéric Cuppens

q An Empirically Derived Loss Taxonomy Based on PubliclyKnown Security IncidentsFrank Innerhofer-Oberperfler and Ruth Breu

Page 15: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Intrusion and Fraud Detection (ARES Full Papers)

q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent MonitoringJunghwan Rhee, Ryan Riley, Dongyan Xu, and Xuxian Jiang

q Server-Side Prediction of Source IP Addresses Using DensityEstimationMarkus Goldstein, Matthias Reif, Armin Stahl, and Thomas Breuel

q Detecting Stepping-Stone Connection Using Association RuleMiningYing-wei Kuo and Shou-Hsuan Stephen Huang

Page 16: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Enterprise Security 2 (ARES Full Papers)

q Formal Analyses of Usage Control PoliciesAlexander Pretschner, Judith Rüesch, Christian Schaefer, and Thomas Walter

q A First Step towards Characterizing Stealthy BotnetsJustin Leonard, Shouhuai Xu, and Ravi Sandhu

q Intrusion Process Modeling for Security QuantificationJaafar Almasizadeh and Mohammad Abdollahi Azgomi

q Different Approaches to In-House Identity Management -Justification of an AssumptionL. Fuchs, C. Broser, and G. Pernul

Page 17: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Digital Forensics and Security in Communication (ARES FullPapers)

q An LPN-Problem-Based Lightweight Authentication Protocol for Wireless CommunicationsYa-Fen Chang and Yen-Cheng Lai

q Revealing the Calling History of SIP VoIP Systems by TimingAttacksGe Zhang, Simone Fischer-Huebner, Leonardo A. Martucci, and Sven Ehlert

q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime DataBenjamin Turnbull, Robert Taylor, and Barry Blundell

q A Robust Image Watermarking Using Two Level DCT and Wavelet Packets DenoisingA.H. Taherinia and M. Jamzad

Page 18: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Availability and Reliability 1 (ARES Full Papers)

q On Equilibrium Distribution Properties in Software ReliabilityModelingXiao Xiao and Tadashi Dohi

q An Analysis of Fault Effects and Propagations in AVRMicrocontroller ATmega103(L)Alireza Rohani and Hamid. R. Zarandi

q Blue Gene/L Log Analysis and Time to Interrupt EstimationNarate Taerat, Nichamon Naksinehaboon, Clayton Chandler, James Elliott,Chokchai Leangsuksun, George Ostrouchov, Stephen L. Scott, and Christian Engelmann

Page 19: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Cryptography (ARES Full Papers)

q A New Approach for Implementing the MPL Method toward Higher SPA ResistanceMasami Izumi, Kazuo Sakiyama, and Kazuo Ohta

q On Privacy Preserving Convex HullSandeep Hans, Sarat C. Addepalli, Anuj Gupta, and Kannan Srinathan

q Routing Protocol Security Using Symmetric Key BasedTechniquesBezawada Bruhadeshwar, Kishore Kothapalli, M. Poornima, and M. Divya

Page 20: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Software Security 1 (ARES Full Papers)

q Prioritisation and Selection of Software Security ActivitiesDavid Byers and Nahid Shahmehri

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based VulnerabilityPing Chen, Yi Wang, Zhi Xin, Bing Mao, and Li Xie

q Enhancing Automated Detection of Vulnerabilities in JavaComponentsPierre Parrend

Page 21: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Software Security 2 (ARES Full Papers)

q Automated Support for Security Requirements Engineering in Software Product Line Domain EngineeringDaniel Mellado, Jesus Rodríguez, Eduardo Fernández-Medina, and Mario Piattini

q Identifying and Resolving Least Privilege Violations in SoftwareArchitecturesKoen Buyens, Bart De Win, and Wouter Joosen

q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational DatabasesGerardo Canfora, Corrado Aaron Visaggio, and Vito Paradiso

Page 22: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Availability and Reliability 2 (ARES Full Papers)

q Improving Reliability for Multi-home Inbound Traffic: MHLB/IPacket-Level Inter-domain Load-BalancingHiroshi Fujinoki

q Proactive Resource Management for Failure Resilient HighPerformance Computing ClustersSong Fu and Cheng-Zhong Xu

q A Perceptron Neural Network for AsymmetricComparison-Based System-Level Fault DiagnosisMourad Elhadef

q Perfect Failure Detection in the Partitioned SynchronousDistributed System ModelRaimundo José de Araújo Macêdo and Sérgio Gorender

Page 23: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Privacy and Trust (ARES Full Papers)

q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting ProtocolsMehdi Talbi, Valérie Viet Triem Tong, and Adel Bouhoula

q Measuring Voter-Controlled PrivacyHugo Jonker, Sjouke Mauw, and Jun Pang

q Generating User-Understandable Privacy PreferencesJan Kolter and Günther Pernul

q An Automatic Privacy Policy Agreement Checker for E-servicesGeorge O.M. Yee

Page 24: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Dependable Systems and Trusted Computing 1 (ARES ShortPapers)

q A Micro-FT-UART for Safety-Critical SoC-Based ApplicationsMohammad-Hamed Razmkhah, Seyed Ghassem Miremadi, and Alireza Ejlali

q MixVM - An Approach to Service Isolation and Data Protectionin Mobile Context-Sensitive ApplicationsThomas Butter and Markus Aleksy

q On the Security of Untrusted MemoryJörn-Marc Schmidt and Stefan Tillich

Page 25: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Dependable Systems and Trusted Computing 2 (ARES ShortPapers)

q Detecting Image Tampering Using Feature FusionPin Zhang and Xiangwei Kong

q SecMiLiA: An Approach in the Agent ProtectionAntonio Muñoz, Antonio Maña, and Daniel Serrano

q Traffic Controller: A Practical Approach to Block Network CovertTiming ChannelYi Wang, Ping Chen, Yi Ge, Bing Mao, and Li Xie

Page 26: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Software Security (ARES Short Papers)

q Capturing Information Flow with Concatenated Dynamic TaintAnalysisHyung Chan Kim, Angelos D. Keromytis, Michael Covington, and Ravi Sahita

q Risk-Driven Architectural DecompositionThomas Heyman, Riccardo Scandariato, and Wouter Joosen

q Reducing the Cost of Session Key EstablishmentBezawada Bruhadeshwar, Kishore Kothapalli, and Maddi Sree Deepya

Page 27: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Privacy and Trust (ARES Short Papers)

q Accuracy: The Fundamental Requirement for Voting SystemsTim Storer and Russell Lock

q Reusable Security Requirements for Healthcare ApplicationsJostein Jensen, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, and Herbjørn Andresen

q P2F: A User-Centric Privacy Protection FrameworkMaryam Jafari-lafti, Chin-Tser Huang, and Csilla Farkas

Page 28: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Enterprise Security and Security Evaluation 1 (ARES ShortPapers)

q Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001Wolfgang Boehmer

q Methodology for Experimental ICT Industrial and CriticalInfrastructure Security TestsMarcelo Masera and Igor Nai Fovino

q Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo MethodOmar Hussain and Tharam Dillon

Page 29: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Enterprise Security and Security Evaluation 2 (ARES ShortPapers)

q Building a Responsibility Model Including Accountability,Capability and CommitmentChristophe Feltus and Michaël Petit

q AVISPA in the Validation of Ambient Intelligence ScenariosAntonio Muñoz, Antonio Maña, and Daniel Serrano

q Security Evaluation of an Intrusion Tolerant System with MRSPNsRyutaro Fujimoto, Hiroyuki Okamura, and Tadashi Dohi

q Algebraic Properties in Alice and Bob NotationSebastian Mödersheim

Page 30: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Availability and Reliability (ARES Short Papers)

q Scrubbing in Storage Virtualization Platform for Long-TermBackup ApplicationAo Ma, Yang Yin, Wenwu Na, Xiaoxuan Meng, Qingzhong Bu, and Lu Xu

q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM TechnologiesMehrtash Manoochehri, Alireza Ejlali, and Seyed Ghassem Miremadi

q Generating AMF Configurations from Software VendorConstraints and User RequirementsA. Kanso, M. Toeroe, A. Hamou-Lhadj, and F. Khendek

Page 31: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Authentication and Authorization (ARES Short Papers)

q Using XACML for Embedded and Fine-Grained Access ControlPolicyGeorge Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, and Lisa Marvel

q A-COLD: Access Control of Web OLAP over Multi-dataWarehouseSomchart Fugkeaw, Piyawit Manpanpanich, and Sekpon Juntapremjitt

q Package-Role Based Authorization Control Model for WirelessNetwork ServicesHuy Hoang Ngo, Xianping Wu, Phu Dung Le, and Campbell Wilson

q Security Credential Mapping in GridsMehran Ahsant, Esteban Talavera Gonzalez, and Jim Basney

