]> ARES 2006 - http://www.ares-conf.org <br/><br/> ARES 2006 will be held in conjunction with AINA 2006 (The IEEE 20th International Conference on Advanced Information Networking and Applications (http://www.aina-conference.org/2006/) at the Vienna University of Technology. <br/> en ARES 2006 Advanced Programme http://www.ares-conf.org/?q=Programme <h3>Presentation Notices</h3> <p>Paper presentations are 20 minutes and 5 minutes for questions and discussions.</p> <h3>Technical Equipments (at the conference's hall)</h3> <li>Laptop Computer</li> <li>LCD/Data Projector</li> <li>CD/DVD ROM Drive</li> <li>USB Flash Drive</li> <h3>WLAN and Internet Access</h3> <p>The conference venue is covered by a wireless local area network.<br /> Furthermore, you can use computer terminals in the internet rooms at the conference venue.</p> <h1>Advance Program of ARES 2006 (April 20, 2006 - April 22, 2006)</h1> <h2>April 20, 2006</h2> <h3>8:00 - 9:00 Registration</h3> <h3>9:00 - 9:15 Welcome and Opening Ceremony </h3> <p> ARES PC Co-Chair</p> <h3>9:15 - 10:55 Parallel Sessions: </h3> <p><b><em>Session A1: # Trust Management </em></b></p> <p>1. Trust Based Risk Management for Distributed System Security - A New Approach.<br /> Ching Lin (Macquarie University, Australia), Vijay Varadharajan (Macquarie University, Australia)</p> <p>2. RATING: Rigorous Assessment of Trust in Identity Management.<br /> Rajarajan Sampath (International University), Deepak Goel (Banaras Hindu University)</p> <p>3. Provably secure anonymous access control for heterogeneous trusts.<br /> Kilho Shin (The University of Tokyo), Hiroshi Yasuda (The University of Tokyo)</p> <p><b><em>Session B1: # P2P Systems </em></b></p> <p>1. A Secure Event Agreement (SEA) protocol for peer-to-peer games.<br /> Amy Corman (University of Melbourne), Scott Douglas (University of Melbourne), Peter Schachte (University of Melbourne), Vanessa Teague (University of Melbourne)</p> <p>2. Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay Networks.<br /> Yoshio Nakajima (Tokyo Denki University), Kenichi Watanabe (University of California, Irvine), Naohiro Hayashibara (Tokyo Denki University), Tomoya Enokido (Rissho University), Makoto Takizawa (Tokyo Denki University), S.Misbah Deen (University of Keele)</p> <p>3. Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures.<br /> Alexander Zangerl (Bond University)</p> <p>4. Censorship-Resistant and Anonymous P2P Filesharing.<br /> Regine Endsuleit (Universität Karlsruhe (TH)), Thilo Mie (Universität Karlsruhe (TH))</p> <p><b><em>Session C1: # Mobile Network and Pervasive Systems </em></b></p> <p>1. A Dependable Device Discovery Approach for Pervasive Computing Middleware.<br /> Sheikh Ahamed (Marquette University, USA), Mohammad Zulkernine (Queen's University, Canada), Suresh Anamanamuri (arquette University, USA)</p> <p>2. Single sign-on framework for AAA operations within commercial mobile networks.<br /> Saber Zrelli (JAIST), Yoichi Shinoda (JAIST)</p> <p>3. A Selector Method for Providing Mobile Location Estimation Services within a Radio Cellular Network.<br /> Junyang Zhou (Department of Computer Science, Hong Kong Baptist University), Joseph Kee-Yin Ng (Department of Computer Science, Hong Kong Baptist University)</p> <p>4. Guidelines for Biometric Recognition in Wireless System for Payment Confirmation.<br /> Leon Grabensek (Prosum L.L.C)</p> <p><b><em>Session D1: # BIOS Session </em></b></p> <p>1. Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project.<br /> Richard Sinnott, M. Bayer, A. Stell, J. Koetsier</p> <p>2. The Usability and Practicality of Biometric Authentication in the Workplace.<br /> Carsten Maple, Peter Norrington</p> <p>3. Building an Encrypted File System on the EGEE grid: Application to Protein Sequence Analysis.<br /> Christophe Blanchet, G. Deléage, R. Mollon</p> <h3>10:55 - 11:15 Coffee Break</h3> <h3>11:15 - 12:00 Keynote 1</h3> <p><b>Dr. Louis Marinos, ENISA Security Competence Department, Risk Management, Greece </b></p> <h3>12:00 - 12:15 Talk: Secure Business Austria – the Austrian Industry Competence Center for Security</h3> <p><b>Prof. Dr. A Min Tjoa, Director, Software Technology and Interactive Systems</b></p> <h3>12:15-13:15 Lunch</h3> <h3>13:15-15:00 Parallel Sessions </h3> <p><b><em>Session A2: # Protocol and Communication</em></b></p> <p>1. An Extended Verifiable Secret Redistribution Protocol for Archival Systems.<br /> V.H. Gupta (Department of Computer Science and Automation, Indian Institute of Science, India), K.Gopinath (Department of Computer Science and Automation, Indian Institute of Science, India)</p> <p>2. Analysis of Current VPN-Technologies.<br /> Thomas Berger (Student University of Salzburg)</p> <p>3. Integration of Quantum Cryptography in 802.11 networks.