Home > Programme
General
Home Home
News News
Important Dates Important Dates
Focus of the Conference Focus of the Conference
Organizational Committee Organizational Committee
Program Committee Program Committee
Contact Information Contact Information
Previous Conferences Previous Conferences
Contributors
Call for Papers Call for Papers
Symposium Symposium
Workshops Workshops
Submission Guidelines Submission Guidelines
Journal Releases Journal Releases
CISIS-2007 Conference
Participants
Registration Fee Registration Fee
Registration Form Registration Form
Programme Programme
Accommodation Accommodation
Conference Venue Conference Venue
Travel Information Travel Information
Social Events Social Events
Partner- / Sponsorship
Partners Partners
PDF Print E-mail

ARES 2007, CISIS 2007 & WORKSHOPS PROGRAMME OUTLINE

April 10, 2007
 Room A
Room B
Room C
Room D Room E Room F
08:00 - 09:00
Registration
09:00 - 09:15
Welcome and pening Ceremony
09:15 - 10:45
ARES Session A1ARES Session B1FARES Session C1CISIS Session D1ECDS Workshop E1EBITS Workshop F1
10:45 - 11:15
Coffee Break
11:15 - 12:15
ARES Keynote 1 (at room A)
12:15 - 13:30
Lunch Break
13:30 - 15:00
ARES Session A2ARES Session B2
FARES Session C2
CISIS Session D2 ECDS Workshop E2
EBITS Workshop F2
15:00 - 15:30
Coffee Break
15:30 - 17:30
ARES Session A3
ARES Session B3
FARES Session C3
CISIS Session D3
ECDS Workshop E3
EBITS Workshop F3
18:00 - 22:00
Bus trip to the Monastery, Klosterneuburg and Conference Dinner
April 11, 2007
 Room ARoom B
Room C
Room D
Room E Room F
08:00 - 09:00Registration
09:00 - 10:30ARES Session A4ARES Session B4 FARES Session C4CISIS Session D43GPCS Workshop E4 DeSeGov Workshop F4
10:30 - 11:00Coffee Break
11:00 - 12:00
ARES Keynote 2 (at room A)
12:00 - 13:30
Lunch Break
13:30 - 15:00 ARES Session A5ARES Session B5 FARES Session C5 CISIS Session D5 3GPCS Workshop E5 DeSeGov Workshop F5
15:00 - 15:30
Coffee Break
15:30 - 17:30
ARES Session A6ARES Session B6 FARES Session C6 CISIS Session D6 3GPCS Workshop E6 DeSeGov Workshop F6
19:30 - 22:00Reception Dinner at the Vienna City Hall
April 12, 2007  Room A
Room BRoom CRoom DRoom ERoom F
08:00 - 09:00Registration
09:00 - 10:30ARES Session A7FARES Session B7WAIS Workshop C7 DAWAM Workshop D7FOFDC Workshop E7SecSE Workshop F7
10:30 - 11:00
Coffee Break
11:00 - 12:30ARES Session A8FARES Session B8WAIS Workshop C8DAWAM Workshop D8FOFDC Workshop E8SecSE Workshop F8
12:30 - 13:30
Lunch Break
13:30 - 15:00ARES Session A9FARES Session B9WAIS Workshop C9DAWAM Workshop D9FOFDC Workshop E9SecSE Workshop F9
15:00 - 15:30 Coffee Break
15:30 - 17:00ARES Session A10FARES Session B10WAIS Workshop C10   
April 13, 2007
 Room ARoom BRoom C
08:00 - 09:00Registration
09:00 - 10:30 ARES Session A11
FARES Session B11
SEL Workshop Session C11
10:30 - 11:00Coffee Break
11:00 - 12:30
ARES Session A12
FARES Session B12
SEL Workshop Session C12
End of Conference

ARES 2007, CISIS 2007 & WORKSHOPS DETAIL PROGRAMME

April 10, 2007

8:00 - 9:00 Registration

9:00 - 9:15 Welcome and Opening Ceremony

A Min Tjoa, Vienna University of Technology, ARES PC Co-Chair

9:15 - 10:45 Parallel Sessions:

Session A1: #Trust Model & Trust Management
Chair: Gerald Quirchmayr
1. Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems
Oluwafemi Ajayi, Richard Sinnott, Anthony Stell
2. Why Trust is not proportional to Risk
Bjørnar Solhaug, Dag Elgesem, Ketil Stølen
3. From Trust to Dependability through Risk Analysis
Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone

Session B1: #Availability, Fault-Tolarant & Recovery
Chair: Ric Holt
1. Availability and Performance of the Adaptive Voting Replication Protocol
Johannes Osrael, Lorenz Froihofer, Karl M. Goeschka
2. Distributed Stream Processing Analysis in High Availability Context
Marcin Gorawski, Pawel Marks
3. Implementing Network Partition-Aware Fault-Tolerant CORBA Systems
Stefan Beyer, Francesc D. Muñoz-Escoí, Pablo Galdámez

Session C1: (FARES) #RFID Techniques & Applications
Chair:
Shamik Sural
1. RFID Security Issues in Military Supply Chains
Qinghan Xiao, Cam Boulet, Thomas Gibbons
2. The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols
Jens Mache, Chris Allick

Session D1: (CISIS) # Wireless Networks
Chair: Leonard Barolli
1. A Real-Time Component-Oriented Middleware for Wireless Sensor and Actor Networks
J. Barbaran, M. Diaz, I. Esteve, D. Garrido, L. Llopis, B. Rubio
2. An Efficient Data Transmission Protocol in a Wireless Sensor-Actuator Network
Kiyohiro Morita, Kenichi Watanabe, Naohiro Hayashibara, and Makoto Takizawa
3. MPLS Traffic Engineering in Satellite Networks
A. Durresi, M. Durresi, F. Xhafa and L. Barolli

Session E1: (ECDS) #Middleware Systems

Chair: Markus Aleksy
1. Functional Classes Guide Use of Design Patterns in Implementing Mediators
Mikko Kontio, Hannu Mayra, Mauno Ronkko
2. Applying MDE Methodologies to Design Communication Protocols for Distributed Systems
Jesus Martinez, Pedro Merino, Alberto Salmeron
3. Implementation and Performance of a New Teleconference System by High Definition Omni-directional Video Transmission over IP Network
Yosuke Sato, Yuya Maita, Koji Hashimoto and Yoshitaka Shibata
4. Generating Families of Business Components from Metamodel Hierarchies
Michael Schwind, Markus Aleksy

Session F1: (EBITS) Paper Session
Chair: Stefan Biffl

1. Using space-based computing for more efficient group coordination and monitoring in an event-based work management systemMarcus Mor, Richard Mordinyi, Johannes Riemer
2. Exception Handling in an Event-Driven SystemJan Ploski, Wilhelm Hasselbring
3. Indexing and Search of Correlated Business Events

Roland Vecera, Szabolcs Rozsnyai, Heinz Roth

10:45 - 11:15 Coffee Break

11:15 - 12:15 Keynote 1

"Security principles for the Austrian eGovernment"

Prof. Dr. Reinhard Posch, “Chief Information Officer” for the Federal Republic of Austria, heading the platform “Digital Austria”.

12:15-13:30 Lunch

13:30-15:00 Parallel Sessions

Session A2: #Trust Management
Chair: Bhavani Thuraisingham
1. Dynamic trust domains for secure, private, technology-assisted living
Jatinder Singh, Jean Bacon, Ken Moody
2. A Hybrid Trust Model for Enhancing Security in Distributed Systems
Ching Lin, Vijay Varadharajan
(Ching Lin is sponsored and supported by Auckland University of Technology, New Zealand, and Macquarie University, Australia)
3. A Reliable Component-Based Architecture for E-Mail Filtering
Wilfried Gansterer, Andreas Janecek, Peter Lechner

Session B2: #Availability, Fault-Tolarant & Recovery
Chair: Stefan Beyer
1. Failure Recovery in Cooperative Data Stream Analysis
Bin Rong, Fred Douglis, Zhen Liu, Cathy Xia
2. A Recovery Protocol for Middleware Replicated Databases Providing GSI
José Enrique Armendáriz-Iñigo, Francesc Daniel Muñoz-Escoí, José Ramón Juárez-Rodríguez, José Ramón González de Mendívil-Moreno , Bettina Kemme
3. Applying a Tradeoff Model (TOM) to TACT
Raihan Al-EKram, Ric Holt, Chris Hobbs

Session C2: (FARES) #Access Control
Chair:Oliver Jorns
1. Realizing fine-granular Read and Write Rights on Tree Structured Documents
Franz Kollmann
2. Access Control Model for Web Services with Attribute Disclosure Restriction
Vipin Singh Mewar, Subhendu Aich, Shamik Sural
3. Aggregating and Deploying Network Access Control Policies
Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia

Session D2: (CISIS) #Grid Computing

Chair:Fatos Xhafa
1. A Monitoring Service for Relational Databases to Support Advanced Data Integration on the Grid
Alexander Woehrer and Peter Brezany
2. Using a Grid Platform for Enabling Real Time User Modeling in On-line Campus
Santi Caballe, Fatos Xhafa, Thanasis Daradoumis, Joan Esteve, Leonard Barolli, Arjan Durresi
3. A Job Schedule Model Based on Grid Environment
Homer Wu, Chong-Yen Lee, Wuu-Yee Chen, Tsang-Yean Lee

Session E2: (ECDS) #Network Protocols and Algorithms
Chair:Markus Aleksy
1. Path Shortening Schema for Minimum Delay Spanning Tree on Overlay Multicast
Hiroki Saito, Yoichi Nakamura
2. Task Decomposition and Delegation Algorithms for Coordinating Unstructured Multi Agent Systems
Antonio Luis Lopes, Luis Miguel Botelho
3. Ontology-based Context Management Agent for Vertical Handoff
Using Fuzzy Logic Decision in Heterogeneous Network
Nguyen Thi Thanh Huong, Matsumoto Mitsuji
4. In-Network Storage Model for Data Persistence under Congestion in Wireless Sensor Networks
Majid I Khan, Wilfried N Gansterer, Günter Haring

Session F2: (EBITS) Keynote and Panel Session
Chair: Eva Kühn
Key note: Scalable Space-Based Computing Architectures as Enabler for Event-Driven Systems in Open EnvironmentsSpeaker: Geri Joskowicz Industry panel: Information Sharing in Mission-Critical EnvironmentsFrequentis: Christoph Rihacek, Alexander Mikula

15:00 - 15:30 Coffee Break

15:30 - 17:30 Parallel Sessions

Session A3: #Reputation Management & Trust
Chair: Yannis Stamatiou
1. Reputation Management Survey
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
2. Dirichlet Reputation Systems
Audun Josang, Jochen Haller
3. Compartmented Security for Browsers---Or How to Thwart a Phisher with Trusted Computing Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stueble, Marcel Winandy
4. Secure Anonymous Union Computation Among Malicious Partners
Sebastian Obermeier, Stefan Böttcher

Session B3: #Privacy & Access Control
Chair: Christian Schläger
1. A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications
Oliver Jorns, Gerald Quirchmayr, Oliver Jung
2. Privacy in Pervasive Computing and Open Issues
Pankaj Bhaskar , Sheikh I Ahamed
3. Context-Dependent Access Control for Contextual Information
Christin Groba, Stephan Groß, Thomas Springer
4. Bytecode Verification for Enhanced JVM Access Control
Dongxi Liu

Session C3: (FARES) #Authentication
Chair: Leila Ismail
1. Secure Spatial Authentication using Cell Phones
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli
2. Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain
Bogdan Groza
3. A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications
HE Yijun, XU Nan, LI Jie
4. Improved Client-to-Client Password-Authenticated Key Exchange Protocol
Yao Gang, Feng Dengguo, Han Xiaoxi

Session D3: (CISIS) #Distributed Systems and Applications
Chair:Fumiaki Sato
1. E-Service Emergence: A Bio-Inspired Method of Composition
Hongbin Sun, Yongsheng Ding
2. A Distributed QoS Routing and CAC Framework: Performance Evaluation of Its SSRA and InterD Agents
Leonard Barolli, Makoto Ikeda, Arian Durresi, Fatos Xhafa, Akio Koyama
3. Leasing Variants in Distributed Systems
Michael Schneider, Markus Aleksy, Martin Schader, Makoto Takizawa
4. Cell-locomotin-based Agent Migration over Distributed Systems
Ichiro Satoh
5. Estimation of Trustworthiness for P2P System in Collusive Attack
Fumiaki Sato

Session F3: (EBITS) Paper Session (cont)

Chair: Alexander Schatten
1. "Optimizing Events Traffic in Event-based Systems by means
of Evolutionary Algorithms";
Jiri Kubalik, Richard Mordinyi
2."Event-Based Open Source Software Project Monitoring";
Dindin Wahyudin, A Min Tjoa
3. "Issues in Testing Dependable Event-Based Systems at a Systems Integration Company";
Armin Beer, Matthias Heindl

