Submit a Paper

The Second International Conference on Emerging Security Information, Systems and Technologies


August 25-31, 2008 - Cap Esterel, France


The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference.

A diploma will be issued in the name of the authors and mailed to the contact author.


Prototyping a New Identity Authentication Framework for IP Telephony
Shu-Lin Chen, Stanley Chow, Christophe Gustave, and Dmitri Vinokurov

Collaborative Approach to Automatic Classification of Heterogeneous Information Security
Fatiha Benali, Stéphane Ubéda, and Véronique Legrand

Analysis of Computer Infection Risk Factors Based on Customer Network Usage
Yannick Carlinet, Ludovic Mé, Hervé Debar, and Yvon Gourhant

Generic and Complete Three-Level Identity Management Model
Marcin Dabrowski and P. Pacyna

Vulnerability Dependencies in Antivirus Software
Kreetta Askola, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, and Juha Röning

Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
Frederic Stumpf and Claudia Eckert


Dependability Analysis of Information Systems with Hierarchical Reconfiguration of Services
Dariusz Caban and Wojciech Zamojski

A Dependability Case Approach to the Assessment of IP Networks
Ilkka Norros, Pirkko Kuusela, and Pekka Savola

Event-Driven Architecture for Intrusion Detection Systems Based on Patterns
Jesús J. Martínez Molina, Miguel A. Hernández Ruíz, Manuel Gil Pérez, Gregorio Martínez Pérez, and Antonio F. Gómez Skarmeta

Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems
Maurice Israel, Julien Borgel, and Andre Cotton


Copyright (c) 2006-2010, IARIA