<br /> Thi Mai Trang Nguyen (University of Lausanne), Mohamed Ali Sfaxi (University of Lausanne), Solange Ghernaouti-Hélie (University of Lausanne)</p> <p>4. Availability Constraints for Avionic Data Buses.<br /> Alban Gabillon (Université de Pau), Laurent Gallon (Université de Pau)</p> <p><b><em> Session B2: #Security as Quality of Service </em></b></p> <p>1. Securing DNS Services through System Self Cleansing and Hardware Enhancements.<br /> Yih Huang (Department of Computer Science and Center for Image Analysis, George Mason University), David Arsenault (Department of Computer Science and Center for Image Analysis, George Mason University), Arun Sood (Department of Computer Science and Center for Image Analysis, George Mason University)</p> <p>2. Personalized Security for E-Services.<br /> George Yee (National Research Council Canada)</p> <p>3. Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks.<br /> Juan Vera del Campo (Technical University of Catalonia), Josep Pegueroles (Technical University of Catalonia), Miguel Soriano (Technical University of Catalonia)</p> <p>4. Towards a Stochastic Model for Integrated Security and Dependability Evaluation.<br /> Karin Sallhammar (Q2S/NTNU), Bjarne Helvik (Q2S/NTNU), Svein Knapskog (Q2S/NTNU)</p> <p><b><em>Session C2: # Networking &amp; Fault Tolerance </em></b></p> <p>1. A Novel Artificial-Immune-Based Approach for System-Level Fault Diagnosis.<br /> Mourad Elhadef (School of Information Technology and Engineering, University of Ottawa, Ottawa, Canada), Shantanu Das (School of Information Technology and Engineering, University of Ottawa, Ottawa, Canada), Amiya Nayak (School of Information Technology and Engineering, University of Ottawa, Ottawa, Canada)</p> <p>2. Evaluation of Network Robustness for Given Defense Resource Allocation Strategies.<br /> C.-H. Chen (National Taiwan University), Y.-L. Lin (National Taiwan University), Y.-S. Lin (National Taiwan University), P.-H. Tsang (National Taiwan University), C.-L. Tseng (National Taiwan University)</p> <p>3. Proxy Oblivious Transfer Protocol.<br /> Gang Yao (State Key Laboratory of Information Security, Graduate School of CAS, Beijing, 100039, P.R.China), Dengguo Feng (State Key Laboratory of Information Security, Graduate School of CAS, Beijing, 100039, P.R.China)</p> <p><b><em>Session D2: ISRM workshop</em></b></p> <p><TABLE><br /> <tr valign="top"> <td width="15%">13:15 - 13:30</td> <td>Opening address</td> <td>Prof. Dr. D. Karagiannis, Univ. of Vienna, Austria<br /> Dr. L. Marinos, ENISA, Greece </td> </tr> <tr valign="top"> <td>13:30 – 14:00</td> <td>Stewardship in crisis - the role of centers of government in risk management</td> <td>Dr. M. Matzka<br /> Leader Section I (Presidium)<br /> Austrian Federal Chancellery, Austria</td> </tr> <tr valign="top"> <td colspan="3"> <p><strong> Risk Management in Industry and Research</strong></td><td/><td/> </tr> <tr valign="top"> <td>14:00 – 14:30</td> <td>Integrating information assurance risk into the management of business risk </td> <td>Ilias Chantzos, Government Relations, Symantec, Belgium</td> </tr> <tr valign="top"> <td>14:30 – 15:00</td> <td>Validation of IT-Security measurement Tools</td> <td>Dr. R. Baer, M. Dietrich BGS Unternehmensberatung, Switzerland </td> </tr> </TABLE></p> <p> <h3>15:00 - 15:15 Coffee Break</h3> <h3>15:15 - 17:20 Parallel Sessions</h3> <p><b><em> Session A3: # Identification and authentication </em></b></p> <p>1. Providing Response Identity and Authentication in IP Telephony.<br /> Feng Cao (Cisco Systems), Cullen Jennings (Cisco Systems)</p> <p>2. Towards a framework of authentication and authorization patterns for ensuring availability in service composition.<br /> Judith E. Y. Rossebø (Telenor R&amp;D and Norwegian University of Science and Technology), Rolv Bræk (Norwegian University of Science and Technology)</p> <p>3. An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol.<br /> Maurizio Adriano Strangio (University of Rome "TOR VERGATA")</p> <p>4. A method for the identification of inaccuracies in the pupil segmentation.<br /> Hugo Proença (Dept. Informatics, University of Beira Interior, Portugal), Luís Alexandre (Dept. Informatics, University of Beira Interior, Portugal)</p> <p>5. Availability Enforcement by Obligations and Aspects Identification.<br /> Frédéric Cuppens (ENST Bretagne), Nora Cuppens (ENST Bretagne), Tony Ramard (ENST Bretagne)</p> <p><b><em>Session B3: # High Availability &amp; Dependability</b></em></p> <p>1. Framework for an integrative IT continuity approach to guarantee undisrupted business operations.<br /> R.W. Helms (Utrecht University), S. van Oorschot (Utrecht University), J. Herweijer (Utrecht University), M. Plas (Getronics)</p> <p>2. Highly Available and Cost-Efficient Adaptive Dynamic Quorum Schemes by Run-Time Variation of Replica Placement and Replication Degree.