Page 32: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Cryptography 1 (ARES Short Papers)

q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute StatisticsKeita Emura, Atsuko Miyaji, and Kazumasa Omote

q Security in Quantum Networks as an Optimization ProblemStefan Rass and Peter Schartner

q Finding Preimages of Multiple Passwords Secured with VSHKimmo Halunen, Pauli Rikula, and Juha Röning

Page 33: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

Cryptography 2 (ARES Short Papers)

q Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off AttackNurdan Saran and Ali Doğanaksoy

q Generalized Robust Combiners for Oblivious TransferGanugula Umadevi, Sarat C. Addepalli, and Kannan Srinathan

Page 34: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

DAWAM 2009 - Security & Privacy Enhancement in DWHs

q Including Security Rules Support in an MDA Approach for Secure DWsCarlos Blanco, Ignacio García-Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo,and Mario Piattini

q A System of Privacy Preserving Distributed Spatial DataWarehouse Using Relation DecompositionMarcin Gorawski and Szymon Panfil

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWsCarlos Blanco, Ignacio García-Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo,and Mario Piattini

Page 35: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

DAWAM 2009 - Intrusion and Network Attack Prevention

q Identity-Based Hybrid SigncryptionFagen Li, Masaaki Shirase, and Tsuyoshi Takagi

q Towards Intrusion Detection for Encrypted NetworksVik Tor Goh, Jacob Zimmermann, and Mark Looi

q A Mobile Ambients-Based Approach for Network AttackModelling and SimulationVirginia N.L. Franqueira, Pascal van Eck, Roel Wieringa, and Raul H.C. Lopes

Page 36: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

DAWAM 2009 - Dependability, Failure Analysis & Detection

q Statistical Failure Analysis of a Web Server SystemToshiya Fujii and Tadashi Dohi

q A Policy Framework for Data Management in ServicesMarketplacesJun Li, Bryan Stephenson, and Sharad Singhal

q Modeling Misuse PatternsEduardo B. Fernandez, Nobukazu Yoshioka, and Hironori Washizaki

q Novel Algorithms for Subgroup Detection in Terrorist NetworksNasrullah Memon, Abdul Rasool Qureshi, Uffe Kock Wiil, and David L. Hicks

Page 37: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

FARES 2009 - Authentication and Authorization

q QR-TAN: Secure Mobile Transaction AuthenticationGuenther Starnberger, Lorenz Froihofer, and Karl M. Goeschka

q An Authentication Watermark Algorithm for JPEG imagesXiaowei Shi, Fenlin Liu, Daofu Gong, and Jing Jing

q A New Watermarking Attack Using Long-Range CorrelationImage RestorationA.H. Taherinia, M. Fotouhi, and M. Jamzad

Page 38: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

FARES 2009 - Security in Distributed Systems

q The Case for a Simpler Security Model in Grid ComputingFrederik Orellana, Christian Ulrik Søttrup, Anders Wäänänen, Daniel Kalici, and Michael Grønager

q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobotsSarat C. Addepalli, Piyush Bansal, Kannan Srinathan, and K. Madhava Krishna

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle ManagementM. Descher, T. Feilhauer, T. Ludescher, P. Masser, B. Wenzel, P. Brezany, I. Elsayed, A. Woehrer,A.M. Tjoa, and D. Huemer

Page 39: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

FARES 2009 - Software Security and Digital Forensics

q A Robust Image Watermarking Method in Wavelet DomainUsing Genetic AlgorithmS. Hamid Amiri and Mansour Jamzad

q An Efficient Measurement of Object Oriented DesignVulnerabilityAlka Agrawal, Shalini Chandra, and Raees Ahmad Khan

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408Kenichi Yajima, Shoichi Morimoto, Daisuke Horie, Noor Sheila Azreen, Yuichi Goto, and Jingde Cheng

Page 40: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

FARES 2009 - Dependability Aspects

q Using Hybrid Trust Model for Handling Inaccurate ResourceBagher Rahimpour Cami and Mohammad Reza Matash Brujerdi

q A High Speed and Low Cost Error Correction Technique for the Carry Select AdderAlireza Namazi, Seyed Ghassem Miremadi, and Alireza Ejlali

q An Improvement of REM: A Replication Oriented Event-BasedMiddlewareYoucheng Chen, Mohammad Reza Selim, Yuichi Goto, and Jingde Cheng

Page 41: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

GloSec 2009 - Session 1

q Advanced Flooding Attack on a SIP ServerXianglin Deng and Malcolm Shore

q State of Cybersecurity and the Roadmap to Secure CyberCommunity in CambodiaSopheak Cheang and Sinawong Sang

q An Inclusive Information Society Needs a Global Approach of Information SecuritySolange Ghernaouti-Hélie

Page 42: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

GloSec 2009 - Session 2

q Measuring Peer-to-Peer Botnets Using Control Flow StabilityBinbin Wang, Zhitang Li, Hao Tu, and Jie Ma

q Regulatory Compliance and Information Security AssuranceIgli Tashi

q Information Security Optimization: From Theory to PracticeDavid John Simms

Page 43: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

IWSS 2009 - Security in Ad Hoc and Mesh Networks

q Trusting User Defined Context in MANETs: Experience from the MIDAS ApproachVegar Westerlund, Thomas Pronstad, Inger Anne Tøndel, and Leendert Wienhofen

q Deconvolving Protected SignalsMohaned Kafi and Sylvain Guilley

Page 44: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

IWSS 2009 - Security in Contactless Systems

q Vulnerability Analysis and Attacks on NFC-Enabled MobilePhonesCollin Mulliner

q Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure ElementVincent Alimi and Marc Pasquet

q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID SystemsGeorge Poulopoulos, Konstantinos Markantonakis, and Keith Mayes

Page 45: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

OSA 2009 - Risk Management

q A New Approach for the Construction of Fault Trees from System SimulinkG. Latif-Shabgahi and F. Tajarrod

q Estimating ToE Risk Level Using CVSSSiv Hilde Houmb and Virginia N.L. Franqueira

q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management GuideAmril Syalim, Yoshiaki Hori, and Kouichi Sakurai

Page 46: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

OSA 2009 - Security Management and Education

q Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business EnvironmentsJuhani Anttila and Jorma Kajava

q Standards-Based Cyber ExercisesRonald Dodge, Brian Hay, and Kara Nance

q Patterns to Support the Development of Privacy PoliciesLuanna Lopes Lobato, Eduardo B. Fernandez, and Sergio Donizetti Zorzo

Page 47: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

OSA 2009 - Security Mangement

q Multidimensional Management of Information Security – AMetrics Based Approach Merging Business and InformationSecurity TopicsSebastian Sowa and Roland Gabriel

q A Security Management Assurance Model to Holistically Assessthe Information Security PostureIgli Tashi and Solange Ghernaouti-Hélie

q Methodology to Align Business and IT Policies: Use Case from an IT CompanyChristophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gateau, André Adelsbach,and Marc Camy

Page 48: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

RIBC 2009 - Authentication, Watermarking and Steganography

q On the Higher Order Nonlinearities of Boolean Functions and S-boxesClaude Carlet

q A Certificate Revocable Anonymous Authentication Schemewith Designated VerifierKeita Emura, Atsuko Miyaji, and Kazumasa Omote

q A Standard MIDI File Steganography Based on Fluctuation of DurationKotaro Yamamoto and Munetoshi Iwakiri

q A Signature Scheme Associated with Universal Re-signcryptionKohei Tatara and Kouichi Sakurai

Page 49: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

RIBC 2009 - Authentication, Watermarking and Cryptosystems

q Real-Time Audio Watermarking with Wavetable Alternation in Digital InstrumentKotaro Yamamoto and Munetoshi Iwakiri

q A Reconfigurable-Permutation Algorithm for M_S-BoxHiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, and Yoshio Yoshioka

Page 50: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

SecSE 2009 - Education and Other Vulnerabilities

q Protecting Global and Static Variables from Buffer OverflowAttacksYves Younan, Frank Piessens, and Wouter Joosen

q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?Dejan Baca, Kai Petersen, Bengt Carlsson, and Lars Lundberg

q hACMEgame: A Tool for Teaching Software SecurityØyvind Nerbråten and Lillian Røstad

Page 51: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

SecSE 2009 - Secure Software-Development Lifecycles and Reuse

q Towards Evaluation of Security Assurance during the SoftwareDevelopment LifecycleIlkka Uusitalo, Kaarina Karppinen, Pasi Ahonen, and Heimo Pentikäinen

q An Architectural Foundation for Security Model Sharing and ReusePer Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri,and Inger Anne Tøndel

q A Knowledge Management Approach to Support a SecureSoftware DevelopmentFrancisco José Barreto Nunes, Arnaldo Dias Belchior, and Adriano Bessa Albuquerque

