


default search action
ARES 2011: Vienna, Austria
- A Min Tjoa
, Gerald Quirchmayr, Ilsun You, Lida Xu:
Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings. Lecture Notes in Computer Science 6908, Springer 2011, ISBN 978-3-642-23299-2
Conference
- Jostein Jensen:
Benefits of Federated Identity Management - A Survey from an Integrated Operations Viewpoint. 1-12 - Eckehard Hermann:
A Security Policy Model for Agent Based Service-Oriented Architectures. 13-25 - Maria B. Line, Inger Anne Tøndel, Erlend Andreas Gjære:
A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting. 26-37 - Åsmund Ahlmann Nyre:
Usage Control Enforcement - A Survey. 38-49 - Manuela Núñez-Redó, Laura Díaz, José Gil, David González, Joaquín Huerta
:
Discovery and Integration of Web 2.0 Content into Geospatial Information Infrastructures: A Use Case in Wild Fire Monitoring. 50-68 - Simon McGinnes:
The Problem of Conceptual Incompatibility - Exploring the Potential of Conceptual Data Independence to Ease Data Integration. 69-81 - Patricia MacTaggart, Stephanie Fiore:
Health Care Reform and the Internet. 82-88 - Svetla Boytcheva
, Galia Angelova, Zhivko Angelov, Dimitar Tcharaktchiev
, Hristo Dimitrov:
Integrating Patient-Related Entities Using Hospital Information System Data and Automatic Analysis of Free Text. 89-101 - Ratnesh Sahay, Ronan Fox, Antoine Zimmermann
, Axel Polleres
, Manfred Hauswirth:
A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) Applications. 102-117 - Monica L. Nogueira
, Noel P. Greis:
Application of Answer Set Programming for Public Health Data Integration and Analysis. 118-134
Workshop
- Tomasz Hachaj
, Marek R. Ogiela:
Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection. 135-148 - Krzysztof Wójcik
:
Hierarchical Knowledge Structure Applied to Image Analyzing System - Possibilities of Practical Usage. 149-163 - Wei Peng, Zimu Li, Jinshu Su, Muwei Dong:
Evaluation of Topological Vulnerability of the Internet under Regional Failures. 164-175 - Masaya Sato, Toshihiro Yamauchi
:
VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss. 176-190 - Francesco Flammini
, Nicola Mazzocca
, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini:
Augmenting Surveillance System Capabilities by Exploiting Event Correlation and Distributed Attack Detection. 191-204 - Leandro Marín, Antonio J. Jara, Antonio Fernandez Gómez-Skarmeta:
Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices. 205-219 - Miroslaw Trzupek:
Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes. 220-227 - Wei Zhao, Goo-Rak Kwon, Sang-Woong Lee:
Pose and Expression Recognition Using Limited Feature Points Based on a Dynamic Bayesian Network. 228-242 - Chang Choi
, Junho Choi, Juhyun Shin
, Ilsun You, Pankoo Kim:
Extended Spatio-temporal Relations between Moving and Non-moving Objects. 243-254 - Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang:
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks. 255-270 - Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee:
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs. 271-285 - Munkhbaatar Doyoddorj, Kyung Hyune Rhee:
A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis. 286-294 - Dariusz Palka, Marek Zachara:
Learning Web Application Firewall - Benefits and Caveats. 295-308 - Wei Chen, Zhiying Wang, Qiang Dou, Yongwen Wang:
A Novel Chaining Approach to Indirect Control Transfer Instructions. 309-320 - Hoon Ko
, Goreti Marreiros
, Zita A. Vale
, Jongmyung Choi
:
A Study on Context Services Model with Location Privacy. 321-329 - Clara Maria Colombini, Antonio Colella:
Digital Profiling: A Computer Forensics Approach. 330-343 - Aniello Castiglione
, Bonaventura D'Alessio, Alfredo De Santis
, Francesco Palmieri
:
New Steganographic Techniques for the OOXML File Format. 344-358 - Alfredo De Santis
, Aniello Castiglione
, Giuseppe Cattaneo
, Giancarlo De Maio, Mario Ianulardo:
Automated Construction of a False Digital Alibi. 359-373 - Kangbin Yim, Ilsun You:
IT Issues on Homeland Security and Defense. 374-385

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.