CD-ARES 2012: Prague, Czech Republic
Multidisciplinary Research and Practice for Information Systems - IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings
Gerald Quirchmayr, Josef Basl, Ilsun You, Lida Xu, Edgar Weippl
Springer, Lecture Notes in Computer Science 7465, ISBN: 978-3-642-32497-0
Contents
Conference
Ontology-Based Identification of Research Gaps and Immature Research Areas.
Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek
1-16
A Context-Aware Mashup Integration Guideline for Enterprise 2.0.
Gerald Bader, Amin Anjomshoaa, A Min Tjoa
17-30
Mostafa Kiani Deh Kiani, Barat Ghobadian, Fathollah Ommi, Gholamhassan Najafi, Talal Yusaf
31-43
A Taxonomy of Dirty Time-Oriented Data.
Theresia Gschwandtner, Johannes Gärtner, Wolfgang Aigner, Silvia Miksch
58-72
Combining Relational and Semi-structured Databases for an Inquiry Application.
Marius Ebel, Martin Hulin
73-84
A Foundation for Requirements Analysis of Privacy Preserving Software.
Kristian Beckers, Maritta Heisel
93-107
On Complexity Reduction of User Interfaces for Safety-Critical Systems.
Andreas Holzinger, Evgenia Popova, Bernhard Peischl, Martina Ziefle
108-122
Security SLAs - An Idea Whose Time Has Come?
Martin Gilje Jaatun, Karin Bernsmed, Astrid Undheim
123-130
Aneta Poniszewska-Maranda
131-145
A Formal Equivalence Classes Based Method for Security Policy Conformance Checking.
Eckehard Hermann, Udo Litschauer, Jürgen Fuß
146-160
Andreas Holzinger, Peter Treitler, Wolfgang Slany
176-189
Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives.
Mersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla, Athanasios K. Tsakalidis
190-202
Near Duplicate Document Detection for Large Information Flows.
Daniele Montanari, Piera Laura Puglisi
203-217
Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data.
Hiroshi Sato, Hisashi Kurasawa, Takeru Inoue, Motonori Nakamura, Hajime Matsumura, Kei'ichi Koyanagi
233-243
Rachid Aknouche, Ounas Asfari, Fadila Bentayeb, Omar Boussaid
244-258
Elzbieta Bukowska, Monika Kaczmarek, Piotr Stolarski, Witold Abramowicz
272-286
OrderBased Labeling Scheme for Dynamic XML Query Processing.
Beakal Gizachew Assefa, Belgin Ergenc
287-301
Anna Formica, Mauro Mazzei, Elaheh Pourabbas, Maurizio Rafanelli
302-316
Åsmund Ahlmann Nyre, Martin Gilje Jaatun
317-331
Stock Market Multi-Agent Recommendation System Based on the Elliott Wave Principle.
Monica Tirea, Ioan Tandau, Viorel Negru
332-346
Jakub Dzikowski, Monika Kaczmarek, Szymon Lazaruk, Witold Abramowicz
360-374
Pay-As-You-Go Data Integration Using Functional Dependencies.
Naser Ayat, Hamideh Afsarmanesh, Reza Akbarinia, Patrick Valduriez
375-389
Analyzing Recommender System's Performance Fluctuations across Users.
Charif Haydar, Azim Roussanaly, Anne Boyer
390-402
Workshop
A Secure Distributed Video Surveillance System Based on Portable Devices.
Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, Ilsun You
403-415
Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel.
Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione
416-429
How to Forge a Digital Alibi on Mac OS X.
Aniello Castiglione, Giuseppe Cattaneo, Roberto De Prisco, Alfredo De Santis, Kangbin Yim
430-444
Security-and-Privacy-Related Issues on IT Systems During Disasters.
Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake
445-459
Semantic Techniques of Image Retrieval - The Example of a Structural Analysis of Coronary Arteries.
Miroslaw Trzupek, Marek R. Ogiela
460-467
Tomasz Hachaj, Marek R. Ogiela
468-478
Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control.
Chengjun Wang, Baokang Zhao, Wanrong Yu, Chunqing Wu, Zhenghu Gong
488-500
Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive Maps.
Giovanni Acampora, Vincenzo Loia, Autilia Vitiello
501-515
Mobile Malware Threats and Defenses for Homeland Security.
Seung-Hyun Seo, Kangbin Yim, Ilsun You
516-524
Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security Agencies.
Muhammad Naveed Iqbal Qureshi, Jin-Tae Kim, Sang-Woong Lee
525-533
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts.
Marek Zachara, Dariusz Palka
534-546
A Formal Support for Collaborative Data Sharing.
Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Luca Wiegand
547-561
Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures.
Fredrik Seehusen, Bjørnar Solhaug
562-577
Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai
578-592
Discussion on the Challenges and Opportunities of Cloud Forensics.
Rainer Poisel, Simon Tjoa
593-608
Towards a Logical Framework for Reasoning about Risk.
Matteo Cristani, Erisa Karafili, Luca Viganò
609-623
A Collaborative Approach to Botnet Protection.
Matija Stevanovic, Kasper Revsbech, Jens Myrup Pedersen, Robin Sharp, Christian Damsgaard Jensen
624-638
Consensus Building and In-operation Assurance for Service Dependability.
Yutaka Matsuno, Shuichiro Yamamoto
639-653
Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping.
Munkhbaatar Doyoddorj, Kyung Hyune Rhee
654-668