Page 52: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

SecSE 2009 - Model-Driven Development and Checklists

q A Practical Framework for the Dataflow Pointcut in AspectJAmine Boukhtouta, Dima Alhadidi, and Mourad Debbabi

q SecureMDD: A Model-Driven Development Method for SecureSmart Card ApplicationsNina Moebius, Kurt Stenzel, Holger Grandy, and Wolfgang Reif

q Linking Privacy Solutions to Developer GoalsKim Wuyts, Riccardo Scandariato, Bart De Decker, and Wouter Joosen

q Software Inspections Using Guided Checklists to EnsureSecurity GoalsFrank Elberzhager, Alexander Klaus, and Marek Jawurek

Page 53: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

SecUSAB 2009 - Session 1

q Managing Rights and Value of Digital MediaFilippo Chiariglione, Giacomo Cosenza, and Sergio Matone

q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMSCharlott Eliasson, Markus Fiedler, and Ivar Jørstad

q The User-Centric Vision Matches Credentials ExchangesMikaël Ates, Jacques Fayolle, Christophe Gravier, and Jeremy Lardon

Page 54: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

SecUSAB 2009 - Session 2

q Patient-Administered Access Control: A Usability StudyLillian Røstad and Ole Andreas Alsos

q An Experimental System for Studying the Tradeoff between Usability and SecurityNoam Ben-Asher, Joachim Meyer, Sebastian Möller, and Roman Englert

Page 55: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

WAIS 2009 - Security Analysis

q Rank Swapping for Partial Orders and Continuous VariablesVicenç Torra

q An Improved Authentication Protocol Based on One-Way HashFunctions and Diffie-Hellman Key ExchangeMarko Hölbl and Tatjana Welzer

q Security Analysis for P2P Routing ProtocolsTatsuro Fujii, Yizhi Ren, Yoshiaki Hori, and Kouichi Sakurai

Page 56: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

WAIS 2009 - Network Security

q Secrecy Capacity of Wireless LANRyuzou Nishi, Yoshiaki Hori, and Kouichi Sakurai

q Privacy-Preserving Collaborative Filtering SchemesHiroaki Kikuchi, Hiroyasu Kizawa, and Minako Tada

q A Framework for Understanding BotnetsJustin Leonard, Shouhuai Xu, and Ravi Sandhu

Page 57: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

WAIS 2009 - Signature and Protection

q Enterprise-Oriented Digital Rights Management Mechanism:eDRMChia-Chen Lin, Shih-Chi Wu, Po-Hsuan Chiang, and Chang-Chi Chen

q Utility and Risk of JPEG-Based Continuous Microdata ProtectionMethodsJavier Jiménez and Vicenç Torra

q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear PairingsYuh-Min Tseng, Tsu-Yang Wu, and Jui-Di Wu

q Yet Another Sanitizable Signature from Bilinear MapsTetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, and Masahiko Takenaka

Page 58: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

WAIS 2009 - Secure Systems

q Generation of Prototypes for Masking Sequences of EventsAida Valls, Cristina Gómez-Alonso, and Vicenç Torra

q Enhancing Control of Service Compositions in Service-OrientedArchitecturesChristian Schneider, Frederic Stumpf, and Claudia Eckert

q Truly Anonymous Paper Submission and Review SchemeChun-I Fan, Ming-Te Chen, and Lung-Hsien Chen

q An Implementation of the Binding Mechanism in the WebBrowser for Preventing XSS Attacks: Introducing the Bind-Value HeadersGenta Iha and Hiroshi Doi

Page 59: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

WAIS 2009 - Information Security

q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network PacketsKohei Tatara, Yoshiaki Hori, and Kouichi Sakurai

q Automated Instruction-Set Randomization for WebApplications in Diversified Redundant SystemsFrédéric Majorczyk and Jonathan-Christofer Demay

q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute InformationYoshio Kakizaki, Yoshiaki Yoshida, and Hidekazu Tsuji

q Making Use of Human Visual Capability to Improve InformationSecurityMasakatsu Nishigaki and Takumi Yamamoto

Page 60: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

WSDF 2009 - Digital Forensics 1

q Enhancement of Forensic Computing Investigations through Memory Forensic TechniquesMatthew Simon and Jill Slay

q Improving Performance in Digital Forensics: A Case UsingPattern Matching BoardJooyoung Lee, Sungkyung Un, and Dowon Hong

q Computer Forensics in Japan: A Preliminary StudyJigang Liu and Tetsutaro Uehara

Page 61: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Session

WSDF 2009 - Digital Forensics 2

q Enhancing Computer Forensics Investigation through Visualisation and Data ExploitationGrant Osborne and Benjamin Turnbull

q A Post-Mortem Incident Modeling MethodShanai Ardi and Nahid Shahmehri

q Investigating the Implications of Virtual Machine Introspectionfor Digital ForensicsKara Nance, Matt Bishop, and Brian Hay

Page 62: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

A

q Addepalli, Sarat C.

q Adelsbach, André

q Agrawal, Alka

q Ahonen, Pasi

q Ahsant, Mehran

q Albuquerque, Adriano Bessa

q Aleksy, Markus

q Alhadidi, Dima

q Alimi, Vincent

q Almasizadeh, Jaafar

q Alsos, Ole Andreas

q Amiri, S. Hamid

q Andresen, Herbjørn

q Anttila, Juhani

q Ardi, Shanai

q Ates, Mikaël

q Aubert, Jocelyn

q Ayed, Samiha

q Azgomi, MohammadAbdollahi

q Azreen, Noor Sheila

B

q Baca, Dejan

Page 63: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Bansal, Piyush

q Basney, Jim

q Belchior, Arnaldo Dias

q Ben-Asher, Noam

q Bishop, Matt

q Blanco, Carlos

q Blundell, Barry

q Boehmer, Wolfgang

q Bouhoula, Adel

q Boukhtouta, Amine

q Breu, Ruth

q Breuel, Thomas

q Brezany, P.

q Broser, C.

q Bruhadeshwar, Bezawada

q Brujerdi, Mohammad RezaMatash

q Bu, Qingzhong

q Butter, Thomas

q Buyens, Koen

q Byers, David

C

q Cami, Bagher Rahimpour

q Camy, Marc

q Canfora, Gerardo

Page 64: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Carlet, Claude

q Carlsson, Bengt

q Chandler, Clayton

q Chandra, Shalini

q Chang, Ya-Fen

q Cheang, Sopheak

q Chen, Chang-Chi

q Chen, Lung-Hsien

q Chen, Ming-Te

q Chen, Ping

q Chen, Youcheng

q Cheng, Jingde

q Chiang, Po-Hsuan

q Chiariglione, Filippo

q Clark, David

q Cosenza, Giacomo

q Covington, Michael

q Cuppens, Frédéric

q Cuppens-Boulahia, Nora

d

q de Guzmán, IgnacioGarcía-Rodríguez

D

q De Decker, Bart

q Debbabi, Mourad

Page 65: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Deepya, Maddi Sree

q Demay, Jonathan-Christofer

q Deng, Xianglin

q Descher, M.

q Descher, Marco

q Dillon, Tharam

q Divya, M.

q Dodge, Ronald

q Doğanaksoy, Ali

q Dohi, Tadashi

q Doi, Hiroshi

E

q Eckert, Claudia

q Ehlert, Sven

q Ejlali, Alireza

q Elberzhager, Frank

q Elhadef, Mourad

q Eliasson, Charlott

q Elliott, James

q Elsayed, I.

q Emamali, Gerald

q Emura, Keita

q Engelmann, Christian

Page 66: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Englert, Roman

F

q Fan, Chun-I

q Farkas, Csilla

q Fayolle, Jacques

q Feilhauer, T.

q Feilhauer, Thomas

q Feltus, Christophe

q Fernandez, Eduardo B.

q Fernández-Medina, Eduardo

q Fiedler, Markus

q Fischer-Huebner, Simone

q Foster, Keith

q Fotouhi, M.

q Fovino, Igor Nai

q Franqueira, Virginia N.L.

q Froihofer, Lorenz

q Fu, Song

q Fuchs, L.

q Fugkeaw, Somchart

q Fujii, Tatsuro

q Fujii, Toshiya

q Fujimoto, Ryutaro

q Fujinoki, Hiroshi

Page 67: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

G

q Gabriel, Roland

q Gateau, Benjamin

q Ge, Yi

q Ghernaouti-Hélie, Solange

q Goeschka, Karl M.

q Goh, Vik Tor

q Goldstein, Markus

q Gómez-Alonso, Cristina

q Gong, Daofu

q Gonzalez, Esteban Talavera

q Gorawski, Marcin

q Gorender, Sérgio

q Goto, Yuichi

q Grandy, Holger

q Gravier, Christophe

q Grønager, Michael

q Guilley, Sylvain

q Gupta, Anuj

H

q Halunen, Kimmo

q Hamou-Lhadj, A.

q Hans, Sandeep

q Hay, Brian

Page 68: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Heyman, Thomas

q Hicks, David L.

q Hölbl, Marko

q Hong, Dowon

q Hori, Yoshiaki

q Horie, Daisuke

q Houmb, Siv Hilde

q Hsieh, George

q Huang, Chin-Tser

q Huang, Shou-Hsuan Stephen

q Huemer, D.