18:00 Bus trip to the Monastery, Klosterneuburg and Conference Dinner


April 11, 2007

8:00 - 9:00 Registration

9:00 - 10:30 Parallel Sessions:

Session A4: #Failure Detection & Attack Prevention
Chair:Dil Hussain
1. Automatic Failure Detection with Separation of Concerns
Peter Hazy, Rudolph Seviora
2. A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor Networks
Mourad ELHADEF, Azzedine BOUKERCHE
3. Intrusion detection system for signal based SIP attacks through timed HCPN
Yanlan Ding, Guiping Su

Session B4:#Authentication & Authorisation
Chair:Yuri Demchenko
1. Errors in Attacks on Authentication Protocols
Anders Moen Hagalisletto
2. Effects of Architectural Decisions in Authentication and Authorisation Infrastructures
Christian Schläger, Monika Ganslmayer
3. Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol
Tieyan Li, Robert Deng

Session C4: (FARES) #Real-time System & Sensor Network
Chair: Makoto Takizawa
1. Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack
Dong Seong Kim, Chung Su Yang, Jong Sou Park
2. Models for automatic generation of safety-critical real-time systems
Christian Buckl, Matthias Regensburger, Alois Knoll, Gerhard Schrott
3. A user behaviour control framework
Bastian Preindl, Alexander Schatten

Session D4: (CISIS) #Network Performance
Chair: Takuo Nakashima
1. The Effect of Bursty Lengths on DQDB Networks
R. N. Chiou and J. K. Guo
2. Performance Estimation of TCP under SYN Flood Attacks
Takuo Nakashima
3. New-emerging Service-support Model for Converged Multi-Service Network and its Practical Validation
Natalia Kryvinska, Peter Zinterhof, Do van Thanh

Session E4: (3PGIC) # Internet Computing
Chair: Yoshitaka Shibata
1. Decentralized Service Deployment for Collaborative Environments
Daniel Lazaro Iglesias, Joan Manuel Marques i Puig, Josep Jorba Esteve
2. Scalable Collaborative Virtual Environment Considering User’s Interests Based on P2P Overlay Network
Yushi Nakai, Yoshitaka Shibata
3. Design and Implementation of a Remote Medical-care Supporting System
Akio Koyama, Junpei Arai, Satoshi Sasaki, Leonard Barolli

Session F4: (DeSeGov) # eVoting & eElection
Chair: A Min Tjoa
1. Requirements and Evaluation Procedures for eVoting
Melanie Volkamer, Margaret McGaley
2. Towards Secure E-Elections in Turkey: Requirements and Principles
Orhan Cetinkaya, Deniz Cetinkaya
3. On Coercion-Resistant Electronic Elections with Linear Work
Stefan Weber, Roberto Araujo, Johannes Buchmann

10:30 - 11:00 Coffee Break

11:00 - 12:00 Keynote 2:

"Data Mining, Security and Privacy: Developments and Directions"

Prof. Bhavani Thuraisingham, Director of Cyber Security Research Center, University of Texas at Dallas (UTD)

12:00 - 13:30 Lunch

13:30 - 15:00 Parallel Sessions

Session A5: #Failure Detection & Attack Prevention
Chair: Rudolph Seviora
1. 3G-WLAN Convergenge: Vulnerability, Attacks Possibilities and Security Model
Muhammad Sher, Thomas Magedanz
2. Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic
Meriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri
3. Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin

Session B5: #Authentication & Authorisation
Chair: Gunter Pernul
1. Authentication Mechanisms for Mobile Agents
Leila Ismail
2. Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning
Yuri Demchenko, Leon Gommans, Cees de Laat
3. Implicit Authorization for Accessing Location Data in a Social Context
Georg Treu, Florian Fuchs, Christiane Dargatz

Session C5: (FARES) #Fault-Tolarent & Availabilty
Chair: José Enrique Armendáriz-Iñigo
1. High Availability for Network Management Applications
Prabhu S, Venkat S
2. RWAR: A Resilient Window-consistent Asynchronous Replication Protocol
Yanlong Wang, Zhanhuai Li, Wei Lin
3. Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model
Keiji Ozaki, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa

Session D5: (CISIS) #P2P Systems and MANET
Chair: Makoto Takizawa
1. A Superpeer-based Two-layer P2P Overlay Network with the CBF Strategy
Kenichi Watanabe, Naohiro Hayashibara, and Makoto Takizawa
2. Peer-to-Peer Based Mobile Video On-Demand with Layered Video Distribution
Katsuhiko Sato, Michiaki Katsumoto, Tetsuya Miki
3. Large Scale Distributed Disaster Information System based on MANET and Overlay Network
Yoshitaka Shibata, Hiroaki Yuze, Tsuyoshi Hoshikawa, Kazuo Takahata, Nobuhiro Sawano
4. P Systems and Finite Automata
Xian Xu, China

Session E5: (3PCIC) #Grid Computing
Chair: Fatos Xhafa
1. Selecting Grid-agent-team to Execute User-job—initial Solution
Mateusz Dominiak, Maria Ganzha, Marcin Paprzycki
2. Gridifying IBM's Generic Log Adapter to Speed-up the Processing of Log Data
Claudi Paniagua, Fatos Xhafa, Thanasis Daradoumis
3. On the Advantages of Using Web & Grid Services for the Development
of Collaborative Learning Management Systems
Santi Caballe

Session F5: (DeSeGov) # eVoting & eElection
Chair: A Min Tjoa
1. A SECURITY MODEL AND ARCHITECTURE FOR MULTICHANNEL E-GOVERNMENT SYSTEMS
Mariagrazia Fugini
2. eTVRA, a threat, vulnerability and risk assessment method and tool for eEurope
Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben
3. Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies
Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair

15:00 - 15:30 Coffee Break

15:30 - 17:30 Parallel Sessions

Session A6: #Security Algorithm & Framework
Chair: Marcin Gorawski
1. Fingerprint Matching Algorithm Based on Tree Comparison Using Ratios of Relational Distances
Abinandhan Chandrasekaran, Bhavani Thuraisingham
2. Reconfigurable Implementation of the New Secure Hash Algorithm
Zeghid medien, Bouallegue Belgacem, Baganne Adel, Machhout Mohsen, Tourki Rached
3. Applications for Provably Secure Intent Protection with Bounded Input-Size Programs
Jeffrey Todd McDonald, Alec Yasinsac
4. A Framework for the Development of Secure Data Warehouses based on MDA and QVT
Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini

Session B6: #Software Security
Chair: Martin Jaatun
1. Design of a Process for Software Security
David Byers, Nahid Shahmehri
2. STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
Christoph Krauß, Markus Schneider, Kpatcha Bayarou, Claudia Eckert
3. A secure architecture for the pseudonymization of medical data
Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck
4. Collection of quantitative data on security incidents
Thomas Nowey, Hannes Federrath

Session C6: (FARES) # Trust Management & Trust Model
Chair: Jochen Haller
1. Trust in global computing systems as a limit property emerging from short range random interactions
Vasiliki Liagkou, Effie Makri, Paul Spirakis, Yannis Stamatiou
2. A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam
Jimmy McGibney, Dmitri Botvich
3. HICI: AN APPROACH FOR IDENTIFYING TRUST ELEMENTS
Simon Samwel Msanjila, Hamideh Afsarmanesh
4. A Semantic and Time Related Recommendation-Feedback Trust Model
ZhangLin, XuFeng, WangYuan, LvJian

Session D6: (CISIS) # Data Structure and Mathematical Modeling
Chair: Andrei Doncescu
1. Compact Hilbert Indices for Multi-Dimensional Data
Chris H. Hamilton, Andrew Rau-Chaplin
2. Data Structure Estimation for RDF Oriented Repository Building
Martin Rimnac, Czech Republic
3. Fault Detection Using Differential Flatness in Flight Guidance Systems
Wen Chi Lu, Rabbah Fellouah, Nan Zhang, Felix Mora-Camino, Andrei Doncescu
4. An Inter-peer Trustworthiness Based on Access Control in Peer-to-Peer Overlay Networks
Yoshio Nakajima, Kenichi Watanabe, Valbona Barolli, Naohiro Hayashibara, Tomoya Enokido and Makoto Takizawa

