IFIP TC6 Open Digital Library

CD-ARES 2012: Prague, Czech Republic

Multidisciplinary Research and Practice for Information Systems - IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings

Gerald Quirchmayr, Josef Basl, Ilsun You, Lida Xu, Edgar Weippl

Springer, Lecture Notes in Computer Science 7465, ISBN: 978-3-642-32497-0



Contents

Conference

Ontology-Based Identification of Research Gaps and Immature Research Areas.

Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek

 1-16

A Context-Aware Mashup Integration Guideline for Enterprise 2.0.

Gerald Bader, Amin Anjomshoaa, A Min Tjoa

 17-30

Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline Blends.

Mostafa Kiani Deh Kiani, Barat Ghobadian, Fathollah Ommi, Gholamhassan Najafi, Talal Yusaf

 31-43

Validation of XML Documents with SWRL.

Jesús Manuel Almendros-Jiménez

 44-57

A Taxonomy of Dirty Time-Oriented Data.

Theresia Gschwandtner, Johannes Gärtner, Wolfgang Aigner, Silvia Miksch

 58-72

Combining Relational and Semi-structured Databases for an Inquiry Application.

Marius Ebel, Martin Hulin

 73-84

Hunting for Aardvarks: Can Software Security Be Measured?

Martin Gilje Jaatun

 85-92

A Foundation for Requirements Analysis of Privacy Preserving Software.

Kristian Beckers, Maritta Heisel

 93-107

On Complexity Reduction of User Interfaces for Safety-Critical Systems.

Andreas Holzinger, Evgenia Popova, Bernhard Peischl, Martina Ziefle

 108-122

Security SLAs - An Idea Whose Time Has Come?

Martin Gilje Jaatun, Karin Bernsmed, Astrid Undheim

 123-130

UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept.

Aneta Poniszewska-Maranda

 131-145

A Formal Equivalence Classes Based Method for Security Policy Conformance Checking.

Eckehard Hermann, Udo Litschauer, Jürgen Fuß

 146-160

Trust as an Organismic Trait of E-Commerce Systems.

Tanja Azderska, Borka Jerman Blazic

 161-175

Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones.

Andreas Holzinger, Peter Treitler, Wolfgang Slany

 176-189

Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives.

Mersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla, Athanasios K. Tsakalidis

 190-202

Near Duplicate Document Detection for Large Information Flows.

Daniele Montanari, Piera Laura Puglisi

 203-217

TinyStream Sensors.

Pedro Furtado

 218-232

Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data.

Hiroshi Sato, Hisashi Kurasawa, Takeru Inoue, Motonori Nakamura, Hajime Matsumura, Kei'ichi Koyanagi

 233-243

Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language Modeling.

Rachid Aknouche, Ounas Asfari, Fadila Bentayeb, Omar Boussaid

 244-258

Indexing and Search for Fast Music Identification.

Guang-Ho Cha

 259-271

Ontology-Based Retrieval of Experts - The Issue of Efficiency and Scalability within the eXtraSpec System.

Elzbieta Bukowska, Monika Kaczmarek, Piotr Stolarski, Witold Abramowicz

 272-286

OrderBased Labeling Scheme for Dynamic XML Query Processing.

Beakal Gizachew Assefa, Belgin Ergenc

 287-301

A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query Languages.

Anna Formica, Mauro Mazzei, Elaheh Pourabbas, Maurizio Rafanelli

 302-316

Usage Control in Inter-organisational Collaborative Environments - A Case Study from an Industry Perspective.

Åsmund Ahlmann Nyre, Martin Gilje Jaatun

 317-331

Stock Market Multi-Agent Recommendation System Based on the Elliott Wave Principle.

Monica Tirea, Ioan Tandau, Viorel Negru

 332-346

Similarity of Transactions for Customer Segmentation.

Ke Lu, Tetsuya Furukawa

 347-359

Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover Venues.

Jakub Dzikowski, Monika Kaczmarek, Szymon Lazaruk, Witold Abramowicz

 360-374

Pay-As-You-Go Data Integration Using Functional Dependencies.

Naser Ayat, Hamideh Afsarmanesh, Reza Akbarinia, Patrick Valduriez

 375-389

Analyzing Recommender System's Performance Fluctuations across Users.

Charif Haydar, Azim Roussanaly, Anne Boyer

 390-402

Workshop

A Secure Distributed Video Surveillance System Based on Portable Devices.

Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, Ilsun You

 403-415

Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel.

Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione

 416-429

How to Forge a Digital Alibi on Mac OS X.

Aniello Castiglione, Giuseppe Cattaneo, Roberto De Prisco, Alfredo De Santis, Kangbin Yim

 430-444

Security-and-Privacy-Related Issues on IT Systems During Disasters.

Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake

 445-459

Semantic Techniques of Image Retrieval - The Example of a Structural Analysis of Coronary Arteries.

Miroslaw Trzupek, Marek R. Ogiela

 460-467

Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm.

Tomasz Hachaj, Marek R. Ogiela

 468-478

Automatic Image Annotation Using Semantic Text Analysis.

Dongjin Choi, PanKoo Kim

 479-487

Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control.

Chengjun Wang, Baokang Zhao, Wanrong Yu, Chunqing Wu, Zhenghu Gong

 488-500

Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive Maps.

Giovanni Acampora, Vincenzo Loia, Autilia Vitiello

 501-515

Mobile Malware Threats and Defenses for Homeland Security.

Seung-Hyun Seo, Kangbin Yim, Ilsun You

 516-524

Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security Agencies.

Muhammad Naveed Iqbal Qureshi, Jin-Tae Kim, Sang-Woong Lee

 525-533

Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts.

Marek Zachara, Dariusz Palka

 534-546

A Formal Support for Collaborative Data Sharing.

Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Luca Wiegand

 547-561

Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures.

Fredrik Seehusen, Bjørnar Solhaug

 562-577

A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation.

Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai

 578-592

Discussion on the Challenges and Opportunities of Cloud Forensics.

Rainer Poisel, Simon Tjoa

 593-608

Towards a Logical Framework for Reasoning about Risk.

Matteo Cristani, Erisa Karafili, Luca Viganò

 609-623

A Collaborative Approach to Botnet Protection.

Matija Stevanovic, Kasper Revsbech, Jens Myrup Pedersen, Robin Sharp, Christian Damsgaard Jensen

 624-638

Consensus Building and In-operation Assurance for Service Dependability.

Yutaka Matsuno, Shuichiro Yamamoto

 639-653

Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping.

Munkhbaatar Doyoddorj, Kyung Hyune Rhee

 654-668