Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on

10-13 April 2007

Filter Results

Displaying Results 1 - 25 of 162
  • The Second International Conference on Availability, Reliability and Security - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • The Second International Conference on Availability, Reliability and Security - Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (372 KB)
    Freely Available from IEEE
  • The Second International Conference on Availability, Reliability and Security - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • The Second International Conference on Availability, Reliability and Security - Table of contents

    Publication Year: 2007, Page(s):v - xvi
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Message from the Organizing Committee

    Publication Year: 2007, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • ARES and Workshops Committees

    Publication Year: 2007, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems

    Publication Year: 2007, Page(s):3 - 10
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organizations, humans, software agents from different security domains seek to access and share resources in a secure and controlled way. Automated trust negotiation (ATN) is one approach that has been proposed for trust discovery and realisation, which enables entities... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why Trust is not Proportional to Risk

    Publication Year: 2007, Page(s):11 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6837 KB) | HTML iconHTML

    Trust is inherently related to risk, but for trust assessment to be integrated with the management of the risks involved in trust based cooperation, the exact relation must be well understood. Existing literature on trust management is neither clear nor unambiguous on this issue. This paper discusses notions of trust as presented within the disciplines of sociology and economics for the purpose of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Trust to Dependability through Risk Analysis

    Publication Year: 2007, Page(s):19 - 26
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    The importance of critical systems has been widely recognized and several efforts are devoted to integrate dependability requirements in their development process. Such efforts result in a number of models, frameworks, and methodologies that have been proposed to model and assess the dependability of critical systems. Among them, risk analysis considers the likelihood and severity of failures for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic trust domains for secure, private, technology-assisted living

    Publication Year: 2007, Page(s):27 - 34
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Large scale distributed systems comprising many administration domains have been well-researched. An example is a national health service, with domains such as primary care practices, hospitals, specialist clinics, etc. A new and relatively unexplored scenario is technology-assisted living, in which domains are small, dynamically created, and is associated with units of personal living. There is a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Trust Model for Enhancing Security in Distributed Systems

    Publication Year: 2007, Page(s):35 - 42
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    We propose a hybrid trust model for enhancing security in distributed applications by combining the "hard" and "soft" trust relationships. The motivation is to compensate for the drawbacks associated with individual hard trust and soft trust models. We develop a formal hybrid trust model for specifying the hybrid trust relationships and associated operations. The new model provides a flexible way ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reliable Component-Based Architecture for E-Mail Filtering

    Publication Year: 2007, Page(s):43 - 52
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (409 KB) | HTML iconHTML

    A three-component architecture for the classification and filtering of unsolicited bulk and commercial e-mail ("spam") is introduced. The first component, an enhanced self-learning variant of greylisting, sets the stage for the following feature extraction and classification components. Through the temporary rejection of selected messages by the greylisting component time becomes available for an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Availability and Performance of the Adaptive Voting Replication

    Publication Year: 2007, Page(s):53 - 60
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    Replication is used to enhance availability and performance in distributed systems. Replica consistency and data integrity (constraint consistency) are correctness criteria for data-centric distributed systems. If consistency needs to be ensured all time, such systems soon become (partially) unavailable if node and link failures occur. However, some applications exist (e.g., in control engineering... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Stream Processing Analysis in High Availability Context

    Publication Year: 2007, Page(s):61 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Not so long ago data warehouses were used to process data sets loaded periodically during ETL process (extraction, transformation and loading). We could distinguish two kinds of ETL processes: full and incremental. Now we often have to process real-time data and analyse them almost on-the-fly, so the analyses are always up to date. There are many possible applications for real-time data warehouses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing Network Partition-Aware Fault-Tolerant CORBA Systems

    Publication Year: 2007, Page(s):69 - 76
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    The current standard for fault-tolerance in the Common Object Request Broker Architecture (CORBA) does not support network partitioning. However, distributed systems, and those deployed on wide area networks in particular, are susceptible to network partitions. The contribution of this paper is the description of the design and implementation of a CORBA fault-tolerance add-on for partitionable env... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure Recovery in Cooperative Data Stream Analysis

    Publication Year: 2007, Page(s):77 - 84
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    We present a failure recovery framework for System S, a large-scale stream data analysis environment. It is intended to support multiple sites, which have their own local administration and goals. However, it is beneficial for these sites to cooperate with each other, especially in the presence of various failures. Our ultimate goal is to support automatic, timely failure recovery through cooperat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Recovery Protocol for Middleware Replicated Databases Providing GSI

    Publication Year: 2007, Page(s):85 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Middleware database replication is a way to increase availability and afford site failures for dynamic content Websites. There are several replication protocols that ensure data consistency for these systems. The most attractive ones are those providing generalized snapshot isolation (GSI), as read operations never block. These replication protocols are based on the certification process, however,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revisiting Hot Passive Replication

    Publication Year: 2007, Page(s):93 - 102
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Passive replication has been extensively studied in the literature. However, there is no comprehensive study yet with regard to its degree of communication synchrony. Therefore, we propose a new, detailed classification of hot passive replication protocols, including a survey of the fault tolerance and performance of each class View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reputation Management Survey

    Publication Year: 2007, Page(s):103 - 111
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the uncertainty and risk inherent in the environment. Reputation systems provide essential input for computational trust as predictions on future behaviour based on the past actions of a peer In order to analyze the maturity of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dirichlet Reputation Systems

    Publication Year: 2007, Page(s):112 - 119
    Cited by:  Papers (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (451 KB) | HTML iconHTML

    Reputation systems can be used in online markets and communities in order to stimulate quality and good behaviour as well as to sanction poor quality and bad behaviour. The basic idea is to have a mechanism for rating services on various aspects, and a way of computing reputation scores based on the ratings from many different parties. By making the reputation scores public, such systems can assis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing

    Publication Year: 2007, Page(s):120 - 127
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked Web site to disclose personal information. Existing solutions proposed against this kind of attack can, however, hardly counter the new generation of sophisticated malware phishing attacks, e.g., pharming Trojans, designed to target certain services. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Anonymous Union Computation Among Malicious Partners

    Publication Year: 2007, Page(s):128 - 138
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (561 KB) | HTML iconHTML

    When applications require a union calculation of different distributed datasets, two requirements are often necessary to fulfil: anonymity and security. Anonymity means for scenarios with more than 2 participants that the owner of a certain data item cannot be identified. Security means that no participant can prevent that data items of other participants will be included in the union set. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications

    Publication Year: 2007, Page(s):139 - 146
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    Network operators gradually open their interfaces to formerly hidden services. This fosters the development of a new class of mobile applications that take into account user's location and presence information. However, this development also raises problems especially the lack of protection of privacy in location-based services. This paper proposes a service architecture that is aimed at overcomin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy in Pervasive Computing and Open Issues

    Publication Year: 2007, Page(s):147 - 154
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Privacy appears as a major issue for pervasive computing applications. Several models have been proposed to address privacy challenges. Successful design requires awareness of the technology's users and that their desires and concerns are understood. This is difficult as few empirical researches exist about potential pervasive users that designers can use. Complicating design further is the fact t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Dependent Access Control for Contextual Information

    Publication Year: 2007, Page(s):155 - 161
    Cited by:  Papers (10)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Following Mark Weiser's vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at all. The gathering and disclosure of contextual information on the one hand enables the improvement of system behaviour towards a more autonomous and adaptive behaviour but on the other hand raises privacy issues by disclosing persona... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.