Session E6: (3PGIC) #Parallel and P2P Systems
Chair: Fatos Xhafa
1. Parallel Branch and Bound on Peer to Peer Systems
E-G. Talbi, A. Bendjoudi, N. Melab
2. Performance Modeling and Prediction of Parallel and Distributed Computing Systems: A Survey of the State of the Art
Sabri Pllana, Ivona Brandic and Siegfried Benkner
3. Obtaining Performance Measures through Microbenchmarking in a Peer-to-Peer Overlay Computer
Paolo Bertasi, Mauro Bianco, Andrea Pietracaprina, and Geppino Pucci
4. A Distributed Coordination Algorithm for a Heterogeneous Group of Peers
Ailixier Aikebaier, Naohiro Hayashibara, Tomoya Enokido, and Makoto Takizawa

Session F6: (DeSeGov) # eGovernment Management
Chair: A Min Tjoa
1. Secure Distributed Dossier Management in the Legal Domain
Martijn Warnier, Frances Brazier, Martin Apistola, Anja Oskamp
2. Building a Dependable Messaging Infrastructure for Electronic Government
Elsa Estevez, Tomasz Janowski

19:30 Reception dinner (Vienna City Hall)


April 12, 2007

8:00 - 9:00 Registration

9:00 - 10:30 Parallel Sessions:

Session A7: #Security Models
Chair: Thomas Nowey
1. Security vulnerabilities in DNS and DNSSEC
Suranjith Ariyapperuma, Chris J. Mitchell
2. Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)
David Arsenault, Arun Sood, Yih Huang
3. Revisiting Hot Passive Replication
Rubén de Juan-Marín , Hendrik Decker, Francesc D. Muñoz-Escoí

Session B7: (FARES) #Security issue in Business Management
Chair:Mariagrazia Fugini
1. Agent Alliances: A Means for Practical Threshold Signature
Regine Endsuleit, Christoph Amma
2. Protecting Online Transactions with Unique Embedded Key Generators
Martin Boesgaard, Erik Zenner
3. A research agenda for Autonomous Business Process Management
Thomas Neubauer, Gernot Goluch, Bernhard Riedl

Session C7: (WAIS) #Intrusion prevention and Authentication
Chair: Leonard Barolli
1. An Approach for Adaptive Intrusion Prevention Based on The Danger Theory
Alexander Krizhanovsky, Alexander Marasanov
2. A Human-Verifiable Authentication Protocol Using Visible Laser Light
Rene Mayrhofer and Martyn Welch
3. Insider-secure Hybrid Signcryption Scheme Without Random Oracles
Chik How Tan

Session D7: (DAWAM) #Secure Data Warehouse
Chair: Tho Manh Nguyen
1. Extended RBAC –Based Design and Implemebtation for a Secure Data Warehouse
Bhavani Thuraisingham, Srinivasan Iyer
2. Application of QVT for the Development of Secure Data Warehouses: A case Study
Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini
3. Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse
Marcin Gorawski, Jakub Bularz

Session E7: (FOFDC) # Opening, Invited Talk, and First Paper Presentation
Chair: Christian Storm, Timo Warns
1. Opening
2. Invited Talk by Andre Schiper
3. A universal construction for concurrent objects
Rachid Guerraoui, Michel Raynal

Session F7: (SecSE) # Security & Privacy Issues
Chair: Martin Jaatun
1. Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis
2. How can the developer benefit from security modeling?
Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri
3. AProSec: an Aspect for Programming Secure Web Applications
Laurence Duchien, Roberto Gomez, Gabriel Hermosillo, Lionel Seinturier

10:30 - 11:00 Coffee Break

11:00 - 12:30 Parallel Sessions

Session A8: #Security Models
Chair: Vidar Seeberg
1. A Pattern System for Security Requirements Engineering
Denis Hatebur, Maritta Heisel, Holger Schmidt
2. Security Requirements for a Semantic Service-oriented Architecture
Stefan Dürbeck, Rolf Schillinger, Jan Kolter
3. Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
Ludwig Fuchs, Günther Pernul

Session B8: (FARES) #Web, XML, Content Management
Chair: Amin Andjomshoaa
1. Web Application Development and Global Regulation
William Bradley Glisson, L. Milton Glisson, Ray Welland
2. Query Assurance Verification for Dynamic Outsourced XML Databases
Viet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng
3. A Reflection-Based Framework for Content Validation
Lars-Helge Netland, Yngve Espelid, Khalid Azim Mughal

Session C8: (WAIS 2007) #Monitoring & Security Analysis
Chair: Hiroaki Kikuchi
1. ZeroBio – Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol
Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki
2. A Policy Language for the Extended Reference Monitor in Trusted Operating Systems
Hyung Chan Kim, R.S. Ramakrishna, Wook Shin, Koiuchi Sakurai
3. Analysis on Bleichenbacher’s Forgery Attack
Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka

Session D8: (DAWAM) # Intrusion Detection
Chair: Tho Manh Nguyen
1. Applying a Flexible Mining Architecture to Intrusion Detection
Marcello Castellano, Angela Aprile, Giuliano Bellone de Grecis, Flaviano Fiorino
2. An Application of Learning Problem in Anomaly-based Intrusion Detection Systems
Veselina Jecheva, Evgeniya Nikolova
3. Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network
Nasrullah Memon, Kim C. Kristoffersen, David L. Hicks, Henrik Legind Larsen

Session E8: (FOFDC) # Paper Presentation
Chair: Christian Storm, Timo Warns
1. FCPre - Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance
Bastian Braun
2. On the implementation of the Omega failure detector in the crash-recovery failure model
Cristian Martín, Mikel Larrea, Ernesto Jiménez
3. A Fault Identification Protocol for Emergency/Rescue MANETs and
Wireless Mesh Networks: Proof and Complexity Analysis
Mourad Elhadef, Azzedine Boukerche

Session F8: (SecSE) # Security & Threat Management
Chair: Martin Jaatun
1. Empirical and statistical analysis of techniques for threat management based on risk analysis Koen Buyens, Bart De Win, Wouter Joosen
2. Secure Software Development through Coding Conventions and Frameworks
Takao Okubo, Hidehiko Tanaka
3. Pastures: Towards Usable Security Policy Engineering
Sergey Bratus, Doug McIlroy, Alex Ferguson, Sean Smith

12:30 - 13:30 Lunch

13:30 - 15:00 Parallel Sessions

Session A9: #eAuction & eVoting Protocol
Chair: Martijn Warnier
1. A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network
Orhan Cetinkaya, Ali Doganaksoy
2. An Efficient eAuction Protocol Brian Curtis, Josef Pieprzyk, Jan Seruga
3. Enhancing the Security of Local Danger Warnings in VANETs - A Simulative Analysis of Voting Schemes
Benedikt Ostermaier, Florian Dötzer, Markus Strassberger

Session B9: (FARES) #Security Policies & Techniques
Chair: Nahid Shahmehri
1. Web Engineering Security: Essential Elements
William Bradley Glisson, Ray Welland
2. Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology
Paulina Januszkiewicz, Marek Pyka
3. CSP-Based Firewall Rule Set Diagnosis using Security Policies
S. Pozo, R. Ceballos, R. M. Gasca
4. CASSIS - Computer-based Academy for Security and Safety in Information Systems
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa

Session C9: (WAIS 2007) #Security Protocols
Chair: Hiroaki Kikuchi
1. A Proposal of the Method for Reducing the Revocation Delay in the Attribute Authentication
Yoshio Kakizaki, Hidekazu Tsuji
2. Efficient Multiparty Computation for Comparator Networks
Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota
3. A Security Framework for RFID Multi-domain System
Dong S. Kim, Jong S. Park
4. Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols
Orhan Çetinkaya and Ali Do?anaksoy

Session D9:(DAWAM) # Heterogeneous Applications
Chair: Tho Manh Nguyen
1. Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges
Lillian Røstad, Inger Anne Tøndel, Per Håkon Meland, Øystein Nytrø
2. A Collaborative Inter Data Grids Model with Hybrid Namespace
Dalia El-Mansy, Ahmed Sameh
3. Reliability Markov Chains for Security Data Transmitter Analysis
Calin Ciufudean, Bianca Satco, Constantin Filote

Session E9: (FOFDC) # Paper Presentation & Discussion
Chair: Christian Storm, Timo Warns
1. Self-Stabilization as a Foundation for Autonomic Computing
Olga Brukman, Shlomi Dolev, Yinnon Haviv, Reuven Yagel
2. On Programming Models for Service-Level High Availability
Christian Engelmann, Stephen L. Scott, Chokchai (Box) Leangsuksun, Xubin (Ben) He
3. Discussion & End of Workshop

Session F9: (SecSE) # Secure Applications
Chair: Martin Jaatun
1. Security Objectives within a Security Testing Case Study
Kaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala
2. CppTest: A Prototype Tool for Testing C/C++ Programs
Chengying Mao, Yansheng Lu
3. A Novel Approach to Building Secure Systems
Dragan Vidakovic, Dejan Simic

