Invited Papers |
Service Dependencies in Information Systems Security / Hervé Debar ; Nizar Kheir ; Nora Cuppens-Boulahia ; Frédéric Cuppens |
Secure Applications without Secure Infrastructures / Dieter Gollmann |
Integrating Types and Specifications for Secure Software Development / Greg Morrisett |
Cryptography for Network Security: Failures, Successes and Challenges / Bart Preneel |
Group-Centric Models for Secure and Agile Information Sharing / Ravi Sandhu ; Ram Krishnan ; Jianwei Niu ; William H. Winsborough |
Security Modeling and Covert Channels |
A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors / Leonid Domnitser ; Nael Abu-Ghazaleh ; Dmitry Ponomarev |
Attack and Defense Modeling with BDMP / Ludovic Piètre-Cambacédès ; Marc Bouissou |
QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems / Vidyaraman Sankaranarayanan ; Shambhu Upadhyaya ; Kevin Kwiat |
Problems of Modeling in the Analysis of Covert Channels / Alexander Grusho ; Nikolai Grusho ; Elena Timonina |
Security Policies and Formal Analysis of Security Properties |
Policy-Based Design and Verification for Mission Assurance / Shiu-Kai Chin ; Sarah Muccio ; Susan Older ; Thomas N.J. Vestal |
Using Equivalence Relations for Corrective Enforcement of Security Policies / Raphaël Khoury ; Nadia Tawbi |
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus / Devrim Unal ; Ozan Akar ; M. Ufuk Caglayan |
Authentication, Authorization, Access Control and Public Key Cryptography |
Gredentials Management for High-Value Transactions / Glenn Benson ; Sean Croston ; Karthick Jayaraman |
A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols / Dmitriy N. Moldovyan ; Nikolay A. Moldovyan |
Genetic Optimization of Access Control Schemes in Virtual Local Area Networks / Krzysztof Sacha ; Igor Saenko ; Igor Kotenko |
Intrusion and Malware Detection |
Intellectual Intrusion Detection with Sequences Alignment Methods / Yaroslav A. Markov ; Maxim O. Kalinin |
Symptoms-Based Detection of Bot Processes / Jose Andre Morales ; Erhan Kartaltepe ; Shouhuai Xu |
A Comparison of Feature-Selection Methods for Intrusion Detection / Hai Thanh Nguyen ; Slobodan Petrovic ; Katrin Franke |
From NLP (Natural Language Processing) to MLP (Machine Language Processing) / Peter Teuft ; Udo Payer ; Guenter Lackner |
Security of Multi-agent Systems and Software Protection |
Secure Multi-Agent System for Multi-Hop Environments / Stefan Kraxberger ; Peter Danner ; Daniel Hein |
In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware / Antonio Muñoz ; Antonio Maña ; Pablo Antón |
Security and Scalability of Remote Entrusting Protection / Vasily Desnitsky |
Adaptive Security, Security Analysis and Virtualization |
A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks / Wojciech Molisz ; Jacek Rak |
Predictive Security Analysis for Event-Driven Processes / Roland Rieke ; Zaharina Stoynova |
Virtual Environment Security Modeling / Dmitry Zegzhda ; Ekaterina Rudina |
Clarifying Integrity Control at the Trusted Information Environment / Dmitry P. Zegzhda ; Peter D. Zegzhda |
Author Index |
Invited Papers |
Service Dependencies in Information Systems Security / Hervé Debar ; Nizar Kheir ; Nora Cuppens-Boulahia ; Frédéric Cuppens |
Secure Applications without Secure Infrastructures / Dieter Gollmann |
Integrating Types and Specifications for Secure Software Development / Greg Morrisett |
Cryptography for Network Security: Failures, Successes and Challenges / Bart Preneel |
Group-Centric Models for Secure and Agile Information Sharing / Ravi Sandhu ; Ram Krishnan ; Jianwei Niu ; William H. Winsborough |