q Huemer, David

q Hussain, Omar

I

q Iha, Genta

q Incoul, Christophe

q Innerhofer-Oberperfler, Frank

q Iwakiri, Munetoshi

q Izu, Tetsuya

q Izumi, Masami

J

q Jaatun, Martin Gilje

q Jafari-lafti, Maryam

q Jamzad, M.

q Jamzad, Mansour

Page 69: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Jawurek, Marek

q Jensen, Jostein

q Jensen, Meiko

q Jiang, Xuxian

q Jiménez, Javier

q Jing, Jing

q Jonker, Hugo

q Joosen, Wouter

q Jørstad, Ivar

q Juntapremjitt, Sekpon

K

q Kafi, Mohaned

q Kajava, Jorma

q Kakizaki, Yoshio

q Kalici, Daniel

q Kanso, A.

q Karppinen, Kaarina

q Katsuno, Yasuharu

q Keromytis, Angelos D.

q Khan, Raees Ahmad

q Khendek, F.

q Kikuchi, Hiroaki

q Kim, Hyung Chan

q Kizawa, Hiroyasu

q Klaus, Alexander

Page 70: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Kolter, Jan

q Kong, Xiangwei

q Kothapalli, Kishore

q Krishna, K. Madhava

q Kudo, Michiharu

q Kudou, Hiroshi

q Kunihiro, Noboru

q Kuo, Ying-wei

L

q Lai, Yen-Cheng

q Lardon, Jeremy

q Latif-Shabgahi, G.

q Le, Phu Dung

q Leangsuksun, Chokchai

q Lee, Jooyoung

q Leonard, Justin

q Li, Fagen

q Li, Jun

q Li, Zhitang

q Lin, Chia-Chen

q Liu, Fenlin

q Liu, Jigang

q Lobato, Luanna Lopes

q Lock, Russell

q Looi, Mark

Page 71: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Lopes, Raul H.C.

q LoPresti, Stephane

q Ludescher, T.

q Lundberg, Lars

M

q Ma, Ao

q Ma, Jie

q Macêdo, Raimundo José de Araújo

q Majorczyk, Frédéric

q Maña, Antonio

q Manoochehri, Mehrtash

q Manpanpanich, Piyawit

q Mao, Bing

q Markantonakis, Konstantinos

q Martucci, Leonardo A.

q Marvel, Lisa

q Masera, Marcelo

q Masser, P.

q Masser, Philip

q Matone, Sergio

q Mauw, Sjouke

q Mayes, Keith

q Meinel, Christoph

q Meland, Per Håkon

Page 72: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Mellado, Daniel

q Memon, Nasrullah

q Meng, Xiaoxuan

q Menzel, Michael

q Meyer, Joachim

q Miremadi, Seyed Ghassem

q Miyaji, Atsuko

q Mödersheim, Sebastian

q Moebius, Nina

q Möller, Sebastian

q Morimoto, Shoichi

q Mu, Chunyan

q Mulliner, Collin

q Muñoz, Antonio

N

q Na, Wenwu

q Nagase, Tomoyuki

q Nakayama, Shunn-ichiro

q Naksinehaboon, Nichamon

q Namazi, Alireza

q Nance, Kara

q Nerbråten, Øyvind

q Ngo, Huy Hoang

q Nishi, Ryuzou

q Nishigaki, Masakatsu

Page 73: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Nunes, Francisco José Barreto

O

q Ohta, Kazuo

q Okamoto, Eiji

q Okamura, Hiroyuki

q Omote, Kazumasa

q Orellana, Frederik

q Osborne, Grant

q Ostrouchov, George

P

q Panfil, Szymon

q Pang, Jun

q Paradiso, Vito

q Parrend, Pierre

q Pasquet, Marc

q Patrick, Gregory

q Pentikäinen, Heimo

q Pernul, G.

q Pernul, Günther

q Petersen, Kai

q Petit, Michaël

q Piattini, Mario

q Piessens, Frank

q Poornima, M.

q Poulopoulos, George

Page 74: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Pretschner, Alexander

q Pronstad, Thomas

Q

q Qureshi, Abdul Rasool

R

q Rass, Stefan

q Razmkhah,Mohammad-Hamed

q Reif, Matthias

q Reif, Wolfgang

q Ren, Yizhi

q Rhee, Junghwan

q Rikula, Pauli

q Riley, Ryan

q Rios, Erkuden

q Rodríguez, Jesus

q Rohani, Alireza

q Röning, Juha

q Røstad, Lillian

q Rüesch, Judith

S

q Sahita, Ravi

q Sakiyama, Kazuo

q Sakurai, Kouichi

Page 75: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Sanchez, Txus

q Sandhu, Ravi

q Sang, Sinawong

q Sano, Makoto

q Saran, Nurdan

q Scandariato, Riccardo

q Schaefer, Christian

q Schartner, Peter

q Schmidt, Jörn-Marc

q Schneider, Christian

q Schwenk, Jörg

q Scott, Stephen L.

q Selim, Mohammad Reza

q Serrano, Daniel

q Shahmehri, Nahid

q Shi, Xiaowei

q Shirase, Masaaki

q Shore, Malcolm

q Simms, David John

q Simon, Matthew

q Singhal, Sharad

q Slay, Jill

q Søttrup, Christian Ulrik

q Sowa, Sebastian

q Spanoudakis, George

q Srinathan, Kannan

Page 76: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Stahl, Armin

q Starnberger, Guenther

q Stenzel, Kurt

q Stephenson, Bryan

q Storer, Tim

q Stumpf, Frederic

q Syalim, Amril

T

q Tada, Minako

q Taerat, Narate

q Taherinia, A.H.

q Tajarrod, F.

q Takagi, Tsuyoshi

q Takenaka, Masahiko

q Talbi, Mehdi

q Tashi, Igli

q Tatara, Kohei

q Taylor, Robert

q Thomas, Ivonne

q Tillich, Stefan

q Tjoa, A. Min

q Tjoa, A.M.

q Toeroe, M.

q Tøndel, Inger Anne

q Tong, Valérie Viet Triem

Page 77: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Torra, Vicenç

q Trujillo, Juan

q Tseng, Yuh-Min

q Tsuji, Hidekazu

q Tu, Hao

q Turnbull, Benjamin

U

q Uehara, Tetsutaro

q Umadevi, Ganugula

q Un, Sungkyung

q Uusitalo, Ilkka

v

q van Eck, Pascal

V

q Valls, Aida

q Visaggio, Corrado Aaron

W

q Wäänänen, Anders

q Walter, Thomas

q Wang, Binbin

q Wang, Yi

q Washizaki, Hironori

Page 78: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Watanabe, Atsushi

q Watanabe, Yuji

q Welzer, Tatjana

q Wenzel, B.

q Westerlund, Vegar

q Wienhofen, Leendert

q Wieringa, Roel

q Wiil, Uffe Kock

q Wilson, Campbell

q Win, Bart De

q Woehrer, A.

q Wu, Jui-Di

q Wu, Shih-Chi

q Wu, Tsu-Yang

q Wu, Xianping

q Wuyts, Kim

X

q Xiao, Xiao

q Xie, Li

q Xin, Zhi

q Xu, Cheng-Zhong

q Xu, Dongyan

q Xu, Lu

q Xu, Shouhuai

Page 79: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Y

q Yajima, Kenichi

q Yamamoto, Kotaro

q Yamamoto, Takumi

q Yee, George O.M.

q Yin, Yang

q Yoshida, Yoshiaki

q Yoshioka, Nobukazu

q Yoshioka, Yoshio

q Younan, Yves

Z

q Zarandi, Hamid. R.

q Zhang, Ge

q Zhang, Pin

q Zimmermann, Jacob

q Zorzo, Sergio Donizetti

Page 80: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Addepalli, Sarat C.

q On Privacy Preserving Convex Hull

q Generalized Robust Combiners for Oblivious Transfer

q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots

Adelsbach, André

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Agrawal, Alka

q An Efficient Measurement of Object Oriented DesignVulnerability

Page 81: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Ahonen, Pasi

q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle

Ahsant, Mehran

q Workflows in Dynamic and Restricted Delegation

q Security Credential Mapping in Grids

Albuquerque, Adriano Bessa

q A Knowledge Management Approach to Support a SecureSoftware Development

Page 82: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Aleksy, Markus

q MixVM - An Approach to Service Isolation and Data Protectionin Mobile Context-Sensitive Applications

Alhadidi, Dima

q A Practical Framework for the Dataflow Pointcut in AspectJ

Alimi, Vincent

q Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element

Almasizadeh, Jaafar

q Intrusion Process Modeling for Security Quantification

Page 83: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Alsos, Ole Andreas

q Patient-Administered Access Control: A Usability Study

Amiri, S. Hamid

q A Robust Image Watermarking Method in Wavelet DomainUsing Genetic Algorithm

Andresen, Herbjørn

q Reusable Security Requirements for Healthcare Applications

Anttila, Juhani

q Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments

Page 84: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Ardi, Shanai

q An Architectural Foundation for Security Model Sharing and Reuse

q A Post-Mortem Incident Modeling Method

Ates, Mikaël

q The User-Centric Vision Matches Credentials Exchanges

Aubert, Jocelyn

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Page 85: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Ayed, Samiha

q Deploying Security Policy in Intra and Inter WorkflowManagement Systems

Azgomi, Mohammad Abdollahi

q Intrusion Process Modeling for Security Quantification

Azreen, Noor Sheila

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

Baca, Dejan

q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?