<br /> Oliver Theel (Carl von Ossietzky University of Oldenburg), Christian Storm (Carl von Ossietzky University of Oldenburg)</p> <p>3. High Availability support for the design of stateful networking equipments.<br /> Pablo Neira Ayuso (University of Seville), Laurent Lefevre (ENS Lyon), Rafael M. Gasca (University of Seville)</p> <p>4. A Hybrid Network Intrusion Detection Technique Using Random Forests.<br /> Jiong Zhang (Queen's University), Mohammad Zulkernine (Queen's University)</p> <p>5. Identifying Intrusions in Computer Networks Based on Principal Component Analysis.<br /> Wei Wang (Department of Information and Communication Technology,University of Trento), Roberto Battiti (Department of Information and Communication Technology,University of Trento)</p> <p><b><em>Session C3: #Reliability and Availability</b></em></p> <p>1. Systematic Error Detection for RFID Reliability.<br /> Sozo Inoue (Kyushu Univ.), Daisuke Hagiwara (Sony Global Solutions Inc.), Hiroto Yasuura (Kyushu Univ.)</p> <p>2. Feasibility of Multi-Protocol Attacks.<br /> Cas Cremers (Eindhoven University of Technology)</p> <p>3. Diversity to Enhance Autonomic Computing Self-Protection.<br /> Michael Jarrett (University of Waterloo), Rudolph Seviora (University of Waterloo)</p> <p>4. Bayesian Reliability forecasting in complex hardware/software systems.<br /> Javier Cano (URJC, Madrid, Spain), David Rios (URJC, Madrid, Spain)</p> <p>5. Availability Modeling and Analysis on High Performance Cluster Computing Systems.<br /> Hertong Song (Louisiana Tech U), Box Leangsuksun (Louisiana Tech U), Stephen Scott (ORNL)</p> <p><b><em>Session D3: ISRM workshop (continue)</em></b></p> <table cellspacing=0 cellpadding=0> <tr> <td> 15:15 – 15:45 </td> <td> <p> The knowledge pressure on Risk and Security managers is increasing </td> <td> <p> Prof. C. Magnusson et al<br /> Dept. of<br /> Computer and System Sciences,<br /> Stockholm University, Sweden </td> </tr> <tr> <td> 15:45 – 16:15 </td> <td> Risk<br /> Management approach on identity theft in biometric systems context </td> <td> S. Delaitre<br /> IPTS, Joint<br /> Research Centre, </p> <p> European<br /> Commission, Spain </td> </tr> <tr> <td colspan="3"> <p><b>European developments in Risk Management</b> </td> </tr> <tr> <td> 16:15 – 16: 45 </td> <td> Results of ENISA<br /> Working Group on Risk Management and Risk Assessment </td> <td> Dr. L. Tsintsifa<br /> BSI - German<br /> Federal Office for Information Security, Germany </td> </tr> <tr> <td> 16:45 – 17:15 </td> <td> SBA and<br /> necessary further steps towards European excellence in Security Research </td> <td> Mag. M. Klemen<br /> Institute of Software Technology and Interactive Systems,<br /> Vienna University of Technology, Austria </td> </tr> <tr> <td colspan="3"> <b>Panel Discussion: Future Risks and the future of Risk Management</b> </td> </tr> <tr> <td> 17:15 – 18:00 </td> <td> Implementation of Risk Management in Organizations </td> <td> <p> Chair: Prof. Dr. D. Karagiannis, Univ. of Vienna, Austria</p> <p> Panelists: To be announced </td> </tr> <tr> <td> 18:00 – 18:15 </td> <td> Summary of the workshop and concluding remarks </td> <td> Dr. L. Marinos, ENISA, Greece </td> </tr> </table> <h3>18:00 Bus trip to Klosterneuburg and Conference Dinner</h3> <p>=====================================================================</p> <h2>April 21, 2006</h2> <h3> 8:00 - 9:00 Registration </h3> <h3> 9:00 - 11:05 Parallel Sessions: </h3> <p><b><em>Session A4: #Security and Privacy Issue </em></b></p> <p>1. Schedulability Driven Security Optimization in Real-time Systems.<br /> Man Lin, Laurence T. Yang (St. Francis Xavier University, Canada)</p> <p>2. Ensuring Privacy for E-Health Services.<br /> George Yee (National Research Council Canada), Larry Korba (National Research Council Canada), Ronggong Song (National Research Council Canada)</p> <p>3. The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine.<br /> Nevena Stolba (Women’s Postgraduate College for Internet Technologies (WIT), Vienna University of Technology, Aus), Marko Banek (Department of Fundamentals of Electrical Engineering and Measurements, University of Zagreb, Croatia), A Min Tjoa (Institute of Software Technology and Interactive Systems, Vienna University of Technology, Austria)</p> <p>4. Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.<br /> Melanie Volkamer (German Research Center for Artificial Intelligence), Robert Krimmer (Wirtschaftsuniveristät Wien)</p> <p>5. A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities.<br /> Zhiqiang Lin (Nanjing University), Bing Mao (Nanjing University), Li Xie (Nanjing University)</p> <p><b><em>Session B4:# Security Management</em></b></p> <p>1. A Study of Security Architectural Patterns.<br /> David García Rosado (ALARCOS Research Group. Ciudad Real, Spain), Carlos Gutiérrez (ALARCOS Research Group. Ciudad Real, Spain), Eduardo Fernández-Medina (ALARCOS Research Group. Ciudad Real, Spain), Mario Piattini (ALARCOS Research Group. Ciudad Real, Spain)</p> <p>2. Workshop-based Multiobjective Security Safeguard Selection.<br /> Thomas Neubauer (Institute of Software Technology and Interactive Systems, Vienna University of Technology, Austria), Christian Stummer (School of Business, Economics, and Statistics; University of Vienna, Austria), Edgar Weippl (Institute of Software Technology and Interactive Systems, Vienna University of Technology, Austria)</p> <p>3. Towards a Security Architecture for Vehicular Ad Hoc Networks.<br /> Klaus Plößl (University of Regensburg), Thomas Nowey (University of Regensburg), Christian Mletzko ()</p> <p>4. Improving Security Management through Passive Network Observation.<br /> Yohann Thomas (France Télécom R&amp;D), Hervé Debar (France Télécom R&amp;D), Benjamin Morin (Supelec)</p> <p>5. Secure Exchange of Modifiable Collections.<br /> Serge Abiteboul (INRIA Futurs, France), Bogdan Cautis (INRIA Futurs, France), Amos Fiat (Tel Aviv University), Tova Milo (Tel Aviv University)</p> <p><b><em>Session C4: (FARES) # IP Network &amp; Adhoc Network</em></b></p> <p>1. A lightweight model of trust propagation in a Multi-Client Network Environement. To what extent does Experience matter?<br /> Marc Conrad (University of Luton), Tim French (University of Luton), Wei Huang (University of Luton), Carsten Maple (University of Luton)</p> <p>2. Secure 3G User Authentication in Adhoc Serving Networks.<br /> Arjan Durresi (Louisiana State University, USA), Vamsi Paruchuri (Louisiana State University, USA), Leonard Barolli (Fukuoka Institute of Technology, Japan)</p> <p>3. Requirement Analysis for IP-based Government Emergency Telephony Service.<br /> Feng Cao (), Saadat Malik ()</p> <p>4. Inter-Domains Security Management Model (IDSM) for IP Multimedia Subsystem (IMS).<br /> Muhammad Sher (TU Berlin / Fokus Fraunhofer Berlin Germany), Thomas Magedanz (TU Berlin / Fokus Fraunhofer Berlin Germany), Walter T. Penzhorn (University of Pretoria South Africa)</p> <p>5. Privacy threats and issues in mobile RFID service.<br /> Hyangjin Lee (Korea Information Security Agency), Jeeyeon Kim (Korea Information Security Agency)</p> <p><b><em>Session D4: SEL Workshop</em></b></p> <p>1. A Secure E-Exam Management System.<br /> Jordi Castellà-Roca, Jordi Herrera-Joancomarti, and Aleix Dorca-Josa</p> <p>2. Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects.<br /> Elke Franz and Katrin Borcea-Pfitzmann</p> <p>3. Access Control in a Privacy-Aware eLearning Environment.<br /> Elke Franz, Hagen Wahrig, Alexander Boettcher, and Katrin Borcea-Pfitzmann</p> <p>4. Security mechanisms for a multiagent learning platform.<br /> Carine Webber, Maria de Fátima W. do Prado Lima, Marcos E. Casa, and Alexandre M. Ribeiro</p> <p>5. Unlocking Repositories: Federated Security Solution for Attribute and Policy Based Access to Repositories via Web Services.<br /> Marek Hatala, Ty Mey (Timmy) Eap, and Ashok Shah</p> <p><b><em>Session E4: DAS-P2P Workshop</em></b></p> <p>1. Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems.<br /> Kenji Saito (Keio University), Eiichi Morino (Gesell Research Society Japan), Jun Murai (Keio University) </p> <p>2. Efficient Link Failure Detection and Localization using P2P-Overlay<br /> Networks.<br /> Emmert Barbara (Telecommunications Research Center Vienna, Austria), Binzenhfer Andreas (University of Wrzburg, Germany) </p> <p>3. Replication Strategies for Reliable Decentralised Storage.<br /> Matthew Leslie (Oxford University Computing Laboratory, Oxford University<br /> Physics Dept), Jim Davies (Oxford University Computing Laboratory),<br /> Todd Huffman (Oxford University Physics Dept) </p> <p><b><em>Session F4: DAWAM Workshop</b></em></p> <p>1. Offline Internet Banking Fraud Detection.<br /> Vasilis Aggelis (WINBANK (PIRAEUSBANK SA))</p> <p>2. Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks.<br /> Nasrullah Memon (SIS-RC, Aalborg University Denmark), Henrik Legind Larsen (SIS-RC, Aalborg University Denmark)</p> <p>3. Representing security and audit rules for data warehouses at the logical level by using the Common Warehouse Metamodel.<br /> Emilio Soler (Universidad de Matanzas (Cuba)), Juan Trujillo (Universidad de ALicante (Spain)), Rodolfo Villaroel (Universidad Catolica de Maule (Chile)), Eduardo Ferrandez-Medina (Universidad de Castilla La Mancha (Spain)), Mario Piattini (Universidad de Castilla La Mancha (Spain))</p> <p>4. A 2^d-Tree-Based Blocking Method for Microaggregating Very Large Data Sets.