Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2372859guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
ARES '12: Proceedings of the 2012 Seventh International Conference on Availability, Reliability and Security
2012 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
August 20 - 24, 2012
ISBN:
978-0-7695-4775-6
Published:
20 August 2012

Reflects downloads up to 16 Oct 2024Bibliometrics
Abstract

No abstract available.

Article
Cover Art
Article
Article
Article
Article
Analyses of Two End-User Software Vulnerability Exposure Metrics

The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure ...

Article
An Adaptive Risk Control and Security Management for Embedded Real-Time System

Traditional mechanisms for risk control and task scheduling may not be very suitable for security-critical embedded real-time systems under dynamic peration environments. In this paper, we are interested in design of an adaptive risk control and ...

Article
Using Linear Support Vector Machines to Solve the Asymmetric Comparison-Based Fault Diagnosis Problem

This paper presents a new diagnosis approach, using linear support vector machines (SVMs). The objective is to identify the set of permanent faulty nodes when at most t nodes can fail simultaneously. We consider the asymmetric comparison diagnosis model ...

Article
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach

Secure initialization of sensor nodes with cryptographic keys is inherent to all security protocols and applicationsin the area of wireless sensor networks (WSN).We introduce a general framework, denoted TOPKEY, thatprovides tool assistance and performs ...

Article
On Measuring the Parasitic Backscatter of Sensor-Enabled UHF RFID Tags

Radio-frequency identification (RFID) tags have found their way into many applications. When tags implement cryptographic algorithms, side-channel analysis (SCA) attacks become a concern. Especially tags in the ultra-high frequency (UHF) range are ...

Article
Veto-based Malware Detection

Malicious software (malware) represents a threatto the security and privacy of computer users. Traditionalsignature-based and heuristic-based methods are unsuccessfulin detecting some forms of malware. This paper presents amalware detection approach ...

Article
Efficient Generic Construction of Forward-Secure Identity-Based Signature

We propose an efficient generic construction of forward-secure identity-based signature (FSIBS) that ensures unforgeability of past signatures in spite of the exposure of the current signing key. Our construction, supported by formal security analysis, ...

Article
From Computationally-proved Protocol Specifications to Implementations

This paper presents a novel framework for proving specifications of security protocols in the computational model and generating runnable implementations from such proved specifications. We rely on the computationally-sound protocol verifier CryptoVerif ...

Article
Oblivious and Fair Server-Aided Two-Party Computation

We show efficient, practical (server-aided) securetwo-party computation protocols ensuring privacy, correctnessand fairness in the presence of malicious (Byzantine) faults. Ourrequirements from the server are modest: to ensure privacyand correctness, we ...

Article
A Group Signature Based Electronic Toll Pricing System

With the prevalence of GNSS technologies, nowadays freely available for everyone, location-based vehicle services such as electronic tolling pricing systems and pay-as-you-drive services are rapidly growing. Because these systems collect and process ...

Article
Anonymous Communication by Branch-and-Bound

Communication in which the sender and receiver are both anonymous is usually achieved by using a telescoping construction. The channel is established hop-by-hop, where each relay gets to know the previous and next node along the route. All previously ...

Article
An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites

To address privacy threats stemming from interacting with other users on Social Networking Sites (SNS), effective Social Identity Management (SIdM) is a key requirement. SIdM refers to the deliberate and targeted disclosure of personal attribute values ...

Article
An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides

Mining approaches, such as role mining or organizational mining, can be applied to derive permissions and roles from a system's configuration or from log files. In this way, mining techniques document the current state of a system and produce current-...

Article
Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications

The use of role engineering has grown in importance with the expansion of highly abstracted access control frameworks in organizations. In particular, the use of role mining techniques for the discovery of roles from previously deployed authorizations ...

Article
A Coordination-Driven Authorization Framework for Space Containers

Collaborative applications usually involve multiple autonomous processes that have to coordinate themselves over the Internet in an efficient way. For such systems, shared tuple spaces provide a highly flexible coordination medium that enables the ...

Article
RIM: A Method to Defend from JIT Spraying Attack

As a code reuse technique, JIT spraying attack becomes popular on the JITed VM (Virtual Machine) (e.g., Javascript Engine, Flash Engine). Using a bug in web applications, an attacker can reuse the code generated by the JIT (Just-In-Time) compiler, which ...

Recommendations