|
||||
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. A diploma will be issued in the name of the authors and mailed to the contact author. Papers Prototyping a New Identity Authentication Framework for IP Telephony Collaborative Approach to Automatic Classification of Heterogeneous Information Security Analysis of Computer Infection Risk Factors Based on Customer Network Usage Generic and Complete Three-Level Identity Management Model Vulnerability Dependencies in Antivirus Software Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques DEPEND Dependability Analysis of Information Systems with Hierarchical Reconfiguration of Services A Dependability Case Approach to the Assessment of IP Networks Event-Driven Architecture for Intrusion Detection Systems Based on Patterns Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems |
||||
Copyright (c) 2006-2010, IARIA