<br /> Agusti Solanas (Rovira i Virgili University), Antoni Martinez-Balleste (Rovira i Virgili University), Josep Domingo-Ferrer (Rovira i Virgili University), Josep M. Mateo-Sanz (Rovira i Virgili University)</p> <p><b><em>Session G4: DILSOS Workshop</em></b></p> <p>1. An Architecture for Service Discovery Based on Capability Matching.<br /> Jaka Mocnik (XLAB d.o.o.), Piotr Karwaczynski (Wroclaw University of Technology)</p> <p>2. A Declarative Control Language for Dependable XML Message Queues.<br /> Alexander Böhm (University of Mannheim), Carl-Christian Kanne (University of Mannheim), Guido Moerkotte (University of Mannheim)</p> <p>3. Timed Modelling and Analysis in Web Service Compositions.<br /> Raman Kazhamiakin (DIT, University of Trento, via Sommarive 14, 38050, Trento, Italy), Paritosh Pandya (Tata Institute of Fundamental Research, Homi Bhabha Road, Colaba, Mumbai 400 005, India), Marco Pistore (DIT, University of Trento, via Sommarive 14, 38050, Trento, Italy)</p> <p>4. Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks.<br /> Lukasz Juszczyk (Vienna University Of Technology), Jaroslaw Lazowski (Vienna University Of Technology), Schahram Dustdar (Vienna University Of Technology)</p> <p>5. Evaluating Certification Protocols in the Partial Database State Machine.<br /> António Sousa (Univ. Minho), Alfrânio Correia Jr (Univ. Minho), Francisco Moura (Univ. Minho), José Pereira (Univ. Minho), Rui Oliveira (Univ. Minho)</p> <h3>11:05 - 11:25 Coffee Break</h3> <h3>11:25 - 12:25 Keynote 2:</h3> <p><b>Prof. Andrew Steane, Centre for Quantium Computation, University of Oxford, UK</b></p> <h3>12:25 - 13:45 Lunch</h3> <h3>13:45 - 14:45 Keynote 3: </h3> <p><b>Prof. David Basin, Information Security, Department of Computer Science, ETH Zurich, Switzerland </b></p> <h3>14:45 - 15:05: Coffee Break</h3> <h3>15:05 - 17:10 Parallel Sessions</h3> <p><b><em>Session A5: # Distributed Systems </em></b></p> <p>1. A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems.<br /> Johannes Osrael (Vienna University of Technology), Lorenz Froihofer (Vienna University of Technology), Karl M. Goeschka (Vienna University of Technology), Stefan Beyer (Universidad Politecnica de Valencia), Pablo Galdamez (Universidad Politecnica de Valencia), Francesc Munoz (Universidad Politecnica de Valencia)</p> <p>2. DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems.<br /> Stefan Beyer (Instituto Tecnológico de Informática), Alexander Sánchez (Instituto Tecnológico de Informática), Francesc Muñoz-Escoí (Instituto Tecnológico de Informática), Pablo Galdámez (Instituto Tecnológico de Informática)</p> <p>3. Defense trees for economic evaluation of security investments.<br /> Stefano Bistarelli (Dipartimento di Scienze - Universita' degli Studi "G. d'Annunzio", Pescara, Italy), Fabio Fioravanti (Dipartimento di Scienze - Universita' degli Studi "G. d'Annunzio", Pescara, Italy), Pamela Peretti (Dipartimento di Scienze - Universita' degli Studi "G. d'Annunzio", Pescara, Italy)</p> <p>4. Proposed Framework for Achieving Interoperability Between European Public Administrations.<br /> Amir Hayat (Institute of Applied Information Processing and Communication, Graz Univ. of Technology), Muhammad Alam (Research Group ”Quality Engineering”, Universität Innsbruck), Thomas Roessler (Institute of Applied Information Processing and Communication, Graz Univ. of Technology)</p> <p>5. Gait Recognition Using Acceleration from MEMS.<br /> Davrondzhon Gafurov (Gjovik University College), Kirsi Helkala (Gjovik University College), Torkjel Søndrol (Gjovik University College)</p> <p><b><em>Session B5: # Software Security &amp; Dependability</em></b></p> <p>1. Making Web Services Dependable.<br /> Louise Moser (University of California, Santa Barbara), P. Michael Melliar-Smith (University of California, Santa Barbara), Wenbing Zhao (Cleveland State University)</p> <p>2. A Simple Component Connection Approach for Fault Tree Conversion to Binary Decision Diagram.<br /> John Andrews (Loughborough University), Rasa Remenyte (Loughborough University)</p> <p>3. Secure Business Process Management: A Roadmap.<br /> Thomas Neubauer (Institute of Software Technology and Interactive Systems, Vienna University of Technology, Austria)</p> <p>4. Supporting Attribute-based Access Control with Ontologies.<br /> Torsten Priebe (Capgemini), Wolfgang Dobmeier (University of Regensburg), Nora Kamprath (University of Regensburg)</p> <p>5. Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets.<br /> Calin Ciufudean (University of Suceava, Romania), Adrian Graur (University of Suceava, Romania), Constantin Filote (University of Suceava, Romania), Cornel Turcu (University of Suceava, Romania), Valentin Popa (University of Suceava, Romania)</p> <p><b><em>Session C5: (FARES) # Wireless &amp; Sensor Network</em></b></p> <p>1. A Framework of Survivability Model for Wireless Sensor Network.<br /> Dong S. Kim (Hankuk Aviation University), Jong S. Park (Hankuk Aviation University)</p> <p>2. Mitigating Denial of Service Threats in GSM Networks.<br /> Valer BOCAN (Politehnica University of Timi?oara, ROMANIA), Vladimir CRETU (Politehnica University of Timi?oara, ROMANIA)</p> <p>3. Achieving Availability and Reliability in Wireless Sensor Networks Applications.<br /> Amirhosein Taherkordi (Computer Engineering Department, Iran University of Science and Technology), Majid Alkaee Taleghan (Computer Engineering Department, Iran University of Science and Technology), Mohsen Sharifi (Computer Engineering Department, Iran University of Science and Technology)</p> <p>4. Secure Enhanced Wireless Transfer Protocol.<br /> J. C. Lin (jclin@ttu.edu.tw), Yu-Hsin Kao (hebe@dlit.edu.tw)</p> <p><b><em>Session D5: Industrial Track </em></b></p> <p><b><em>Session E5: DAS-P2P Workshop (cont.)</em></b></p> <p>1. The Multipath Key Exchange on P2P Networks.<br /> Yuuki Takano (JAIST), Naoki Isozaki (JAIST), Yoichi Shinoda (JAIST)</p> <p>2. Ecosystem of Naming Systems: Discussions on a Framework to Induce Smart Space Naming Systems Development.<br /> Yusuke DOI (Corporate R&amp;D Center, Toshiba Corporation), Shirou WAKAYAMA (Corporate R&amp;D Center, Toshiba Corporation), Masahiro ISHIYAMA (Corporate R&amp;D Center, Toshiba Corporation), Satoshi OZAKI (Corporate R&amp;D Center, Toshiba Corporation), Tomohiro ISHIHARA (Graduate School of Media and Governance, Keio University), Yojiro UO (IIJ Research Laboratory) </p> <p>3. Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration.<br /> Jochen Dinger (University of Karlsruhe (TH)), Hannes Hartenstein (University of Karlsruhe (TH)) </p> <p>4. Deriving Ratings Through Social Network Structures.<br /> Omer Rana (Cardiff University), Hameeda Alshabib (Glamorgan University), Ali ShaikhAli (Cardiff University) </p> <p><b><em>Session F5: DAWAM Workshop (cont.)</em> </b></p> <p>1. A Bayesian Averaging Model for Estimating the Reliability of Decisions When Data Mining Multimodal Biometric Data.<br /> Vitaly Schetinin (Institute for Research in Applicable Computing, University), Carsten Maple (Institute for Research in Applicable Computing, University)</p> <p>2. On Efficiency and Data Privacy Level of Association Rules Mining Algorithms within Parallel Spatial Data Warehouse.<br /> Marcin Gorawski (Institute of Computer Science,.Silesian University of Technology,Poland), Karol Stachurski (.Institute of Computer Science,.Silesian University of Technology,Poland)</p> <p>3. Depdendability in Data Mining: A Perspective from the Cost of Making Decisions.<br /> H. Michael Chung (CSULB)</p> <p>=====================================================================</p> <h2>April 22, 2006 </h2> <h3> 8:00 - 9:00 Registration </h3> <h3> 9:00 - 10:40 Parallel Sessions:</h3> <p><b><em>Session A6: (FARES) # Authentication &amp; authorization </em></b></p> <p>1. Quality of Password Management Policy.<br /> Carlos Villarrubia (University of Castilla-La Mancha), Eduardo Fernández-Medina (University of Castilla-La Mancha), Mario Piattini (University of Castilla-La Mancha)</p> <p>2. A Proposal of An Anonymous Authentication Method For Flat-rate Service.<br /> Yoshio KAKIZAKI (Graduate School of Science and Technology, Tokai University Unified Graduate School), Hiroshi YAMAMOTO (School of Information Technology and Electronics, Tokai University), Hidekazu TSUJI (School of Information Technology and Electronics, Tokai University)</p> <p>3. RECOVERY MECHANISM OF ONLINE CERTIFICATE CHAIN IN GRID COMPUTING.<br /> MingChu LI (Dalian Univ. of Tech), Jianbo MA (Tianjin Univ)</p> <p><b><em>Session B6: (FARES) # Trust Management &amp; Recovery</b></em></p> <p>1. Recovery Mechanism of Cooperative Process Chain in Grid.<br /> MingChu LI (), Hongyan Yao ()</p> <p>2. PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model.<br /> Cristina Satizábal (Technical University of Catalonia (Spain) and Pamplona University(Colombia)), Rafael Páez (Technical University of Catalonia (Spain)), Jordi Forné (Technical University of Catalonia (Spain))</p> <p>3. Run Time Detection of Covert Channels.<br /> Naoyuki Nagatou (Tokyo Institute of Technology), Takuo Watanabe (Tokyo Institute of Technology)</p> <p><b><em>Session C6: (FARES)# Secure Information System</em></b></p> <p>1. Practical Approach of a Secure Management System based on ISO/IEC 17799.<br /> Luis Enrique Sanchez (SICAMAN NT), Daniel Villafranca (SICAMAN NT), Eduardo Fernandez-Medina (UCLM), Mario Piattini (UCLM)</p> <p>2. Testing Complex Business Process Solutions.