Home // SECURWARE
SECURWARE 2011, The Fifth International Conference on Emerging Security Information, Systems and Technologies
Type: conference
Notes: IARIA Conference.
Editors:
Masaru Takesue, Hosei University, Japan
Rainer Falk, Siemens AG - München, Germany
ISSN: 2162-2116
ISBN: 978-1-61208-146-5
Location: Nice/Saint Laurent du Var, France
Dates: from August 21, 2011 to August 27, 2011
Articles: there are 21 articles
Lightweight Detection of Spamming Botnets
Masaru Takesue
keywords: Spam, bot, botnet, clustering, fingerprint, spam-specific word
Detecting & Defeating Split Personality Malware
Kalpa Vishnani, Alwyn R. Pais, and Radhesh Mohandas
keywords: - Detecting Virtual Machines, Vmware, Analysis Aware Malware, Split Personality Malware, guest OS, host OS.
Proposal of n-gram Based Algorithm for Malware Classification
Abdurrahman Pektaş, Mehmet Eriş, and Tankut Acarman
keywords: malware; n-gram based; classification
Protecting Remote Component Authentication
Rainer Falk and Steffen Fries
keywords: device authentication, counterfeiting, tunneled authentication
Extended Fault Based Attack against Discrete Logarithm Based Public Key Cryptosystems
Sung-Ming Yen and Chi-Dian Wu
keywords: exponentiation algorithm; hardware fault attack; physical attack; public key cryptosystem
Implementations of Block Cipher SEED on Smartphone Operating Systems
HwanJin Lee, DongHoon Shin, and Hyun-Chul Jung
keywords: SEED; Windows mobile; iOS; Android; implementation; blockcipher
An Approach for Enhancing the Security of Remotely Accessible, Sensitive Services with On-Site Monitoring
Tuomas Kekkonen and Teemu Kanstrén
keywords: network monitoring, security situation awareness, security management, security policy, network capture
Toward Engineering of Security of Information Systems: The Security Acts
Wilson Goudalo
keywords: security acts; security engineering; BPM; enterprise information system security.
Establishing Authentication Trust in Open Environment Using Social Approach
Hidehito Gomi
keywords: trust metric, identity federation, delegation
Migration towards a more secure authentication in the Session Initiation Protocol
Lars Strand, Wolfgang Leister, and Alan Duric
keywords: VoIP, SIP, authentication, PAKE, SASL
PASER: Position Aware Secure and Efficient Route Discovery Protocol for Wireless Mesh Networks
Mohamad Sbeiti, Andreas Wolff, and Christian Wietfeld
keywords: Secure routing protocols; wireless mesh networks; emergency and rescue operations.
Reliablity and Survivability of Wireless Sensor Network Using Security Adaptation Reference Monitor (SARM)
Tewfiq El Maliki and Jean-Marc Seigneur
keywords: Framework, Autonomic, Security adaptation, Sinkhole, Sensor Network
Federated Identity Management for Android
Anders Fongen
keywords: Identity management, Android, Authentication
A Scalable Architecture for Countering Network-Centric Insider Threats
Faisal M. Sibai and Daniel A. Menasce
keywords: insider threat; scalability; network security.
A Framework for Protocol Vulnerability Condition Detection
Yuxin Meng and Lam for Kwok
keywords: intrusion detection; vulnerability analysis
Access Control in BitTorrent P2P Networks Using the Enhanced Closed Swarms Protocol
Vladimir Jovanovikj, Dušan Gabrijelčič, and Tomaž Klobučar
keywords: access control, P2P, BitTorrent, flexible policy, Closed Swarms
Enhancing System-Called-Based Intrusion Detection with Protocol Context
Anyi Liu, Xuxian Jiang, Jing Jin, Feng Mao, and Jim Chen
keywords: Intrusion detection; System calls; Protocol specification; Context
StegoWeb: Towards the Ideal Private Web Content Publishing Tool
Tamás Besenyei, Ádám Máté Földes, Gábor György Gulyás, and Sándor Imre
keywords: Web 2.0; web privacy; user content; steganography
End User Computing Environments for Improved Information Security
Pankaj Goyal
keywords: information security; data loss prevention; insider threats; end-user computing environment
Using Avatars for Improved Authentication with Challenge Questions
Nicholas Micallef and Mike Just
keywords: authentication, avatar, security, usability
Application of Scenario-driven Role Engineering to the MinaBASE Process Knowledge Database
Daniel Kimmig, Andreas Schmidt, Klaus Bittner, and Markus Dickerhof
keywords: Data confidentiality and integrity;knowledge management; RBAC;