Page 86: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Bansal, Piyush

q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots

Basney, Jim

q Workflows in Dynamic and Restricted Delegation

q Security Credential Mapping in Grids

Belchior, Arnaldo Dias

q A Knowledge Management Approach to Support a SecureSoftware Development

Page 87: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Ben-Asher, Noam

q An Experimental System for Studying the Tradeoff between Usability and Security

Bishop, Matt

q Investigating the Implications of Virtual Machine Introspectionfor Digital Forensics

Blanco, Carlos

q Including Security Rules Support in an MDA Approach for Secure DWs

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs

Page 88: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Blundell, Barry

q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime Data

Boehmer, Wolfgang

q Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001

Bouhoula, Adel

q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting Protocols

Boukhtouta, Amine

q A Practical Framework for the Dataflow Pointcut in AspectJ

Page 89: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Breu, Ruth

q An Empirically Derived Loss Taxonomy Based on PubliclyKnown Security Incidents

Breuel, Thomas

q Server-Side Prediction of Source IP Addresses Using DensityEstimation

Brezany, P.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Broser, C.

q Different Approaches to In-House Identity Management -Justification of an Assumption

Page 90: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Bruhadeshwar, Bezawada

q Routing Protocol Security Using Symmetric Key BasedTechniques

q Reducing the Cost of Session Key Establishment

Brujerdi, Mohammad Reza Matash

q Using Hybrid Trust Model for Handling Inaccurate Resource

Bu, Qingzhong

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Page 91: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Butter, Thomas

q MixVM - An Approach to Service Isolation and Data Protectionin Mobile Context-Sensitive Applications

Buyens, Koen

q Identifying and Resolving Least Privilege Violations in SoftwareArchitectures

Byers, David

q Prioritisation and Selection of Software Security Activities

Cami, Bagher Rahimpour

q Using Hybrid Trust Model for Handling Inaccurate Resource

Page 92: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Camy, Marc

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Canfora, Gerardo

q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational Databases

Carlet, Claude

q On the Higher Order Nonlinearities of Boolean Functions and S-boxes

Carlsson, Bengt

q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?

Page 93: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Chandler, Clayton

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Chandra, Shalini

q An Efficient Measurement of Object Oriented DesignVulnerability

Chang, Ya-Fen

q An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications

Cheang, Sopheak

q State of Cybersecurity and the Roadmap to Secure CyberCommunity in Cambodia

Page 94: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Chen, Chang-Chi

q Enterprise-Oriented Digital Rights Management Mechanism:eDRM

Chen, Lung-Hsien

q Truly Anonymous Paper Submission and Review Scheme

Chen, Ming-Te

q Truly Anonymous Paper Submission and Review Scheme

Chen, Ping

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability

q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel

Page 95: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Chen, Youcheng

q An Improvement of REM: A Replication Oriented Event-BasedMiddleware

Cheng, Jingde

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

q An Improvement of REM: A Replication Oriented Event-BasedMiddleware

Chiang, Po-Hsuan

q Enterprise-Oriented Digital Rights Management Mechanism:eDRM

Page 96: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Chiariglione, Filippo

q Managing Rights and Value of Digital Media

Clark, David

q Quantitative Analysis of Secure Information Flow via Probabilistic Semantics

Cosenza, Giacomo

q Managing Rights and Value of Digital Media

Covington, Michael

q Capturing Information Flow with Concatenated Dynamic TaintAnalysis

Page 97: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Cuppens, Frédéric

q Deploying Security Policy in Intra and Inter WorkflowManagement Systems

Cuppens-Boulahia, Nora

q Deploying Security Policy in Intra and Inter WorkflowManagement Systems

De Decker, Bart

q Linking Privacy Solutions to Developer Goals

de Guzmán, Ignacio García-Rodríguez

q Including Security Rules Support in an MDA Approach for Secure DWs

Page 98: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs

Debbabi, Mourad

q A Practical Framework for the Dataflow Pointcut in AspectJ

Deepya, Maddi Sree

q Reducing the Cost of Session Key Establishment

Demay, Jonathan-Christofer

q Automated Instruction-Set Randomization for WebApplications in Diversified Redundant Systems

Deng, Xianglin

q Advanced Flooding Attack on a SIP Server

Page 99: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Descher, M.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Descher, Marco

q Retaining Data Control to the Client in Infrastructure Clouds

Dillon, Tharam

q Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method

Divya, M.

q Routing Protocol Security Using Symmetric Key BasedTechniques

Page 100: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Dodge, Ronald

q Standards-Based Cyber Exercises

Doğanaksoy, Ali

q Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack

Dohi, Tadashi

q On Equilibrium Distribution Properties in Software ReliabilityModeling

q Security Evaluation of an Intrusion Tolerant System with MRSPNs

q Statistical Failure Analysis of a Web Server System

Page 101: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Doi, Hiroshi

q An Implementation of the Binding Mechanism in the WebBrowser for Preventing XSS Attacks: Introducing the Bind-Value Headers

Eckert, Claudia

q Enhancing Control of Service Compositions in Service-OrientedArchitectures

Ehlert, Sven

q Revealing the Calling History of SIP VoIP Systems by TimingAttacks

Ejlali, Alireza

q A Micro-FT-UART for Safety-Critical SoC-Based Applications

Page 102: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM Technologies

q A High Speed and Low Cost Error Correction Technique for the Carry Select Adder

Elberzhager, Frank

q Software Inspections Using Guided Checklists to EnsureSecurity Goals

Elhadef, Mourad

q A Perceptron Neural Network for AsymmetricComparison-Based System-Level Fault Diagnosis

Page 103: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Eliasson, Charlott

q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMS

Elliott, James

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Elsayed, I.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Emamali, Gerald

q Using XACML for Embedded and Fine-Grained Access ControlPolicy

Page 104: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Emura, Keita

q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics

q A Certificate Revocable Anonymous Authentication Schemewith Designated Verifier

Engelmann, Christian

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Englert, Roman

q An Experimental System for Studying the Tradeoff between Usability and Security

Page 105: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Fan, Chun-I

q Truly Anonymous Paper Submission and Review Scheme

Farkas, Csilla

q P2F: A User-Centric Privacy Protection Framework

Fayolle, Jacques

q The User-Centric Vision Matches Credentials Exchanges

Feilhauer, T.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Feilhauer, Thomas

q Retaining Data Control to the Client in Infrastructure Clouds

Page 106: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Feltus, Christophe

q Building a Responsibility Model Including Accountability,Capability and Commitment

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Fernandez, Eduardo B.

q Modeling Misuse Patterns

q Patterns to Support the Development of Privacy Policies

Fernández-Medina, Eduardo

q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering

Page 107: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Including Security Rules Support in an MDA Approach for Secure DWs

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs

Fiedler, Markus

q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMS

Fischer-Huebner, Simone

q Revealing the Calling History of SIP VoIP Systems by TimingAttacks

Page 108: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Foster, Keith

q Using XACML for Embedded and Fine-Grained Access ControlPolicy

Fotouhi, M.

q A New Watermarking Attack Using Long-Range CorrelationImage Restoration

Fovino, Igor Nai

q Methodology for Experimental ICT Industrial and CriticalInfrastructure Security Tests

Franqueira, Virginia N.L.

q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation

Page 109: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Estimating ToE Risk Level Using CVSS

Froihofer, Lorenz

q QR-TAN: Secure Mobile Transaction Authentication

Fu, Song

q Proactive Resource Management for Failure Resilient HighPerformance Computing Clusters

Fuchs, L.

q Different Approaches to In-House Identity Management -Justification of an Assumption

Page 110: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Fugkeaw, Somchart

q A-COLD: Access Control of Web OLAP over Multi-dataWarehouse

Fujii, Tatsuro

q Security Analysis for P2P Routing Protocols

Fujii, Toshiya

q Statistical Failure Analysis of a Web Server System

Fujimoto, Ryutaro

q Security Evaluation of an Intrusion Tolerant System with MRSPNs

Page 111: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Fujinoki, Hiroshi

q Improving Reliability for Multi-home Inbound Traffic: MHLB/IPacket-Level Inter-domain Load-Balancing

Gabriel, Roland

q Multidimensional Management of Information Security – AMetrics Based Approach Merging Business and InformationSecurity Topics

