Home // SECURWARE
SECURWARE 2012 , The Sixth International Conference on Emerging Security Information, Systems and Technologies
Type: conference
Notes: IARIA Conference.
Editors:
Rainer Falk, Siemens AG - München, Germany
Petre Dini, Concordia University, Canada / China Space Agency Center - Beijing, China
ISSN: 2162-2116
ISBN: 978-1-61208-209-7
Location: Rome, Italy
Dates: from August 19, 2012 to August 24, 2012
Articles: there are 26 articles
Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications
Feng Zhang, Ioannis Kounelis, and Sead Muftic
keywords: mobile; generic; secure; modular.
Security Aspects for Large Scale Distributed Environments
Giorgos Adam, Christos Bouras, Ioannis Kalligeros, Kostas Stamos, and Ioannis Zaoudis
keywords: Bandwidth on Demand; AAI; security; Quality of Service
Identification and Implementation of Authentication and Authorization Patterns in the Spring Security Framework
Aleksander Dikanski, Roland Steinegger, and Sebastian Abeck
keywords: security patterns; security framework; security engineering; authorization; authentication
Securityware: Towards an Architecture for User-Centric Approach
Ali Hammami and Noemie Simoni
keywords: Security as a service; Security architecture; Secure dynamic service composition; Secure seamless and unique session.
Realtime-Aware Control Unit Network Attachment Module
Rainer Falk and Steffen Fries
keywords: security; device authentication; real-time; network access authentication; firewall
Improving Online Account Security: Implementing Policy and Process Changes
Pankaj Goyal
keywords: online security; transaction security; identity security; security policy; financial systems; intrusion tolerance
FIELDS : Flow Intrusion Extrusion Largescale Detection System
Nicolas Grenèche, Quentin Narvor, Jérémy Briffaut, and Christian Toinard
keywords: Intrusion Detection; Network Forensic; Network Capture; Attack Prevention
Towards Assisted Remediation of Security Vulnerabilities
Gabriel Serme, Anderson Santana De Oliveira, Marco Guarnieri, and Paul El Khoury
keywords: AOP, Software Engineering, Static Analysis, Vulnerability Remediation
Risk Identification for an Information Security Management System Implementation
Ramli Nor Aza and Abdul Aziz Normaziah
keywords: ISMS; information security risk; asset identification; threat; risk assessment
A QTE-based Solution to Keylogger Attacks
Chien-Wei Hung, Fu-Hau Hsu, Shih-Jen Chen, Chang-Kuo Tso, Yan-Ling Hwang, Po-Ching Lin, and Li-Pin Hsu
keywords: Authentication, computer security, keylogger, privacy
AWESOME - Automated Web Emulation for Secure Operation of a Malware-Analysis Environment
Martin Brunner, Christian Martin Fuchs, and Sascha Todt
keywords: malware collection; malware analysis and defense.
Preserving Continuity of Services Exposed to Security Incidents
Dariusz Caban and Tomasz Walkowiak
keywords: system dependability, simulation, reconfiguration
Accurate Retargetable Decompilation Using Additional Debugging Information
Jakub Křoustek, Peter Matula, Jaromír Končický, and Dušan Kolář
keywords: decompilatiom; debugging information; PDB; DWARF; Lissom
An Architecture Based on Agent-manager Model for Automated Data Collection of Security Metrics
Liniquer Kavrokov Vieira, Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Gean Breda, and Leonardo Mendes
keywords: computer network; security metrics; security management; automated data collection.
Experimental Evaluations of the Impact of High availability on the Quality of Protection of Hybrid Clouds
Syed Naqvi, Michael Van de Borne, and Arnaud Michot
keywords: Cloud computing, security architecture, performance parameters
Characterizing and Predicting Internet Users Hidden Behaviors with Markovian Models
Paulo Salvador, António Nogueira, and Eduardo Rocha
keywords: User profiling; wavelets; multiscaling behavior; multivariate Gaussian distributions; Markovian modeling; behavior prediction
An Empirical Study of Connections Between Measurements and Information Security
Rodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão, Gean Davis Breda, and Leonardo de Souza Mendes
keywords: Network and Security Management; Security Metrics; Empirical Study; Security Incidents; Intrusion Prevention Systems
Semantic Matching of Security Policies to Support Security Experts
Othman Benammar, Hicham Elasri, and Abderrahim Sekkaki
keywords: Security-based policy; security management; ontology alignment; ontology enrichment.
Statistical Disclosure: Improved, Extended, and Resisted
Navid Emamdoost, Mohammad Sadeq Dousti, and Rasool Jalili
keywords: Privacy; Anonymity; Mix-Net; SDA.
Compacting Security Signatures for PIGA IDS
Pascal Berthomé, Jérémy Briffaut, and Pierre Clairet
keywords: security; operating system; modular decomposition
A Data Centric Security Cycle Model for Data Loss Prevention of Custodial Data and Company Intellectual Property
Mathew Nicho and Avinash Advani
keywords: IS Security; data breaches; data centric security
Securing Policy Negotiation for Socio-Pervasive Business Microinteractions
Mitja Vardjan, Miroslav Pavleski, and Jan Porekar
keywords: security; trust; policy agreement; policy negotiation.
ComSen: A Detection System for Identifying Compromised Nodes in Wireless Sensor Networks
Yi-Tao Wang and Rajive Bagrodia
keywords: wireless sensor network; ComSen; intrusion detection system;
Case Study of a Black Hole Attack on 6LoWPAN-RPL
Karishma Chugh, Aboubaker Lasebae, and Jonathan Loo
keywords: IoT; 6LowPAN; Contiki; RPL; ContikiRPL; Wireless sensor network; Black hole attack
Construction of Optimal 4-bit S-boxes by Quasigroups of Order 4
Hristina Mihajloska and Danilo Gligoroski
keywords: lightweight cryptography; quasigroups; quasigroup string transformations; S-boxes
Analyzing the Impact of Security Protocols on Wireless LAN with Multimedia Applications
Thaier Hayajneh, Samer Khasawneh, Bassam Jamil, and Awni Itradat
keywords: WLAN; WEP; WPA1; WPA2; delay; jitter; multimedia traffic.