Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

First International Conference on Availability, Reliability and Security (ARES'06)

20-22 April 2006

Filter Results

Displaying Results 1 - 25 of 144
  • Proceedings. The First International Conference on Availability, Reliability and Security

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • First International Conference on Availability, Reliability and Security - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • First International Conference on Availability, Reliability and Security - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • First International Conference on Availability, Reliability and Security - Table of contents

    Publication Year: 2006, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Message from the Organizing Committee

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • ARES and Workshops Committees

    Publication Year: 2006, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Risk management and risk assessment at ENISA: issues and challenges

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1088 KB) | HTML iconHTML

    In this paper, the main directions followed in current and future work in the area of risk management and risk assessment at ENISA is presented. The efforts in this area range from an initial inventory of risk management/risk assessment methods and tools up to the elaboration of interoperability, comparability and scalability issues. The technical issues of risk management/risk assessment that are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model driven security

    Publication Year: 2006, Page(s):1 pp. - 4
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB)

    Summary form only given. We present an approach to integrating security into the system design process. Namely, models are made of system designs along with their security requirements, and security architectures are automatically generated from the resulting security-design models. We call the resulting approach "model driven security" as it represents a specialization of model driven development... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust based risk management for distributed system security - a new approach

    Publication Year: 2006
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Security measures alone are not sufficient for counteracting malicious behaviors in distributed systems. The new trend is to use economical models (mainly game-theoretic models) to characterize such malicious behaviors in the security context with the aim to mitigate the risk introduced by such malicious behaviors. However, there is a general lack in the integration of risk and security and this h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RATING: rigorous assessment of trust in identity management

    Publication Year: 2006
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Trust can be an important aspect for decision-making in the Internet. This paper proposes a new trust establishment model for identity management on the Internet. After discussing the challenges and opportunities of a trust model in identity management, we describe our trust model in detail. The fundamental difference to existing models (or the lack of) in identity management is the establishment ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provably secure anonymous access control for heterogeneous trusts

    Publication Year: 2006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Privacy has been a central concern of ubiquitous (pervasive) computing. Although the boundary between privacy and publicity dynamically moves depending on the context in which the issue is considered, access control, which is one of the most fundamental functionality constituting ubiquitous computing, is required to support perfect privacy, that is, anonymity and unlinkability. This paper presents... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Event Agreement (SEA) protocol for peer-to-peer games

    Publication Year: 2006
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Secure updates in a peer-to-peer game where all of the players are untrusted offers a unique challenge. We analyse the NEO protocol which was designed to accomplish the exchange of update information among players in a fair and authenticated manner. We show that of the five forms of cheating it was designed to prevent, it prevents only three. We then propose an improved protocol which we call Secu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Satisfiability and trustworthiness of peers in peer-to-peer overlay networks

    Publication Year: 2006
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Service supported by an object is modeled to be a set of methods and quality of service (QoS). In addition to finding a peer which holds a target object, it is critical to discuss what peer is allowed to manipulate the target object in what method. In this paper, we take an acquaintance approach to finding and manipulating objects in P2P overlay networks. An acquaintance peer of a peer p is a peer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tamper-resistant replicated peer-to-peer storage using hierarchical signatures

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Peer-to-peer-based file replication is a proven approach to provide cooperative robust backup for data: if one peer does not have a specific datum, another one might. If enough peers participate, the overall system can survive isolated failures. Applying this approach to distributed file integrity checking (or similar security-sensitive areas) requires that current and untampered information is di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Censorship-resistant and anonymous P2P filesharing

    Publication Year: 2006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Instead, only fragments that do not contain any information about the original file in the information theoretic sense are uploaded. Reconstruction of a file requires all fragments it has been decomposed into. By this, in conju... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dependable device discovery approach for pervasive computing middleware

    Publication Year: 2006
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Distributed applications and middleware services targeted for mobile devices must use device discovery service to provide any kind of service to other devices. Device discovery algorithms developed for wired networks are not suitable for mobile ad-hoc networks of pervasive computing environments. This research proposes a dependable device discovery mechanism for the middleware of the applications ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Single sign-on framework for AAA operations within commercial mobile networks

    Publication Year: 2006
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Network operators and service providers are interested in mobile networks due to the number of new services that can be deployed using the infrastructure of the embedded network. Probably, the most attractive service is the seamless Internet connectivity offered by NEMO, the network mobility protocol. Such service would allow passengers to benefit from a seamless Internet connectivity while they a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A selector method for providing mobile location estimation services within a radio cellular network

    Publication Year: 2006
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Mobile location estimation or mobile positioning is becoming an important service for a mobile phone network. It is well-known that GPS can provide accurate location estimation, but it is also a known fact that GPS does not perform well in urban areas like downtown New York and cities like Hong Kong. Then many mobile location estimation approaches based on radio cellular networks have been propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guidelines for biometric recognition in wireless system for payment confirmation

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Biometric systems are widely used today in different interesting applications. Even though the hotel industry has some instances of biometric room access systems, hotel payment confirmation has yet to be implemented. To find how such a biometric system should be designed, we theoretically analyze different models of biometric systems. Fingerprint systems used alone and with gender filtering, face ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extended verifiable secret redistribution protocol for archival systems

    Publication Year: 2006
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Existing protocols for archival systems make use of verifiability of shares in conjunction with a proactive secret sharing scheme to achieve high availability and long term confidentiality, besides data integrity. In this paper, we extend an existing protocol (Wong et al. [2002]) to take care of more realistic situations. For example, it is assumed in the protocol of Wong et al. that the recipient... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of current VPN technologies

    Publication Year: 2006
    Cited by:  Papers (11)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1144 KB) | HTML iconHTML

    This paper deals with current virtual private network (VPN) technologies, such as Internet protocol security (IPSec), layer two tunneling protocol (L2TP), and point to point tunneling protocol (PPTP). Furthermore, the VPN solution of the Austrian company Phion Information Technologies is presented. After a short introduction to the basics of each protocol, the strengths and weaknesses of each tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of quantum cryptography in 802.11 networks

    Publication Year: 2006
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Quantum cryptography is considered as a promising solution towards absolute security in long-term cryptosystems. While the application of quantum cryptography in fiber networks has significant advances, research on the application of quantum cryptography in mobile networks is still premature. In this paper, we analyze the interests of using quantum technique for the distribution of encryption keys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Availability constraints for avionic data buses

    Publication Year: 2006
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    The three traditional objectives of computer security are confidentiality, integrity and availability. Availability can be defined as the prevention of denial of service. Confidentiality and integrity have been addressed in several theoretical works whereas the concept of availability has not been much investigated by the scientific community. This paper is an attempt to define through a case stud... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing DNS services through system self cleansing and hardware enhancements

    Publication Year: 2006
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Domain name systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are exploited by frequent, targeted attacks. The software vulnerabilities of DNS together with the constant innovation and morphing of cyber attack techniques necessitate the consideration of the worst case scenarios: there will... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalized security for e-services

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    The growth of the Internet has been accompanied by a proliferation of e-services. The increasing attacks on these services by malicious individuals have highlighted the need for security. The security requirements of an e-service may be specified by the service provider in a security policy. However, a service consumer may have security preferences that are not reflected in this policy. In order f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.