Gateau, Benjamin

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Page 112: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Ge, Yi

q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel

Ghernaouti-Hélie, Solange

q An Inclusive Information Society Needs a Global Approach of Information Security

q A Security Management Assurance Model to Holistically Assessthe Information Security Posture

Goeschka, Karl M.

q QR-TAN: Secure Mobile Transaction Authentication

Goh, Vik Tor

q Towards Intrusion Detection for Encrypted Networks

Page 113: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Goldstein, Markus

q Server-Side Prediction of Source IP Addresses Using DensityEstimation

Gómez-Alonso, Cristina

q Generation of Prototypes for Masking Sequences of Events

Gong, Daofu

q An Authentication Watermark Algorithm for JPEG images

Gonzalez, Esteban Talavera

q Security Credential Mapping in Grids

Page 114: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Gorawski, Marcin

q A System of Privacy Preserving Distributed Spatial DataWarehouse Using Relation Decomposition

Gorender, Sérgio

q Perfect Failure Detection in the Partitioned SynchronousDistributed System Model

Goto, Yuichi

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

q An Improvement of REM: A Replication Oriented Event-BasedMiddleware

Page 115: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Grandy, Holger

q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications

Gravier, Christophe

q The User-Centric Vision Matches Credentials Exchanges

Grønager, Michael

q The Case for a Simpler Security Model in Grid Computing

Guilley, Sylvain

q Deconvolving Protected Signals

Gupta, Anuj

q On Privacy Preserving Convex Hull

Page 116: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Halunen, Kimmo

q Finding Preimages of Multiple Passwords Secured with VSH

Hamou-Lhadj, A.

q Generating AMF Configurations from Software VendorConstraints and User Requirements

Hans, Sandeep

q On Privacy Preserving Convex Hull

Hay, Brian

q Standards-Based Cyber Exercises

q Investigating the Implications of Virtual Machine Introspectionfor Digital Forensics

Page 117: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Heyman, Thomas

q Risk-Driven Architectural Decomposition

Hicks, David L.

q Novel Algorithms for Subgroup Detection in Terrorist Networks

Hölbl, Marko

q An Improved Authentication Protocol Based on One-Way HashFunctions and Diffie-Hellman Key Exchange

Hong, Dowon

q Improving Performance in Digital Forensics: A Case UsingPattern Matching Board

Page 118: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Hori, Yoshiaki

q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management Guide

q Security Analysis for P2P Routing Protocols

q Secrecy Capacity of Wireless LAN

q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets

Horie, Daisuke

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

Houmb, Siv Hilde

q Estimating ToE Risk Level Using CVSS

Page 119: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Hsieh, George

q Using XACML for Embedded and Fine-Grained Access ControlPolicy

Huang, Chin-Tser

q P2F: A User-Centric Privacy Protection Framework

Huang, Shou-Hsuan Stephen

q Detecting Stepping-Stone Connection Using Association RuleMining

Huemer, D.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Page 120: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Huemer, David

q Retaining Data Control to the Client in Infrastructure Clouds

Hussain, Omar

q Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method

Iha, Genta

q An Implementation of the Binding Mechanism in the WebBrowser for Preventing XSS Attacks: Introducing the Bind-Value Headers

Incoul, Christophe

q Methodology to Align Business and IT Policies: Use Case from an IT Company

Page 121: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Innerhofer-Oberperfler, Frank

q An Empirically Derived Loss Taxonomy Based on PubliclyKnown Security Incidents

Iwakiri, Munetoshi

q A Standard MIDI File Steganography Based on Fluctuation of Duration

q Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument

Izu, Tetsuya

q Yet Another Sanitizable Signature from Bilinear Maps

Page 122: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Izumi, Masami

q A New Approach for Implementing the MPL Method toward Higher SPA Resistance

Jaatun, Martin Gilje

q Reusable Security Requirements for Healthcare Applications

Jafari-lafti, Maryam

q P2F: A User-Centric Privacy Protection Framework

Jamzad, M.

q A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising

q A New Watermarking Attack Using Long-Range CorrelationImage Restoration

Page 123: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Jamzad, Mansour

q A Robust Image Watermarking Method in Wavelet DomainUsing Genetic Algorithm

Jawurek, Marek

q Software Inspections Using Guided Checklists to EnsureSecurity Goals

Jensen, Jostein

q Reusable Security Requirements for Healthcare Applications

q An Architectural Foundation for Security Model Sharing and Reuse

Page 124: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Jensen, Meiko

q The Accountability Problem of Flooding Attacks in Service-Oriented Architectures

Jiang, Xuxian

q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring

Jiménez, Javier

q Utility and Risk of JPEG-Based Continuous Microdata ProtectionMethods

Jing, Jing

q An Authentication Watermark Algorithm for JPEG images

Page 125: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Jonker, Hugo

q Measuring Voter-Controlled Privacy

Joosen, Wouter

q Identifying and Resolving Least Privilege Violations in SoftwareArchitectures

q Risk-Driven Architectural Decomposition

q Protecting Global and Static Variables from Buffer OverflowAttacks

q Linking Privacy Solutions to Developer Goals

Jørstad, Ivar

q A Criteria-Based Evaluation Framework for AuthenticationSchemes in IMS

Page 126: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Juntapremjitt, Sekpon

q A-COLD: Access Control of Web OLAP over Multi-dataWarehouse

Kafi, Mohaned

q Deconvolving Protected Signals

Kajava, Jorma

q Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments

Kakizaki, Yoshio

q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information

Page 127: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Kalici, Daniel

q The Case for a Simpler Security Model in Grid Computing

Kanso, A.

q Generating AMF Configurations from Software VendorConstraints and User Requirements

Karppinen, Kaarina

q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle

Katsuno, Yasuharu

q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions

Page 128: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Keromytis, Angelos D.

q Capturing Information Flow with Concatenated Dynamic TaintAnalysis

Khan, Raees Ahmad

q An Efficient Measurement of Object Oriented DesignVulnerability

Khendek, F.

q Generating AMF Configurations from Software VendorConstraints and User Requirements

Kikuchi, Hiroaki

q Privacy-Preserving Collaborative Filtering Schemes

Page 129: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Kim, Hyung Chan

q Capturing Information Flow with Concatenated Dynamic TaintAnalysis

Kizawa, Hiroyasu

q Privacy-Preserving Collaborative Filtering Schemes

Klaus, Alexander

q Software Inspections Using Guided Checklists to EnsureSecurity Goals

Kolter, Jan

q Generating User-Understandable Privacy Preferences

Page 130: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Kong, Xiangwei

q Detecting Image Tampering Using Feature Fusion

Kothapalli, Kishore

q Routing Protocol Security Using Symmetric Key BasedTechniques

q Reducing the Cost of Session Key Establishment

Krishna, K. Madhava

q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots

Page 131: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Kudo, Michiharu

q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions

Kudou, Hiroshi

q A Reconfigurable-Permutation Algorithm for M_S-Box

Kunihiro, Noboru

q Yet Another Sanitizable Signature from Bilinear Maps

Kuo, Ying-wei

q Detecting Stepping-Stone Connection Using Association RuleMining

Page 132: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Lai, Yen-Cheng

q An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications

Lardon, Jeremy

q The User-Centric Vision Matches Credentials Exchanges

Latif-Shabgahi, G.

q A New Approach for the Construction of Fault Trees from System Simulink

Le, Phu Dung

q Package-Role Based Authorization Control Model for WirelessNetwork Services

Page 133: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Leangsuksun, Chokchai

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Lee, Jooyoung

q Improving Performance in Digital Forensics: A Case UsingPattern Matching Board

Leonard, Justin

q A First Step towards Characterizing Stealthy Botnets

q A Framework for Understanding Botnets

Li, Fagen

q Identity-Based Hybrid Signcryption

Page 134: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Li, Jun

q A Policy Framework for Data Management in ServicesMarketplaces

Li, Zhitang

q Measuring Peer-to-Peer Botnets Using Control Flow Stability

Lin, Chia-Chen

q Enterprise-Oriented Digital Rights Management Mechanism:eDRM

Liu, Fenlin

q An Authentication Watermark Algorithm for JPEG images

Page 135: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Liu, Jigang

q Computer Forensics in Japan: A Preliminary Study

Lobato, Luanna Lopes

q Patterns to Support the Development of Privacy Policies

Lock, Russell

q Accuracy: The Fundamental Requirement for Voting Systems

Looi, Mark

q Towards Intrusion Detection for Encrypted Networks

Page 136: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Lopes, Raul H.C.

q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation

LoPresti, Stephane

q Web Service Trust: Towards a Dynamic Assessment Framework

Ludescher, T.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Lundberg, Lars

q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?