Workshop Close: Martin Jaatun

15:00 - 15:30 Coffee Break

15:30 - 17:30 Parallel Sessions

Session A10: #Miscelaneous Security Techniques
Chair: Jordi Forné
1. A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking
Vidar Evenrud Seeberg, Slobodan Petrovic
2. Static evaluation of certificate policies for GRID PKIs interoperability
Valentina Casola, Jesus Luna, Oscar Manso, Manel Medina, Massimiliano Rak, Nicola Mazzocca
3. Towards an Ontology-based Risk Assessment in Collaborative Environment using the SemanticLIFE
Mansoor Ahmed, Amin Anjomshoaa, Tho Manh Nguyen, A Min Tjoa
4. Comparing classifier combining techniques for mobile-masquerader detection
Oleksiy Mazhelis, Seppo Puuronen

Session B10: (FARES) #Secure Solution & Applications
Chair: Ching Lin
1. A Modular Architecture for Secure and Reliable Distributed Communication
Chamikara Madhusanka Jayalath, Ruchith Udayanga Fernando
2. Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials
Anthony Stell, Richard Sinnott, Oluwafemi Ajayi, Jipu Jiang
3. Securing Medical Sensor Environments: The CodeBlue Framework Case
Georgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis
4. A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses
Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini

Session C10: (WAIS 2007) #Security Protocols (cont.)
Chair: Leonard Barolli

1. Attacks are Protocols Too Anders Moen Hagalisletto
2. Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms
Luis Zarza, Josep Pegueroles, Miguel Soriano
3. On the use of one-way chain based authentication protocols in secure control systems
Bogdan Groza, Toma Leonida Dragomir
4. Bypassing Data Execution Prevention on Microsoft Windows XP SP2
Nenad Stojanovski, Marjan Gushev, Danilo Gligoroski, Svein J. Knapskog


 

April 13, 2007

8:00 - 9:00 Registration

9:00 - 10:30 Parallel Sessions:

Session A11: #Dependability in Distributed & Ubiquitous Computing
Chair: Markus Aleksy
1. Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems
Lorenz Froihofer, Johannes Osrael, Karl M. Goeschka
2. Dependability Aspects of Ubiquitous Computing
Lu Yan, Kaisa Sere
3. Concurrency Control using Subject- and Purpose-Oriented (SPO) View
Tomoya Enokido, Makoto Takizawa

Session B11: (FARES) #Miscelaneous Applications
Chair: Leonard Barolli
1. AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification Mohammad Raihan, Mohammad Zulkernine

2. Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments Niraj Swami, Sheikh I Ahamed

3. A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS
Rafael Páez, Cristina Satizábal, Jordi Forné

Session C11: (SEL) # Trends in E-Learning Applications
Chair: Edgar Weippl
1. e-learning 2.0 = e-learning 1.0 + Web 2.0?
Martin Ebner
2. Blended Learning Technology in Information Security Management Courses
Gerald Quirchmayr
3. Defining a Trusted Service-Oriented Environment
Emmanuel Adigun, Jan Eloff

10:30 - 11:00 Coffee Break

11:00 - 12:30 Parallel Sessions

Session A12: #Anomaly & Intrusion Detection
Chair: Marek Pyka
1. Universally Composable Three-party Key Distribution
TingMao Chang, YueFei Zhu, Jin Zhou, YaJuan Zhang
2. Terrorist Networks Analysis through Argument Driven Hypotheses Model
Dil Muhammad Akbar Hussain

Session B12: (FARES) #Miscelaneous Applications
Chair: Lu Yan
1. On the Assessment of the Interaction Quality of Users with Cerebral Palsy
Cesar Mauri-Loba, Toni Granollers, Agusti Solanas
2. Research and Design of Mobile Impeachment System with Semi-cryptonym
Chaobo Yang, Ming Qi
3. Efficient Malicious Agreementin a Virtual Subnet Network
Shu-Ching Wang, Shyi-Ching Liang, Kuo-Qin Yan, Guang-Yan Zheng

Session C12: (SEL) # Survey & Talks
Chair: Edgar Weippl
1. Designing a Cryptographic Scheme for e-Surveys in Higher-education Institutions
Alan Ward, Jordi Castellà-Roca, Aleix Dorca-Josa
2. „T-Security Handbook for SMEs”
Talk by Bernhard Strilka
3. „Overview of Certified Pen Testing Specialist CPTS”
Talk by Benjamin Böck