


default search action
ARES 2007: Vienna, Austria
- Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria. IEEE Computer Society 2007, ISBN 0-7695-2775-2

Session 1: Trust Model & Trust Management
- Oluwafemi O. Ajayi, Richard O. Sinnott

, Anthony Stell:
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. 3-10 - Yudistira Asnar, Paolo Giorgini

, Fabio Massacci
, Nicola Zannone
:
From Trust to Dependability through Risk Analysis. 19-26 - Jatinder Singh, Jean Bacon, Ken Moody:

Dynamic trust domains for secure, private, technology-assisted living. 27-34 - Ching Lin, Vijay Varadharajan:

A Hybrid Trust Model for Enhancing Security in Distributed Systems. 35-42 - Wilfried N. Gansterer

, Andreas Janecek, Peter Lechner:
A Reliable Component-Based Architecture for E-Mail Filtering. 43-52
Session 2: Availability, Fault-Tolerant & Recovery
- Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Göschka:

Availability and Performance of the Adaptive Voting Replication. 53-60 - Marcin Gorawski, Pawel Marks:

Distributed Stream Processing Analysis in High Availability Context. 61-68 - Stefan Beyer, Francesc D. Muñoz-Escoí

, Pablo Galdámez:
Implementing Network Partition-Aware Fault-Tolerant CORBA Systems. 69-76 - Bin Rong, Fred Douglis

, Cathy H. Xia, Zhen Liu:
Failure Recovery in Cooperative Data Stream Analysis. 77-84 - José Enrique Armendáriz-Iñigo

, Francesc D. Muñoz-Escoí
, J. R. Juárez-Rodríguez
, José Ramón González de Mendívil, Bettina Kemme:
A Recovery Protocol for Middleware Replicated Databases Providing GSI. 85-92 - Rubén de Juan-Marín, Hendrik Decker, Francesc D. Muñoz-Escoí

:
Revisiting Hot Passive Replication. 93-102
Session 3: Reputation Management & Trust
- Sini Ruohomaa, Lea Kutvonen

, Eleni Koutrouli:
Reputation Management Survey. 103-111 - Audun Jøsang

, Jochen Haller:
Dirichlet Reputation Systems. 112-119 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:

Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. 120-127 - Stefan Böttcher, Sebastian Obermeier:

Secure Anonymous Union Computation Among Malicious Partners. 128-138
Session 4: Privacy & Access Control
- Oliver Jorns, Oliver Jung, Gerald Quirchmayr:

A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications. 139-146 - Pankaj Bhaskar, Sheikh Iqbal Ahamed:

Privacy in Pervasive Computing and Open Issues. 147-154 - Christin Groba, Stephan Groß, Thomas Springer:

Context-Dependent Access Control for Contextual Information. 155-161 - Dongxi Liu:

Bytecode Verification for Enhanced JVM Access Control. 162-172
Session 5: Failure Detection & Attack Prevention
- P. Hazy, Rudolph E. Seviora:

Automatic Failure Detection with Separation of Concerns. 173-181 - Mourad Elhadef

, Azzedine Boukerche:
A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor Networks. 182-189 - Yanlan Ding, Guiping Su:

Intrusion detection system for signal based SIP attacks through timed HCPN. 190-197 - Muhammad Sher

, Thomas Magedanz:
3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. 198-205 - Meriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri:

Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. 206-212 - Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin:

Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network. 213-222
Session 6: Authentication & Authorisation
- Anders Moen Hagalisletto:

Errors in Attacks on Authentication Protocols. 223-229 - Christian Schläger, Monika Ganslmayer:

Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. 230-237 - Tieyan Li, Robert H. Deng

:
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. 238-245 - Leila Ismail

:
Authentication Mechanisms for Mobile Agents. 246-253 - Yuri Demchenko

, Leon Gommans, Cees de Laat:
Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning. 254-262 - Georg Treu, Florian Fuchs, Christiane Dargatz