Page 137: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Ma, Ao

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Ma, Jie

q Measuring Peer-to-Peer Botnets Using Control Flow Stability

Macêdo, Raimundo José de Araújo

q Perfect Failure Detection in the Partitioned SynchronousDistributed System Model

Majorczyk, Frédéric

q Automated Instruction-Set Randomization for WebApplications in Diversified Redundant Systems

Page 138: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Maña, Antonio

q SecMiLiA: An Approach in the Agent Protection

q AVISPA in the Validation of Ambient Intelligence Scenarios

Manoochehri, Mehrtash

q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM Technologies

Manpanpanich, Piyawit

q A-COLD: Access Control of Web OLAP over Multi-dataWarehouse

Page 139: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Mao, Bing

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability

q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel

Markantonakis, Konstantinos

q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems

Martucci, Leonardo A.

q Revealing the Calling History of SIP VoIP Systems by TimingAttacks

Page 140: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Marvel, Lisa

q Using XACML for Embedded and Fine-Grained Access ControlPolicy

Masera, Marcelo

q Methodology for Experimental ICT Industrial and CriticalInfrastructure Security Tests

Masser, P.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Masser, Philip

q Retaining Data Control to the Client in Infrastructure Clouds

Page 141: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Matone, Sergio

q Managing Rights and Value of Digital Media

Mauw, Sjouke

q Measuring Voter-Controlled Privacy

Mayes, Keith

q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems

Meinel, Christoph

q Security Requirements Specification in Service-OrientedBusiness Process Management

Page 142: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Meland, Per Håkon

q Reusable Security Requirements for Healthcare Applications

q An Architectural Foundation for Security Model Sharing and Reuse

Mellado, Daniel

q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering

Memon, Nasrullah

q Novel Algorithms for Subgroup Detection in Terrorist Networks

Page 143: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Meng, Xiaoxuan

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Menzel, Michael

q Security Requirements Specification in Service-OrientedBusiness Process Management

Meyer, Joachim

q An Experimental System for Studying the Tradeoff between Usability and Security

Miremadi, Seyed Ghassem

q A Micro-FT-UART for Safety-Critical SoC-Based Applications

Page 144: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Fault Tolerant and Low Energy Write-Back Heterogeneous SetAssociative Cache for DSM Technologies

q A High Speed and Low Cost Error Correction Technique for the Carry Select Adder

Miyaji, Atsuko

q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics

q A Certificate Revocable Anonymous Authentication Schemewith Designated Verifier

Mödersheim, Sebastian

q Algebraic Properties in Alice and Bob Notation

Page 145: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Moebius, Nina

q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications

Möller, Sebastian

q An Experimental System for Studying the Tradeoff between Usability and Security

Morimoto, Shoichi

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

Mu, Chunyan

q Quantitative Analysis of Secure Information Flow via Probabilistic Semantics

Page 146: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Mulliner, Collin

q Vulnerability Analysis and Attacks on NFC-Enabled MobilePhones

Muñoz, Antonio

q SecMiLiA: An Approach in the Agent Protection

q AVISPA in the Validation of Ambient Intelligence Scenarios

Na, Wenwu

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Nagase, Tomoyuki

q A Reconfigurable-Permutation Algorithm for M_S-Box

Page 147: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Nakayama, Shunn-ichiro

q A Reconfigurable-Permutation Algorithm for M_S-Box

Naksinehaboon, Nichamon

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Namazi, Alireza

q A High Speed and Low Cost Error Correction Technique for the Carry Select Adder

Nance, Kara

q Standards-Based Cyber Exercises

q Investigating the Implications of Virtual Machine Introspectionfor Digital Forensics

Page 148: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Nerbråten, Øyvind

q hACMEgame: A Tool for Teaching Software Security

Ngo, Huy Hoang

q Package-Role Based Authorization Control Model for WirelessNetwork Services

Nishi, Ryuzou

q Secrecy Capacity of Wireless LAN

Nishigaki, Masakatsu

q Making Use of Human Visual Capability to Improve InformationSecurity

Page 149: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Nunes, Francisco José Barreto

q A Knowledge Management Approach to Support a SecureSoftware Development

Ohta, Kazuo

q A New Approach for Implementing the MPL Method toward Higher SPA Resistance

q Yet Another Sanitizable Signature from Bilinear Maps

Okamoto, Eiji

q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions

Page 150: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Okamura, Hiroyuki

q Security Evaluation of an Intrusion Tolerant System with MRSPNs

Omote, Kazumasa

q A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics

q A Certificate Revocable Anonymous Authentication Schemewith Designated Verifier

Orellana, Frederik

q The Case for a Simpler Security Model in Grid Computing

Page 151: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Osborne, Grant

q Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation

Ostrouchov, George

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Panfil, Szymon

q A System of Privacy Preserving Distributed Spatial DataWarehouse Using Relation Decomposition

Pang, Jun

q Measuring Voter-Controlled Privacy

Page 152: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Paradiso, Vito

q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational Databases

Parrend, Pierre

q Enhancing Automated Detection of Vulnerabilities in JavaComponents

Pasquet, Marc

q Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element

Patrick, Gregory

q Using XACML for Embedded and Fine-Grained Access ControlPolicy

Page 153: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Pentikäinen, Heimo

q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle

Pernul, G.

q Different Approaches to In-House Identity Management -Justification of an Assumption

Pernul, Günther

q Generating User-Understandable Privacy Preferences

Petersen, Kai

q Static Code Analysis to Detect Software Security Vulnerabilities- Does Experience Matter?

Page 154: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Petit, Michaël

q Building a Responsibility Model Including Accountability,Capability and Commitment

Piattini, Mario

q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering

q Including Security Rules Support in an MDA Approach for Secure DWs

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs

Page 155: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Piessens, Frank

q Protecting Global and Static Variables from Buffer OverflowAttacks

Poornima, M.

q Routing Protocol Security Using Symmetric Key BasedTechniques

Poulopoulos, George

q A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems

Pretschner, Alexander

q Formal Analyses of Usage Control Policies

Page 156: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Pronstad, Thomas

q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach

Qureshi, Abdul Rasool

q Novel Algorithms for Subgroup Detection in Terrorist Networks

Rass, Stefan

q Security in Quantum Networks as an Optimization Problem

Razmkhah, Mohammad-Hamed

q A Micro-FT-UART for Safety-Critical SoC-Based Applications

Page 157: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Reif, Matthias

q Server-Side Prediction of Source IP Addresses Using DensityEstimation

Reif, Wolfgang

q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications

Ren, Yizhi

q Security Analysis for P2P Routing Protocols

Rhee, Junghwan

q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring

Page 158: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Rikula, Pauli

q Finding Preimages of Multiple Passwords Secured with VSH

Riley, Ryan

q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring

Rios, Erkuden

q An Architectural Foundation for Security Model Sharing and Reuse

Rodríguez, Jesus

q Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering

Page 159: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Rohani, Alireza

q An Analysis of Fault Effects and Propagations in AVRMicrocontroller ATmega103(L)

Röning, Juha

q Finding Preimages of Multiple Passwords Secured with VSH

Røstad, Lillian

q hACMEgame: A Tool for Teaching Software Security

q Patient-Administered Access Control: A Usability Study

Rüesch, Judith

q Formal Analyses of Usage Control Policies

Page 160: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Sahita, Ravi

q Capturing Information Flow with Concatenated Dynamic TaintAnalysis

Sakiyama, Kazuo

q A New Approach for Implementing the MPL Method toward Higher SPA Resistance

Sakurai, Kouichi

q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management Guide

q A Signature Scheme Associated with Universal Re-signcryption

q Security Analysis for P2P Routing Protocols

q Secrecy Capacity of Wireless LAN

Page 161: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets

Sanchez, Txus

q An Architectural Foundation for Security Model Sharing and Reuse

Sandhu, Ravi

q A First Step towards Characterizing Stealthy Botnets

q A Framework for Understanding Botnets

Sang, Sinawong

q State of Cybersecurity and the Roadmap to Secure CyberCommunity in Cambodia

Page 162: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Sano, Makoto

q Yet Another Sanitizable Signature from Bilinear Maps

Saran, Nurdan

q Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack

Scandariato, Riccardo

q Risk-Driven Architectural Decomposition

q Linking Privacy Solutions to Developer Goals

Schaefer, Christian

q Formal Analyses of Usage Control Policies

Page 163: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Schartner, Peter

q Security in Quantum Networks as an Optimization Problem

Schmidt, Jörn-Marc

q On the Security of Untrusted Memory

Schneider, Christian

q Enhancing Control of Service Compositions in Service-OrientedArchitectures

Schwenk, Jörg

q The Accountability Problem of Flooding Attacks in Service-Oriented Architectures

Page 164: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Scott, Stephen L.

