index - Availability, Reliability, and Security in Information Systems Access content directly
   


Full Text Documents

24

Search


Table of Contents
Availability, Reliability, and Security in Information Systems
Stephanie Teufel, Tjoa A Min, IlsunYou, EdgarWeippl (Eds.)
Front Matter

Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2014)


Knowledge Management

Argumentation-Based Group Decision Support for Collectivist Communities
Marijke Coetzee
1-16
A Knowledge Integration Approach for Safety-Critical Software Development and Operation Based on the Method Architecture
Shuichiro Yamamoto
17-28
Metrics-Based Incremental Determinization of Finite Automata
Sergiu Balan, Gianfranco Lamperti, Michele Scandale
29-44

Mobile and Social Computing

Mobile Computing is not Always Advantageous: Lessons Learned from a Real-World Case Study in a Hospital
Andreas Holzinger, Bettina Sommerauer, Peter Spitzer, Simon Juric, Borut Zalik, Matjaz Debevc, Chantal Lidynia, André Valdez, Carsten Roecker, Martina Ziefle
110-123
Towards Interactive Visualization of Longitudinal Data to Support Knowledge Discovery on Multi-touch Tablet Computers
Andreas Holzinger, Michael Schwarz, Bernhard Ofner, Fleur Jeanquartier, Andre Calero-Valdez, Carsten Roecker, Martina Ziefle
124-137
Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE
Sao-Khue Vo, Amin Anjomshoaa, A. Tjoa
138-154

Software Security

Towards Developing Secure Software Using Problem-Oriented Security Patterns
Azadeh Alebrahim, Maritta Heisel
45-62
Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services
Evgenia Novikova, Igor Kotenko
63-78
A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven Engineering
Denisse Muñante, Vanea Chiprianov, Laurent Gallon, Philippe Aniorté
79-93
Adaptive User-Centered Security
Sven Wohlgemuth
94-109

4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014)


Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM)
Antonio Jara
155-165
Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters
Yi-Li Huang, Fang-Yie Leu, Ilsun You, Jing-Hao Yang
166-171
Crypto-Biometric Models for Information Secrecy
Marek Ogiela, Lidia Ogiela, Urszula Ogiela
172-178
One-Time Biometrics for Online Banking and Electronic Payment Authentication
Aude Plateaux, Patrick Lacharme, Christophe Rosenberger, Audun Jøsang
179-193
Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices
Vasily Desnitsky, Igor Kotenko
194-210
PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions
Shinsaku Kiyomoto, Yutaka Miyake
211-225
Detection of Malicious Web Pages Using System Calls Sequences
Gerardo Canfora, Eric Medvet, Francesco Mercaldo, Corrado Visaggio
226-238
Risk Reduction Overview
Hellen Havinga, Olivier Sessink
239-249
Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime Function
Wolfgang Boehmer
250-256
A High-Speed Network Content Filtering System
Guohong Zhao, Shuhui Chen, Baokang Zhao, Ilsun You, Jinshu Su, Wanrong Yu
257-269
Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering
Jingping Song, Zhiliang Zhu, Chris Price
270-280
Towards a Key Consuming Detection in QKD-VoIP Systems
Guohong Zhao, Wanrong Yu, Baokang Zhao, Chunqing Wu
281-285
A Structure P2P Based Web Services Registry with Access and Control
He Qian, Zhao Baokang, Long Yunjian, Su Jinshu, Ilsun You
286-297
Amplification DDoS Attacks: Emerging Threats and Defense Strategies
Antonio Colella, Clara Colombini
298-310

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/