Lecture Notes in Computer Science 8127
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David Hutchison
Lancaster University, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Alfred Kobsa
University of California, Irvine, CA, USA
Friedemann Mattern
ETH Zurich, Switzerland
John C. Mitchell
Stanford University, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
Oscar Nierstrasz
University of Bern, Switzerland
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Germany
Madhu Sudan
Microsoft Research, Cambridge, MA, USA
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbruecken, Germany
Alfredo Cuzzocrea Christian Kittl
Dimitris E. Simos EdgarWeippl LidaXu(Eds.)
Availability, Reliability,
and Security
in Information Systems
and HCI
IFIP WG 8.4, 8.9, TC 5 International
Cross-Domain Conference, CD-ARES 2013
Regensburg, Germany, September 2-6, 2013
Proceedings
13
Volume Editors
Alfredo Cuzzocrea
ICAR-CNR
and University of Calabria
Rende Cosenza, Italy
E-mail: cuzzocrea@si.deis.unical.it
Christian Kittl
Evolaris Next Level
Graz, Austria
E-mail: christian.kittl@evolaris.net
Dimitris E. Simos
SBA Research
Vienna, Austria
E-mail: dsimos@sba-research.org
Edgar Weippl
Vienna University of Technology
and SBA Research
Vienna, Austria
E-mail: edgar.weippl@tuwien.ac.at
Lida Xu
Old Dominion University
Norfolk, VA, USA
E-mail: lxu@odu.edu
ISSN 0302-9743 e-ISSN 1611-3349
ISBN 978-3-642-40510-5 e-ISBN 978-3-642-40511-2
DOI 10.1007/978-3-642-40511-2
Springer Heidelberg New York Dordrecht London
Library of Congress Control Number: 2013945883
CR Subject Classification (1998): H.4, K.6.5, H.3.1, H.3.3-5, E.3, K.4.4, H.2.3, H.2.8,
H.5.3, D.2, J.1
LNCS Sublibrary: SL 3 – Information Systems and Application, incl. Internet/Web
and HCI
© IFIP International Federation for Information Processing 2013
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection
with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and
executedon a computer system, for exclusiveuse bythe purchaserof thework. Duplication of thispublication
or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location,
in its current version, and permission for use must always be obtained from Springer. Permissions for use
may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution
under the respective Copyright Law.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
While the advice and information in this book are believed to be true and accurate at the date of publication,
neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or
omissions that may be made. The publisher makes no warranty, express or implied, with respect to the
material contained herein.
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
The Cross-Domain Conference and Workshop CD-ARES is focused on the holis-
tic and scientific view of applications in the domain of information systems.
The idea of organizing cross-domain scientific events originated from a con-
cept presented by the IFIP President Leon Strous at the IFIP 2010 World Com-
puter Congress in Brisbane, which was seconded by many IFIP delegates in
further discussions. Therefore, CD-ARES concentrates on the many aspects of
information systems in bridging the gap between the research results in computer
science and the many application fields.
This effort leads us to the consideration of the various important issues of
massive information sharing and data integration, which will (in our opinion)
dominate scientific work and discussions in the area of information systems in
the second decade of this century.
The organizers of this event who are engaged within IFIP in the area of En-
terprise Information Systems (WG 8.9), Business Information Systems (WG 8.4),
and Information Technology Applications (TC 5) very much welcome the typical
cross-domain aspect of this event.
The collocation with the SeCIHD 2013 Workshop was another possibility to
discuss the most essential application factors. Special thanks to Professor Ilsun
You for all his efforts in this special track, which was this year for the third time.
Also, we are proud to announce the Special Session Human–Computer Inter-
action & Knowledge Discovery (HCI-KDD), which was organized in the context of
CD-ARES 2013. The ultimate goal of the task force HCI-KDD is to combine the
best of two worlds: human–computer interaction (HCI), with emphasis on human
intelligence, and knowledge discovery from data (KDD), dealing with computa-
tional intelligence. The cross-domain integration and appraisal of different fields
provide an atmosphere in which to foster different perspectives and opinions. Spe-
cial thanks to Dr. Andreas Holzinger, who made it possible to bring together re-
searchers from diverse areas in a highly inter-disciplinary manner, to stimulate
fresh ideas and encourage multi-disciplinary work.
Today, e-business depends heavily on the major cryptographic breakthroughs
of almost 40 years ago. Without asymmetric cryptography, hardly any form of
business transaction would be as easy to secure as it is today. We are thus very
happy to have an excellent section on applied cryptography in this book.
The special track on modern cryptography and security engineering (MoCry-
SEn) attracted 30 submissions, of which the Program Committee selected 16
for publication in the workshop proceedings. The accepted papers dealt with
symmetric-key cryptography, public-key cryptography, algorithmic cryptanaly-
sis, software and hardware implementation of cryptographic algorithms, database
encryption and interaction between cryptographic theory and implementation
issues.
VI Preface
The papers presented at this conference were selected after extensive reviews
by the Program Committee with the essential help of associated reviewers.
We would like to thank all the Program Committee members and the review-
ers, who made great effort contributing their time, knowledge, and expertise and
foremost the authors for their contributions.
September 2013 Alfredo Cuzzocrea
Christian Kittl
Dimitris E. Simos
Edgar Weippl
Lida Xu