Invited Papers |
ForNet: A Distributed Forensics Network / K. Shanmugasundaram ; N. Memon ; A. Savant ; H. Bronnimann |
Usage Control: A Vision for Next Generation Access Control / R. Sandhu ; J. Park |
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL / T. Kosiyatrakul ; S. Older ; P. Humenn ; S.-K. Chin |
Complexity Problems in the Analysis of Information Systems Security / A. Slissenko |
A Behavior-Based Approach to Securing Email Systems / S.J. Stolfo ; S. Hershkop ; K. Wang ; O. Nimeskern ; C.-W. Hu |
Real-Time Intrusion Detection with Emphasis on Insider Attacks / S. Upadhyaya |
Mathematical Models and Architectures for Computer Network Security |
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols / S. Bistarelli ; I. Cervesato ; G. Lenzini ; F. Martinelli |
GRID Security Review / L. Gymnopoulos ; S. Dritsas ; S. Gritzalis ; C. Lambrinoudakis |
A Knowledge-Based Repository Model for Security Policies Management / S. Kokolakis ; D. Gritzalis |
Symbolic Partial Model Checking for Security Analysis |
Rule-Based Systems Security Model / M. Smirnov |
Logical Resolving for Security Evaluation / P.D. Zegzhda ; D.P. Zegzhda ; M.O. Kalinin |
Intrusion Detection |
Enhanced Correlation in an Intrusion Detection Process / S. Benferhat ; F. Autrel ; F. Cuppens |
Safeguarding SCADA Systems with Anomaly Detection / J. Bigham ; D. Gamez ; N. Lu |
Experiments with Simulation of Attacks against Computer Networks / I. Kotenko ; E. Man'kov |
Detecting Malicious Codes by the Presence of Their "Gene of Self-replication" / V.A. Skormin ; D.H. Summerville ; J.S. Moronski |
Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences / K. Wee ; B. Moon |
Public Key Distribution, Authentication, Access Control |
Distributed Access Control: A Logic-Based Approach / S. Barker |
Advanced Certificate Status Protocol / D.H. Yum ; J.E. Kang ; P.J. Lee |
Key History Tree: Efficient Group Key Management with Off-Line Members / A. Lain ; V. Borisov |
A Certificate Status Checking Protocol for the Authenticated Dictionary / J.L. Munoz ; J. Forne ; O. Esparza ; M. Soriano |
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach / R. Wolf ; M. Schneider |
Cryptography |
A Signcryption Scheme Based on Secret Sharing Technique / M. Al-Ibrahim |
A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem / P. Caballero-Gil ; C. Hernández-Goya |
Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property / Y.D. Ko ; D.J. Hong ; S.H. Hong ; S.J. Lee ; J.L. Lim |
Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper / V. Korzhik ; V. Yakovlev ; A. Sinuk |
On Cipher Design Based on Switchable Controlled Operations / N.A. Moldovyan |
Elliptic Curve Point Multiplication / A. Rostovtsev ; E. Makhovenko |
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation / N. Sklavos ; A.A. Moldovyan ; O. Koufopavlou |
Steganography |
Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel / V. Gorodetsky ; V. Samoilov |
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation / K. Zhang ; S. Wang ; X. Zhang |
Digital Watermarking under a Filtering and Additive Noise Attack Condition / V. Korzhik, G ; . Morales-Luna ; I. Marakova ; C. Patino-Ruvalcaba |
Data Hiding in Digital Audio by Frequency Domain Dithering |
Steganography with Least Histogram Abnormality |
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences |
Short Papers |
Authentication of Anycast Communication / A. Cerny |
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy / R. Ando ; Y. Takefuji |
Construction of the Covert Channels / A. Grusho ; E. Timonina |
Privacy and Data Protection in Electronic Communications / L. Mitrou ; K. Moulinos |
Multiplier for Public-Key Cryptosystem Based on Cellular Automata / H.S. Kim ; S.H. Hwang |
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols / S. Kumar ; V. Marbukh |
Alert Triage on the ROC / F.J. Martin ; E. Plaza |
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64 / N.D. Goots ; B.V. Izotov |
Immunocomputing Model of Intrusion Detection / Y. Melnikov ; A. Tarakanov |
Agent Platform Security Architecture / G. Santana ; L.B. Sheremetov ; M. Contreras |
Support Vector Machine Based ICMP Covert Channel Attack Detection / T. Sohn ; T. Noh ; J. Moon |
Computer Immunology System with Variable Configuration / S.P. Sokolova ; R.S. Ivlev |
Author Index |
Invited Papers |
ForNet: A Distributed Forensics Network / K. Shanmugasundaram ; N. Memon ; A. Savant ; H. Bronnimann |
Usage Control: A Vision for Next Generation Access Control / R. Sandhu ; J. Park |