Home // ICIMP
ICIMP 2012, The Seventh International Conference on Internet Monitoring and Protection
Type: conference
Notes: IARIA Conference.
Editors:
Arno Wagner, Consecom AG, Switzerland
Petre Dini, Concordia University, Canada / China Space Agency Center, China
ISSN: 2308-3980
ISBN: 978-1-61208-201-1
Location: Stuttgart, Germany
Dates: from May 27, 2012 to June 1, 2012
Articles: there are 14 articles
Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels
Steffen Wendzel and Jörg Keller
keywords: network covert channel, protocol switching covert channel
Quantifying the Value of SSL Certification with Web Reputation Metrics
Jani Suomalainen
keywords: Web security; Web reputation; Web of Trust; SSL; HTTPS; certification; correlation analysis
Parameter Estimation for Heuristic-based Internet Traffic Classification
Michael Finsterbusch, Chris Richter, and Jean-Alexander Müller
keywords: flow classification, Internet traffic, traffic identification
A Light-weighted Source Address Validation Method in IPv4/IPv6 Translation
Yu Zhu, Jun Bi, and Yayuan Sun
keywords: IPv4/IPv6 translation; Anti-spoofing; Source address validation; Packet filtering; Internet Security; Access control.
Formal Treatment of Distributed Trust in Electronic Voting
Stephan Neumann and Melanie Volkamer
keywords: trust, distributed systems, formal methods, resilience, electronic voting, knowledge calculus, conspiracies
sGUTS: Simplified Grid User Trust Service for Site Selection
Ioanna Dionysiou and Harald Gjermundrod
keywords: grid computing, trust mechanisms, user perceptive
A Trust-based DRM Scheme for Content Sharing in an Open Environment
Qin Qiu, Zhi Tang, and Yinyan Yu
keywords: DRM; trust model; content sharing
A Gateway-based Access Control Scheme for Collaborative Clouds
Yongdong Wu, Vivy Suhendra, and Huaqun Guo
keywords: Virtual cloud computing; Identity management; Access control
Process Discovery and Guidance Applications of Manually Generated Logs
Stefan Schönig, Christoph Günther, and Stefan Jablonski
keywords: Process Mining, Process Monitoring, Activity Tracking, Guidance through Process Execution
Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance
María del Carmen Prudente Tixteco, Linda Karina Toscano Medina, Gualberto Aguilar Torres, and Gabriel Sánchez Pérez
keywords: fingerprint scanners; Biometric Standards; physical characteristics
Constructing Context-based Non-Critical Alarm Filter in Intrusion Detection
Yuxin Meng and Wenjuan Li
keywords: Intrusion detection; Network security; Non-critical alarm filter; Context-based system
Improving Attack Aggregation Methods Using Distributed Hash Tables
Zoltán Czirkos, Márta Rencz, and Gábor Hosszú
keywords: collaborative intrusion detection; attack correlation; peer-to-peer; distributed hash table
Engineering Security Protocols with Modelchecking – Radius-SHA256 and Secured Simple Protocol
Florian Kammueller, Glenford Mapp, Sandip Patel, and Abubaker Sadiq Sani
keywords: Modelchecking, Security Protocols
Firewall Analysis by Symbolic Simulation
Arno Wagner and Ulrich Fiedler
keywords: Firewall Analysis; Symbolic Simulation.