IFIP TC6 Open Digital Library

CD-ARES 2012: Prague, Czech Republic

Multidisciplinary Research and Practice for Information Systems - IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings

Gerald Quirchmayr, Josef Basl, Ilsun You, Lida Xu, Edgar Weippl

Springer, Lecture Notes in Computer Science 7465, ISBN: 978-3-642-32497-0



Ontology-Based Identification of Research Gaps and Immature Research Areas.

Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek


A Context-Aware Mashup Integration Guideline for Enterprise 2.0.

Gerald Bader, Amin Anjomshoaa, A Min Tjoa


Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline Blends.

Mostafa Kiani Deh Kiani, Barat Ghobadian, Fathollah Ommi, Gholamhassan Najafi, Talal Yusaf


Validation of XML Documents with SWRL.

Jesús Manuel Almendros-Jiménez


A Taxonomy of Dirty Time-Oriented Data.

Theresia Gschwandtner, Johannes Gärtner, Wolfgang Aigner, Silvia Miksch


Combining Relational and Semi-structured Databases for an Inquiry Application.

Marius Ebel, Martin Hulin


Hunting for Aardvarks: Can Software Security Be Measured?

Martin Gilje Jaatun


A Foundation for Requirements Analysis of Privacy Preserving Software.

Kristian Beckers, Maritta Heisel


On Complexity Reduction of User Interfaces for Safety-Critical Systems.

Andreas Holzinger, Evgenia Popova, Bernhard Peischl, Martina Ziefle


Security SLAs - An Idea Whose Time Has Come?

Martin Gilje Jaatun, Karin Bernsmed, Astrid Undheim


UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept.

Aneta Poniszewska-Maranda


A Formal Equivalence Classes Based Method for Security Policy Conformance Checking.

Eckehard Hermann, Udo Litschauer, Jürgen Fuß


Trust as an Organismic Trait of E-Commerce Systems.

Tanja Azderska, Borka Jerman Blazic


Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones.

Andreas Holzinger, Peter Treitler, Wolfgang Slany


Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives.

Mersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla, Athanasios K. Tsakalidis


Near Duplicate Document Detection for Large Information Flows.

Daniele Montanari, Piera Laura Puglisi


TinyStream Sensors.

Pedro Furtado


Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data.

Hiroshi Sato, Hisashi Kurasawa, Takeru Inoue, Motonori Nakamura, Hajime Matsumura, Kei'ichi Koyanagi


Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language Modeling.

Rachid Aknouche, Ounas Asfari, Fadila Bentayeb, Omar Boussaid


Indexing and Search for Fast Music Identification.

Guang-Ho Cha


Ontology-Based Retrieval of Experts - The Issue of Efficiency and Scalability within the eXtraSpec System.

Elzbieta Bukowska, Monika Kaczmarek, Piotr Stolarski, Witold Abramowicz


OrderBased Labeling Scheme for Dynamic XML Query Processing.

Beakal Gizachew Assefa, Belgin Ergenc


A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query Languages.

Anna Formica, Mauro Mazzei, Elaheh Pourabbas, Maurizio Rafanelli


Usage Control in Inter-organisational Collaborative Environments - A Case Study from an Industry Perspective.

Åsmund Ahlmann Nyre, Martin Gilje Jaatun


Stock Market Multi-Agent Recommendation System Based on the Elliott Wave Principle.

Monica Tirea, Ioan Tandau, Viorel Negru


Similarity of Transactions for Customer Segmentation.

Ke Lu, Tetsuya Furukawa


Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover Venues.

Jakub Dzikowski, Monika Kaczmarek, Szymon Lazaruk, Witold Abramowicz


Pay-As-You-Go Data Integration Using Functional Dependencies.

Naser Ayat, Hamideh Afsarmanesh, Reza Akbarinia, Patrick Valduriez


Analyzing Recommender System's Performance Fluctuations across Users.

Charif Haydar, Azim Roussanaly, Anne Boyer



A Secure Distributed Video Surveillance System Based on Portable Devices.

Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, Ilsun You


Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel.

Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione


How to Forge a Digital Alibi on Mac OS X.

Aniello Castiglione, Giuseppe Cattaneo, Roberto De Prisco, Alfredo De Santis, Kangbin Yim


Security-and-Privacy-Related Issues on IT Systems During Disasters.

Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake


Semantic Techniques of Image Retrieval - The Example of a Structural Analysis of Coronary Arteries.

Miroslaw Trzupek, Marek R. Ogiela


Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm.

Tomasz Hachaj, Marek R. Ogiela


Automatic Image Annotation Using Semantic Text Analysis.

Dongjin Choi, PanKoo Kim


Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control.

Chengjun Wang, Baokang Zhao, Wanrong Yu, Chunqing Wu, Zhenghu Gong


Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive Maps.

Giovanni Acampora, Vincenzo Loia, Autilia Vitiello


Mobile Malware Threats and Defenses for Homeland Security.

Seung-Hyun Seo, Kangbin Yim, Ilsun You


Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security Agencies.

Muhammad Naveed Iqbal Qureshi, Jin-Tae Kim, Sang-Woong Lee


Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts.

Marek Zachara, Dariusz Palka


A Formal Support for Collaborative Data Sharing.

Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Luca Wiegand


Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures.

Fredrik Seehusen, Bjørnar Solhaug


A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation.

Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai


Discussion on the Challenges and Opportunities of Cloud Forensics.

Rainer Poisel, Simon Tjoa


Towards a Logical Framework for Reasoning about Risk.

Matteo Cristani, Erisa Karafili, Luca Viganò


A Collaborative Approach to Botnet Protection.

Matija Stevanovic, Kasper Revsbech, Jens Myrup Pedersen, Robin Sharp, Christian Damsgaard Jensen


Consensus Building and In-operation Assurance for Service Dependability.

Yutaka Matsuno, Shuichiro Yamamoto


Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping.

Munkhbaatar Doyoddorj, Kyung Hyune Rhee