Table of Contents, vol 5, no 3&4, year 2012

pages: 68 - 80
Managing Timing Implications of Security Aspects in Model-Driven Development of Real-Time Embedded Systems
Mehrdad Saadatmand, Mälardalen Real-Time Research Centre (MRTC), Mälardalen University, Sweden
Thomas Leveque, Orange Labs, Meylan, France
Antonio Cicchetti, Mälardalen Real-Time Research Centre (MRTC), Mälardalen University, Sweden
Mikael Sjödin, Mälardalen Real-Time Research Centre (MRTC), Mälardalen University, Sweden

pages: 81 - 93
Preventing Protocol Switching Covert Channels
Steffen Wendzel, University of Hagen; Augsburg University of Applied Sciences, Germany
Jörg Keller, University of Hagen, Germany

pages: 94 - 111
Securing Access to Data in Business Intelligence Domains
Ahmad Altamimi, Concordia University, Canada
Todd Eavis, Concordia University, Canada

pages: 112 - 120
Verification with AVISPA to Engineer Network Security Protocols
Florian Kammueller Florian Kammueller, Middlesex University London, UK

pages: 121 - 133
Mitigating Distributed Service Flooding Attacks with Guided Tour Puzzles
Mehmud Abliz, University of Pittsburgh, USA
Taieb Znati, University of Pittsburgh, USA
Adam Lee, University of Pittsburgh, USA

pages: 134 - 143
A Distributed Hash Table Assisted Intrusion Prevention System
Zoltán Czirkos, Budapest University of Technology and Economics, Department of Electron Devices, Hungary
Márta Rencz, Budapest University of Technology and Economics, Department of Electron Devices, Hungary
Gábor Hosszú, Budapest University of Technology and Economics, Department of Electron Devices, Hungary

download vol 5, no 3&4, year 2012

 
Copyright (c) 2008-2010. IARIA, All rights reserved.