IFIP TC6 Open Digital Library

ARES 2011: Vienna, Austria

Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings

A Min Tjoa, Gerald Quirchmayr, Ilsun You, Lida Xu

Springer, Lecture Notes in Computer Science 6908, ISBN: 978-3-642-23299-2



Contents

Conference

Benefits of Federated Identity Management - A Survey from an Integrated Operations Viewpoint.

Jostein Jensen

 1-12

A Security Policy Model for Agent Based Service-Oriented Architectures.

Eckehard Hermann

 13-25

A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting.

Maria B. Line, Inger Anne Tøndel, Erlend Andreas Gjære

 26-37

Usage Control Enforcement - A Survey.

Åsmund Ahlmann Nyre

 38-49

Discovery and Integration of Web 2.0 Content into Geospatial Information Infrastructures: A Use Case in Wild Fire Monitoring.

Manuela Núñez-Redó, Laura Díaz, José Gil, David González, Joaquín Huerta

 50-68

The Problem of Conceptual Incompatibility - Exploring the Potential of Conceptual Data Independence to Ease Data Integration.

Simon McGinnes

 69-81

Health Care Reform and the Internet.

Patricia MacTaggart, Stephanie Fiore

 82-88

Integrating Patient-Related Entities Using Hospital Information System Data and Automatic Analysis of Free Text.

Svetla Boytcheva, Galia Angelova, Zhivko Angelov, Dimitar Tcharaktchiev, Hristo Dimitrov

 89-101

A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) Applications.

Ratnesh Sahay, Ronan Fox, Antoine Zimmermann, Axel Polleres, Manfred Hauswirth

 102-117

Application of Answer Set Programming for Public Health Data Integration and Analysis.

Monica L. Nogueira, Noel P. Greis

 118-134

Workshop

Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection.

Tomasz Hachaj, Marek R. Ogiela

 135-148

Hierarchical Knowledge Structure Applied to Image Analyzing System - Possibilities of Practical Usage.

Krzysztof Wójcik

 149-163

Evaluation of Topological Vulnerability of the Internet under Regional Failures.

Wei Peng, Zimu Li, Jinshu Su, Muwei Dong

 164-175

VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss.

Masaya Sato, Toshihiro Yamauchi

 176-190

Augmenting Surveillance System Capabilities by Exploiting Event Correlation and Distributed Attack Detection.

Francesco Flammini, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini

 191-204

Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices.

Leandro Marin, Antonio J. Jara, Antonio F. Gómez-Skarmeta

 205-219

Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes.

Miroslaw Trzupek

 220-227

Pose and Expression Recognition Using Limited Feature Points Based on a Dynamic Bayesian Network.

Wei Zhao, Goo-Rak Kwon, Sang-Woong Lee

 228-242

Extended Spatio-temporal Relations between Moving and Non-moving Objects.

Chang Choi, Junho Choi, Juhyun Shin, Ilsun You, PanKoo Kim

 243-254

A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks.

Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang

 255-270

Securing Location-Aware Services Based on Online/Offline Signatures in VANETs.

Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee

 271-285

A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis.

Munkhbaatar Doyoddorj, Kyung Hyune Rhee

 286-294

Learning Web Application Firewall - Benefits and Caveats.

Dariusz Palka, Marek Zachara

 295-308

A Novel Chaining Approach to Indirect Control Transfer Instructions.

Wei Chen 0009, Zhiying Wang, Qiang Dou, Yongwen Wang

 309-320

A Study on Context Services Model with Location Privacy.

Hoon Ko, Goreti Marreiros, Zita Vale, Jongmyung Choi

 321-329

Digital Profiling: A Computer Forensics Approach.

Clara Maria Colombini, Antonio Colella

 330-343

New Steganographic Techniques for the OOXML File Format.

Aniello Castiglione, Bonaventura D'Alessio, Alfredo De Santis, Francesco Palmieri

 344-358

Automated Construction of a False Digital Alibi.

Alfredo De Santis, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Mario Ianulardo

 359-373

IT Issues on Homeland Security and Defense.

Kangbin Yim, Ilsun You

 374-385