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Selim, Mohammad Reza

q An Improvement of REM: A Replication Oriented Event-BasedMiddleware

Serrano, Daniel

q SecMiLiA: An Approach in the Agent Protection

q AVISPA in the Validation of Ambient Intelligence Scenarios

Shahmehri, Nahid

q Prioritisation and Selection of Software Security Activities

Page 165: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q An Architectural Foundation for Security Model Sharing and Reuse

q A Post-Mortem Incident Modeling Method

Shi, Xiaowei

q An Authentication Watermark Algorithm for JPEG images

Shirase, Masaaki

q Identity-Based Hybrid Signcryption

Shore, Malcolm

q Advanced Flooding Attack on a SIP Server

Simms, David John

q Information Security Optimization: From Theory to Practice

Page 166: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Simon, Matthew

q Enhancement of Forensic Computing Investigations through Memory Forensic Techniques

Singhal, Sharad

q A Policy Framework for Data Management in ServicesMarketplaces

Slay, Jill

q Enhancement of Forensic Computing Investigations through Memory Forensic Techniques

Søttrup, Christian Ulrik

q The Case for a Simpler Security Model in Grid Computing

Page 167: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Sowa, Sebastian

q Multidimensional Management of Information Security – AMetrics Based Approach Merging Business and InformationSecurity Topics

Spanoudakis, George

q Web Service Trust: Towards a Dynamic Assessment Framework

Srinathan, Kannan

q On Privacy Preserving Convex Hull

q Generalized Robust Combiners for Oblivious Transfer

q Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trustingRobots

Page 168: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Stahl, Armin

q Server-Side Prediction of Source IP Addresses Using DensityEstimation

Starnberger, Guenther

q QR-TAN: Secure Mobile Transaction Authentication

Stenzel, Kurt

q SecureMDD: A Model-Driven Development Method for SecureSmart Card Applications

Stephenson, Bryan

q A Policy Framework for Data Management in ServicesMarketplaces

Page 169: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Storer, Tim

q Accuracy: The Fundamental Requirement for Voting Systems

Stumpf, Frederic

q Enhancing Control of Service Compositions in Service-OrientedArchitectures

Syalim, Amril

q Comparison of Risk Analysis Methods: Mehari, Magerit,NIST800-30 and Microsoft's Security Management Guide

Tada, Minako

q Privacy-Preserving Collaborative Filtering Schemes

Page 170: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Taerat, Narate

q Blue Gene/L Log Analysis and Time to Interrupt Estimation

Taherinia, A.H.

q A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising

q A New Watermarking Attack Using Long-Range CorrelationImage Restoration

Tajarrod, F.

q A New Approach for the Construction of Fault Trees from System Simulink

Takagi, Tsuyoshi

q Identity-Based Hybrid Signcryption

Page 171: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Takenaka, Masahiko

q Yet Another Sanitizable Signature from Bilinear Maps

Talbi, Mehdi

q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting Protocols

Tashi, Igli

q Regulatory Compliance and Information Security Assurance

q A Security Management Assurance Model to Holistically Assessthe Information Security Posture

Tatara, Kohei

q A Signature Scheme Associated with Universal Re-signcryption

Page 172: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets

Taylor, Robert

q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime Data

Thomas, Ivonne

q Security Requirements Specification in Service-OrientedBusiness Process Management

Tillich, Stefan

q On the Security of Untrusted Memory

Tjoa, A. Min

q Retaining Data Control to the Client in Infrastructure Clouds

Page 173: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Tjoa, A.M.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Toeroe, M.

q Generating AMF Configurations from Software VendorConstraints and User Requirements

Tøndel, Inger Anne

q Reusable Security Requirements for Healthcare Applications

q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach

q An Architectural Foundation for Security Model Sharing and Reuse

Page 174: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Tong, Valérie Viet Triem

q Specification of Anonymity as a Secrecy Property in the ADMLogic - Homomorphic-Based Voting Protocols

Torra, Vicenç

q Rank Swapping for Partial Orders and Continuous Variables

q Utility and Risk of JPEG-Based Continuous Microdata ProtectionMethods

q Generation of Prototypes for Masking Sequences of Events

Trujillo, Juan

q Including Security Rules Support in an MDA Approach for Secure DWs

Page 175: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

q Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs

Tseng, Yuh-Min

q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear Pairings

Tsuji, Hidekazu

q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information

Tu, Hao

q Measuring Peer-to-Peer Botnets Using Control Flow Stability

Page 176: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Turnbull, Benjamin

q The Anatomy of Electronic Evidence – Quantitative Analysis of Police E-Crime Data

q Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation

Uehara, Tetsutaro

q Computer Forensics in Japan: A Preliminary Study

Umadevi, Ganugula

q Generalized Robust Combiners for Oblivious Transfer

Page 177: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Un, Sungkyung

q Improving Performance in Digital Forensics: A Case UsingPattern Matching Board

Uusitalo, Ilkka

q Towards Evaluation of Security Assurance during the SoftwareDevelopment Lifecycle

Valls, Aida

q Generation of Prototypes for Masking Sequences of Events

van Eck, Pascal

q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation

Page 178: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Visaggio, Corrado Aaron

q A Test Framework for Assessing Effectiveness of the DataPrivacy Policy’s Implementation into Relational Databases

Wäänänen, Anders

q The Case for a Simpler Security Model in Grid Computing

Walter, Thomas

q Formal Analyses of Usage Control Policies

Wang, Binbin

q Measuring Peer-to-Peer Botnets Using Control Flow Stability

Page 179: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Wang, Yi

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability

q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel

Washizaki, Hironori

q Modeling Misuse Patterns

Watanabe, Atsushi

q A Reconfigurable-Permutation Algorithm for M_S-Box

Page 180: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Watanabe, Yuji

q A Pluggable Domain Management Approach for BuildingPractical Distributed Coalitions

Welzer, Tatjana

q An Improved Authentication Protocol Based on One-Way HashFunctions and Diffie-Hellman Key Exchange

Wenzel, B.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Westerlund, Vegar

q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach

Page 181: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Wienhofen, Leendert

q Trusting User Defined Context in MANETs: Experience from the MIDAS Approach

Wieringa, Roel

q A Mobile Ambients-Based Approach for Network AttackModelling and Simulation

Wiil, Uffe Kock

q Novel Algorithms for Subgroup Detection in Terrorist Networks

Wilson, Campbell

q Package-Role Based Authorization Control Model for WirelessNetwork Services

Page 182: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Win, Bart De

q Identifying and Resolving Least Privilege Violations in SoftwareArchitectures

Woehrer, A.

q Position Paper: Secure Infrastructure for Scientific Data LifeCycle Management

Wu, Jui-Di

q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear Pairings

Wu, Shih-Chi

q Enterprise-Oriented Digital Rights Management Mechanism:eDRM

Page 183: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Wu, Tsu-Yang

q Towards Efficient ID-Based Signature Schemes with BatchVerifications from Bilinear Pairings

Wu, Xianping

q Package-Role Based Authorization Control Model for WirelessNetwork Services

Wuyts, Kim

q Linking Privacy Solutions to Developer Goals

Xiao, Xiao

q On Equilibrium Distribution Properties in Software ReliabilityModeling

Page 184: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Xie, Li

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability

q Traffic Controller: A Practical Approach to Block Network CovertTiming Channel

Xin, Zhi

q BRICK: A Binary Tool for Run-Time Detecting and LocatingInteger-Based Vulnerability

Xu, Cheng-Zhong

q Proactive Resource Management for Failure Resilient HighPerformance Computing Clusters

Page 185: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Xu, Dongyan

q Defeating Dynamic Data Kernel Rootkit Attacks via VMM-BasedGuest-Transparent Monitoring

Xu, Lu

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Xu, Shouhuai

q A First Step towards Characterizing Stealthy Botnets

q A Framework for Understanding Botnets

Page 186: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Yajima, Kenichi

q FORVEST: A Support Tool for Formal Verification of SecuritySpecifications with ISO/IEC 15408

Yamamoto, Kotaro

q A Standard MIDI File Steganography Based on Fluctuation of Duration

q Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument

Yamamoto, Takumi

q Making Use of Human Visual Capability to Improve InformationSecurity

Page 187: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Yee, George O.M.

q An Automatic Privacy Policy Agreement Checker for E-services

Yin, Yang

q Scrubbing in Storage Virtualization Platform for Long-TermBackup Application

Yoshida, Yoshiaki

q An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information

Yoshioka, Nobukazu

q Modeling Misuse Patterns

Page 188: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Yoshioka, Yoshio

q A Reconfigurable-Permutation Algorithm for M_S-Box

Younan, Yves

q Protecting Global and Static Variables from Buffer OverflowAttacks

Zarandi, Hamid. R.

q An Analysis of Fault Effects and Propagations in AVRMicrocontroller ATmega103(L)

Zhang, Ge

q Revealing the Calling History of SIP VoIP Systems by TimingAttacks

Page 189: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

Zhang, Pin

q Detecting Image Tampering Using Feature Fusion

Zimmermann, Jacob

q Towards Intrusion Detection for Encrypted Networks

Zorzo, Sergio Donizetti

q Patterns to Support the Development of Privacy Policies

Page 190: CONFERENCE INFORMATION PAPERS BY SESSION … · CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS. Conference Information 2009 International

Papers by Author

A B C D E F G

H I J K L M N

O P Q R S T U

V W X Y Z