<br /> Gerd Saurer (Senactive IT Dienstleistungs GmbH), Josef Schiefer (Senactive IT Dienstleistungs GmbH), Alexander Schatten (Institute for Software Technology and Interactive Systems)</p> <p>3. Towards Resource Management Continuity Using Constraint Inheritance Relation.<br /> Zude Li (Institute of Information System and Engineering, School of Software, Tsinghua University, Beijing), Guoqiang Zhan (Institute of Information System and Engineering, School of Software, Tsinghua University, Beijing), Xiaojun Ye (Institute of Information System and Engineering, School of Software, Tsinghua University, Beijing)</p> <p>4. Deontic Relevant Logic as the Logical Basis for Specifying, Verifying, and Reasoning about Information Security and Information Assurance.<br /> Jingde Cheng (Saitama University), Junichi Miura (Saitama University)</p> <p><b><em>Session D6: (FARES)# Availability</em></b></p> <p>1. Persistent Computing Systems as Continuously Available, Reliable, and Secure Systems.<br /> Jingde Cheng (Saitama University).</p> <p>2. Active/Active Replication for Highly Available HPC System Services.<br /> Christian Engelmann (), Stephen L. Scott (), Chokchai (Box) Leangsuksun (), Xubin (Ben) He ()</p> <p>3. On the Reliability of Web Clusters with Partial Replication of Contents.<br /> Jose Daniel Garcia (Universidad Carlos III de Madrid), Jesus Carretero (Universidad Carlos III de Madrid), Felix Garcia (Universidad Carlos III de Madrid), Alejandro Calderon (Universidad Carlos III de Madrid), Javier Fernandez (Universidad Carlos III de Madrid), David E. Singh (Universidad Carlos III de Madrid)</p> <p>4. RELIABILITY MODELING STRATEGY OF AN INDUSTRIAL SYSTEM.<br /> Syed Rizwan (Department of Mathematics and Science, Caledonian (University) College of Engineering, Oman), Dr Ramachandran KP (Caledonian (University) College of Engineering, Oman)</p> <p><b><em>Session E6: DeSeGov Workshop</em></b></p> <p>1. E-voting: Dependability Requirements and Design for Dependability.<br /> Jeremy Bryans (School of Computing Science , University of Newcastle), Bev Littlewood (Centre for Software Reliability, City University), Peter Ryan (School of Computing Science , University of Newcastle), Lorenzo Strigini (Centre for Software Reliability, City University)</p> <p>2. Using Security Ontologies for the development of secure e-government applications.<br /> M. Karyda, T. Balopoulos, S. Dritsas, L. Gymnopoulos, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis</p> <p>3. Defining Criteria for Rating an Entity’s Trustworthiness Based on Its Certificate Policy.<br /> Omar Batarfi (School of Computing Science, University of Newcastle upon Tyne), Lindsay Marshall (School of Computing Science, University of Newcastle upon Tyne)</p> <p>4. Designing mutual-aid model for RAQ(Rarely Asked Question) in e-government: Practical use of anonymity.<br /> Akiko Orita (Keio Univ)</p> <p><b><em>Session F6: BND Workshop</em> </b></p> <p>1. Modelling the Reliability of Search and Rescue Operations within the UK Through Bayesian Belief Networks.<br /> Ashley Russell (University of Strathclyde), John Quigley (University of Strathclyde), Robert van der Meer (University of Strathclyde)</p> <p>2. Computing Multiple Diagnoses in Large Devices Using Bayesian Networks.<br /> Véronique Delcroix (LAMIH - university of Valenciennes), Mohamed-Amine Maalej (LAMIH - university of Valenciennes), Sylvain Piechowiak (LAMIH - university of Valenciennes)</p> <p>3. Automatically Translating Dynamic Fault Trees into Dynamic Bayesian Networks by Means of a Software Tool.<br /> Stefania Montani (University of Piemonte Orientale), Luigi Portinale (University of Piemonte Orientale), Andrea Bobbio (University of Piemonte Orientale), Daniele Codetta-Raiteri (University of Piemonte Orientale)</p> <p>4. An innovating application of Bayesian Networks : global environmental risk assessment of the cold source system of a nuclear power plant [#47], by ANNE DUTFOY (EDF R&amp;D Industrial Risk Management Department), SANDRINE PIERLOT (EDF R&amp;D Industrial Risk Management Department), GILLES DELEUZE (EDF R&amp;D Industrial Risk Management Department)</p> <h3>10:40 - 11:00 Coffee Break</h3> <h3>11:00 - 12:15 Parallel Sessions </h3> <p><b><em>Session A7: (FARES) # Software Security 1</em></b></p> <p>1. Towards an Integrated Conceptual Model of Security and Dependability.<br /> Erland Jonsson (Chalmer University, Sweeden)</p> <p>2. A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements.<br /> Daniel Mellado (Ministry of Work and Social Affairs. Quality, Auditing and Security Institute (Madrid, Spain)), Eduardo Fernández-Medina (University of Castilla-La Mancha, Information Systems and Technologies Department (Spain)), Mario Piattini (University of Castilla-La Mancha, Information Systems and Technologies Department (Spain))</p> <p>3. Secure and Reliable Java-Based Middleware - Challenges and Solutions.