:
Implicit Authorization for Accessing Location Data in a Social Context. 263-272
Session 7: Security Algorithm & Framework
- Abinandhan Chandrasekaran, Bhavani Thuraisingham:

Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances. 273-280 - Zeghid Medien

, Belgacem Bouallegue, Adel Baganne, Mohsen Machhout
, Rached Tourki:
A Reconfigurable Implementation of the New Secure Hash Algorithm. 281-285 - Jeffrey Todd McDonald, Alec Yasinsac:

Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. 286-293 - Emilio Soler

, Juan Trujillo
, Eduardo Fernández-Medina
, Mario Piattini
:
A Framework for the Development of Secure Data Warehouses based on MDA and QVT. 294-300
Session 8: Software Security
- David Byers, Nahid Shahmehri:

Design of a Process for Software Security. 301-309 - Christoph Krauß

, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert:
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. 310-317 - Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck:

A secure architecture for the pseudonymization of medical data. 318-324 - Thomas Nowey, Hannes Federrath:

Collection of Quantitative Data on Security Incidents. 325-334
Session 9: Security Models
- Suranjith Ariyapperuma, Chris J. Mitchell

:
Security vulnerabilities in DNS and DNSSEC. 335-342 - David Arsenault, Arun Sood, Yih Huang:

Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). 343-350 - Raihan Al-Ekram, Richard C. Holt, Chris Hobbs:

Applying a Tradeoff Model (TOM) to TACT. 351-355 - Denis Hatebur, Maritta Heisel, Holger Schmidt:

A Pattern System for Security Requirements Engineering. 356-365 - Stefan Durbeck, Rolf Schillinger, Jan Paul Kolter:

Security Requirements for a Semantic Service-oriented Architecture. 366-373 - Ludwig Fuchs, Günther Pernul:

Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. 374-384
Session 10: Miscellaneous Security Techniques
- Vidar Evenrud Seeberg, Slobodan Petrovic:

A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. 385-390 - Valentina Casola

, Nicola Mazzocca
, Jesus Luna, Oscar Manso
, Manel Medina:
Static evaluation of Certificate Policies for GRID PKIs interoperability. 391-399 - Mansoor Ahmed

, Amin Andjomshoaa
, Tho Manh Nguyen, A Min Tjoa
:
Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE. 400-407 - TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang:

Universally Composable Three-Party Key Distribution. 408-416
Session 11: eAuction & eVoting Protocol
- Brian Curtis, Josef Pieprzyk

, Jan Seruga:
An Efficient eAuction Protocol. 417-421 - Benedikt Ostermaier, Florian Dotzer, Markus Strassberger:

Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes. 422-431 - Orhan Cetinkaya, Ali Doganaksoy:

A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network. 432-442
Session 12: Dependability in Distributed & Ubiquitous Computing
- Lorenz Froihofer, Johannes Osrael, Karl M. Göschka:

Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems. 443-450 - Lu Yan, Kaisa Sere:

Dependability Aspects of Ubiquitous Computing. 451-453 - Tomoya Enokido, Makoto Takizawa

:
Concurrency Control using Subject- and Purpose-Oriented (SPO) View. 454-464
Session 13: Anomaly & Intrusion Detection
- Oleksiy Mazhelis, Seppo Puuronen:

Comparing Classifier Combining Techniques for Mobile-Masquerader Detection. 465-472 - Surekha Mariam Varghese, K. Poulose Jacob:

Process Profiling Using Frequencies of System Calls. 473-479 - Dil Muhammad Akbar Hussain:

Terrorist Networks Analysis through Argument Driven Hypotheses Model. 480-492
International Symposium on Frontiers in Availability, Reliability and Security (FARES)
Session 1: Fault-Tolerant & Availability
- S. Prabhu, R. Venkat:

High Availability for Network Management Applications. 493-498 - Yanlong Wang, Zhanhuai Li, Wei Lin:

RWAR: A Resilient Window-consistent Asynchronous Replication Protocol. 499-505 - Keiji Ozaki, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa

:
Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model. 506-516
Session 2: Access Control
- Franz Kollmann:

Realizing fine-granular Read andWrite Rights on Tree Structured Documents. 517-523 - Vipin Singh Mewar, Subhendu Aich, Shamik Sural

:
Access Control Model for Web Services with Attribute Disclosure Restriction. 524-531 - Joaquín García-Alfaro

, Frédéric Cuppens, Nora Cuppens-Boulahia:
Aggregating and Deploying Network Access Control Policies. 532-542
Session 3: Authentication
- Arjan Durresi, Vamsi Paruchuri

, Mimoza Durresi, Leonard Barolli:
Secure Spatial Authentication using Cell Phones. 543-549 - Bogdan Groza:

Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain. 550-557 - Yijun He, Nan Xu, Jie Li:

A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications. 558-563 - Gang Yao, Dengguo Feng, Xiaoxi Han:

Improved Client-to-Client Password-Authenticated Key Exchange Protocol. 564-574
Session 4: Real-Time System & Sensor Network
- Dong Seong Kim

, Chung Su Yang, Jong Sou Park:
Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack. 575-579 - Christian Buckl

, Matthias Regensburger, Alois C. Knoll
, Gerhard Schrott:
Models for automatic generation of safety-critical real-time systems. 580-587 - Bastian Preindl, Alexander Schatten:

A Near-Real-Time Behaviour Control Framework. 588-598
Session 5: RFID Techniques & Applications
- Qinghan Xiao, Cam Boulet, Thomas E. Gibbons:

RFID Security Issues in Military Supply Chains. 599-605 - Jens Mache

, Chris Allick:
The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols. 606-609 - Geethapriya Venkataramani, Srividya Gopalan:

Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards. 610-620
Session 6: Secure Solution & Applications
- C. M. Jayalath, R. U. Fernando:

A Modular Architecture for Secure and Reliable Distributed Communication. 621-628 - Anthony Stell

, Richard O. Sinnott
, Oluwafemi O. Ajayi, Jipu Jiang:
Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials. 629-636 - Georgios Kambourakis

, Eleni Klaoudatou, Stefanos Gritzalis
:
Securing Medical Sensor Environments: The CodeBlue Framework Case. 637-643 - Emilio Soler

, Juan Trujillo
, Eduardo Fernández-Medina
, Mario Piattini
:
A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses. 644-654
Session 7: Security Issue in Business Management
- Regine Endsuleit, Christoph Amma:

Agent Alliances: A Means for Practical Threshold Signature. 655-662 - Martin Boesgaard, Erik Zenner:

Protecting Online Transactions with Unique Embedded Key Generators. 663-669 - Thomas Neubauer, Gernot Goluch, Bernhard Riedl:

A research agenda for Autonomous Business Process Management. 670-680
Session 8: Web, XML, Content Management
- William Bradley Glisson

, L. Milton Glisson, Ray Welland:
Secure Web Application Development and Global Regulation. 681-688 - Viet Hung Nguyen, Tran Khanh Dang

, Nguyen Thanh Son, Josef Küng:
Query Assurance Verification for Dynamic Outsourced XML Databases. 689-696 - Lars-Helge Netland, Yngve Espelid, Khalid A. Mughal:

A Reflection-Based Framework for Content Validation. 697-706
Session 9: Security Policies & Techniques
- William Bradley Glisson

, Ray Welland:
Web Engineering Security: Essential Elements. 707-714 - Paulina Januszkiewicz, Marek Pyka:

Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology. 715-722 - Sergio Pozo

, Rafael Ceballos, Rafael M. Gasca
:
CSP-Based Firewall Rule Set Diagnosis using Security Policies. 723-729 - Gernot Goluch, Andreas Ekelhart

, Stefan Fenz
, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa
:
CASSIS - Computer-based Academy for Security and Safety in Information Systems. 730-740
Session 10: Trust Management & Trust Model
- Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou

:
Trust in global computing systems as a limit property emerging from short range random interactions. 741-748 - Jimmy McGibney, Dmitri Botvich:

A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam. 749-756 - Simon Samwel Msanjila, Hamideh Afsarmanesh

:
HICI: An Approach for Identifying Trust Elements The case of technological trust perspective in VBEs. 757-764 - Lin Zhang, Feng Xu, Yuan Wang, Jian Lv:

A Semantic and Time Related Recommendation-Feedback Trust Model. 765-774
Session 11: Miscellaneous Applications
- Mohammad Feroz Raihan, Mohammad Zulkernine:

AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. 775-782 - Niraj Swami, Sheikh Iqbal Ahamed:

Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments. 783-790 - Rafael Páez

, Cristina Satizábal
, Jordi Forné
:
A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. 791-798 - Cesar Mauri, Toni Granollers, Agusti Solanas

:
On the Assessment of the Interaction Quality of Users with Cerebral Palsy. 799-805 - Chaobo Yang, Ming Qi:

Research and Design of Mobile Impeachment System with Semi-cryptonym. 806-811 - Shu-Ching Wang, Shyi-Ching Liang, Kuo-Qin Yan, Guang-Yan Zheng:

Efficient Malicious Agreement in a Virtual Subnet Network. 812-820
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)
- Bhavani Thuraisingham, Srinivasan Iyer:

Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. 821-828 - Emilio Soler

, Juan Trujillo
, Eduardo Fernández-Medina
, Mario Piattini
:
Application of QVT for the Development of Secure Data Warehouses: A case study. 829-836 - Marcin Gorawski, Jakub Bularz:

Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. 837-844 - Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Giuliano Bellone de Grecis, Flaviano Fiorino:

Applying a Flexible Mining Architecture to Intrusion Detection. 845-852 - Veselina G. Jecheva

, Evgeniya P. Nikolova
:
An Application of Learning Problem in Anomaly-based Intrusion Detection Systems. 853-860 - (Withdrawn) Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. 861-870

- Lillian Røstad, Øystein Nytrø

:
Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges. 871-878 - Dalia El-Mansy

, Ahmed Sameh:
A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace. 878-885 - Calin Ciufudean

, Bianca Satco
, Constantin Filote
:
Reliability Markov Chains for Security Data Transmitter Analysis. 886-894
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)
- Melanie Volkamer, Margaret McGaley:

Requirements and Evaluation Procedures for eVoting. 895-902 - Orhan Cetinkaya, Deniz Cetinkaya

:
Towards Secure E-Elections in Turkey: Requirements and Principles. 903-907 - Stefan G. Weber, Roberto Araújo, Johannes Buchmann:

On Coercion-Resistant Electronic Elections with Linear Work. 908-916 - Mariagrazia Fugini

:
A Security Model and Architecture for Multichannel E-Government Systems. 917-924 - Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben:

eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. 925-933 - Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair:

Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies. 934-940 - Martijn Warnier

, Frances M. T. Brazier, Martin Apistola, Anja Oskamp:
Secure Distributed Dossier Management in the Legal Domain. 941-947 - Elsa Estevez

, Tomasz Janowski
:
Building a Dependable Messaging Infrastructure for Electronic Government. 948-958
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)
- Rachid Guerraoui

, Michel Raynal:
A Universal Construction for Concurrent Objects. 959-966 - Bastian Braun:

FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance. 967-974 - Cristian Martín, Mikel Larrea

, Ernesto Jiménez
:
On the implementation of the Omega failure detector in the crash-recovery failure model. 975-982 - Mourad Elhadef

, Azzedine Boukerche, Hisham Elkadiki:
Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach. 983-990 - Olga Brukman, Shlomi Dolev

, Yinnon A. Haviv, Reuven Yagel:
Self-Stabilization as a Foundation for Autonomic Computing. 991-998 - Christian Engelmann

, Stephen L. Scott, Chokchai Leangsuksun, Xubin He:
On Programming Models for Service-Level High Availability. 999-1008
First International Workshop on Secure Software Engineering (SecSE 2007)
- Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis

:
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. 1009-1017 - Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri:

How can the developer benefit from security modeling? 1017-1025 - Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien:

AProSec: an Aspect for Programming Secure Web Applications. 1026-1033 - Koen Buyens, Bart De Win, Wouter Joosen:

Empirical and statistical analysis of risk analysis-driven techniques for threat management. 1034-1041 - Takao Okubo, Hidehiko Tanaka:

Secure Software Development through Coding Conventions and Frameworks. 1042-1051 - Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith:

Pastures: Towards Usable Security Policy Engineering. 1052-1059 - Kaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala:

Security Objectives within a Security Testing Case Study. 1060-1065 - Chengying Mao

, Yansheng Lu:
CppTest: A Prototype Tool for Testing C/C++ Programs. 1066-1073 - Dragan Vidakovic, Dejan Simic:

A Novel Approach to Building Secure Systems. 1074-1084
Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)
- Jan Ploski, Wilhelm Hasselbring

:
Exception Handling in an Event-Driven System. 1085-1092 - Armin Beer, Matthias Heindl:

Issues in Testing Dependable Event-Based Systems at a Systems Integration Company. 1093-1100 - Jirí Kubalík, Richard Mordinyi:

Optimizing Events Traffic in Event-based Systems by means of Evolutionary Algorithms. 1101-1107 - Dindin Wahyudin, A Min Tjoa

:
Event-Based Monitoring of Open Source Software Projects. 1108-1115 - Marcus Mor, Richard Mordinyi, Johannes Riemer:

Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management System. 1116-1123 - Roland Vecera, Szabolcs Rozsnyai, Heinz Roth:

Indexing and Search of Correlated Business Events. 1124-1134
First International Workshop on Advances in Information Security (WAIS 2007)
- Alexander Krizhanovsky, Alexander Marasanov:

An Approach for Adaptive Intrusion Prevention Based on The Danger. 1135-1142 - Rene Mayrhofer

, Martyn Welch:
A Human-Verifiable Authentication Protocol Using Visible Laser Light. 1143-1148 - Chik How Tan:

Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. 1148-1154 - Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata

, Masakatsu Nishigaki
:
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. 1155-1159 - Hyung Chan Kim, Rudrapatna S. Ramakrishna, Wook Shin, Kouichi Sakurai:

A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. 1160-1166 - Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama:

Analysis on Bleichenbacher's Forgery Attack. 1167-1174 - Yoshio Kakizaki

, Hidekazu Tsuji:
A New Method for Reducing the Revocation Delay in the Attribute Authentication. 1175-1182 - Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota:

Efficient Multiparty Computation for Comparator Networks. 1183-1189 - Orhan Cetinkaya, Ali Doganaksoy:

Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. 1190-1196 - Anders Moen Hagalisletto:

Attacks are Protocols Too. 1197-1206 - Luis Zarza, Josep Pegueroles, Miguel Soriano

:
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. 1207-1213 - Bogdan Groza, Toma-Leonida Dragomir:

On the use of one-way chain based authentication protocols in secure control systems. 1214-1221 - Nenad Stojanovski, Marjan Gusev

, Danilo Gligoroski, Svein J. Knapskog:
Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. 1222-1226 - Dong Seong Kim

, Taek-Hyun Shin, Jong Sou Park:
A Security Framework in RFID Multi-domain System. 1227-1234
Workshop on "Security in E-Learning" (SEL)
- Martin Ebner

:
E-Learning 2.0 = e-Learning 1.0 + Web 2.0? 1235-1239 - Gerald Quirchmayr:

Blended Learning Technology in Information Security Management Courses. 1240-1244 - Emmanuel A. Adigun, Jan H. P. Eloff:

Defining a Trusted Service-Oriented Network Environment. 1245-1250 - Alan Ward, Jordi Castellà-Roca

, Aleix Dorca-Josa:
Designing a Cryptographic Scheme for e-Surveys in Higher-Education Institutions. 1251-1255

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