<br /> Walter Binder (EPFL)</p> <p><b><em>Session B7: (FARES) # Software Security 2</em></b><br /> 1. Integrating Security Requirement with a UML 2.0 Profile.<br /> Alfonso Rodriguez (Universidad del Bio Bio, Chile), Eduardo Fernández-Medina (ALARCOS Research Group, Spain), Mario Piattini (ALARCOS Research Group, Spain)</p> <p>2. Representing levels of abstraction to facilitate the Secure Multidimensional Modeling.<br /> Rodolfo Villarroel (Catholic University of Maule (Chile)), Emilio Soler (University of Matanzas (Cuba)), Eduardo Fernández-Medina (University of Castilla-La Mancha (Spain)), Juan Trujillo (University of Alicante), Mario Piattini (University of Castilla-La Mancha)</p> <p>3. Modeling Permissions in a (U/X)ML world.<br /> Muhammad Alam (Institut für Informatik Universität Innsbruck), Ruth Breu (Institut für Informatik Universität Innsbruck), Michael Hafner (Institut für Informatik Universität Innsbruck)</p> <p><b><em>Session C7: (FARES) # Safety &amp; Security</em></b></p> <p>1. Application of The Digraph Method in Fault Diagnostics.<br /> Emma Kelly (Aeronautical and Automotive Engineering Department, Loughborough University), Lisa Bartlett (Aeronautical and Automotive Engineering Department, Loughborough University)</p> <p>2. No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies.<br /> Kenji Saito (Keio University), Eiichi Morino (Gesell Research Society Japan), Jun Murai (Keio University)</p> <p>3. Sandboxing in myKlaim.<br /> Rene Rydhof Hansen (Technical University of Denmark), Christian W. Probst (Technical University of Denmark), Flemming Nielson (Technical University of Denmark)</p> <p><b><em>Session D7:(FARES) # E-commerce &amp; E-Government</em></b></p> <p>1. A Reference Model for Authentication- and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce.<br /> Christian Schläger (University of Regensburg), Thomas Nowey (University of Regensburg), Jose A. Montenegro (University of Malaga)</p> <p>2. Achieving Fairness and Timeliness in a Previous Electronic Contract Signing Protocol.<br /> Magdalena Payeras-Capellà (University of the Balearic Islands), Josep Lluís Ferrer-Gomila (University of the Balearic Islands), Llorenç Huguet-Rotger (University of the Balearic Islands)</p> <p>3. Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF.<br /> Thomas Neubauer (Institute of Software Technology and Interactive Systems, Vienna University of Technology, Austria), Edgar Weippl (Institute of Software Technology and Interactive Systems, Vienna University of Technology, Austria), Stefan Biffl (Institute of Software Technology and Interactive Systems, Vienna University of Technology, Austria)</p> <p><b><em>Session E7: DeSeGov Workshop (cont.)</em></b></p> <p>1. Maintaining data-integrity in the backoffice registries of cities; a survey on organisational barriers and ways to address those.<br /> Rob Peters (University of Amsterdam and Zenc), Marco Meesters (Zenc), Pim Jorg (Zenc), Edwin Stuart (Zenc), Marcel Hoogwout (University of Tilburg)</p> <p>2. Choosing the Right Wireless LAN Security Protocol for the Home and Business User.<br /> Carsten Maple (University of Luton), Helen Jacobs (University of Luton), Matthew Reeve (Modern Networks)</p> <p>3. A Component Based Software Architecture for E-Government.<br /> Raphael Kunis (Chemnitz University of Technology), Daniel Beer (Chemnitz University of Technology), Gudula Rünger (Chemnitz University of Technology)</p> <p>4. Building governments in e-government: settlement of dependable trust roots.<br /> Semir Daskapan (researcher)</p> <p><b><em>Session F7: BND Workshop (cont.)</em></b></p> <p>1. Modelling Dependable Systems using Hybrid Bayesian Networks.<br /> Martin Neil (Agena and Queen Mary), Manesh Tailor (Agena), David Marquez (Queen Mary), Norman Fenton (Agena and Queen Mary), Peter Hearty (Queen Mary)</p> <p>2. Multi-Agent Causal Models for Dependability Analysis.<br /> Sam Maes (PSI, INSA Rouen), Philippe Leray (PSI, INSA Rouen)</p> <p>3. Bayesian Networks Implementation of Dempster Shafer Theory to Model Reliability Uncertainty.<br /> christophe SIMON (CRAN UMR 7039, CNRS-UHP-INPL), Philippe WEBER (CRAN UMR 7039, CNRS-UHP-INPL)</p> <p>=====================================================================</p> <p><b>Presentation Notices</b><br /> <em><b>Paper presentations are 20 minutes and 5 minutes for questions and discussions.</b></em></p> <p><b>Technical Equipment</b><br /> <em><b>Laptop Computer<br /> LCD/Data Projector<br /> CD/DVD ROM Drive<br /> USB Flash Drive<br /> </b></em></p> Fri, 21 Oct 2005 15:42:47 +0200