Information security and privacy research : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings /
Saved in:
Meeting name: | IFIP TC11 International Conference on Information Security (27th : 2012 : Ērakleion, Greece) |
---|---|
Imprint: | Berlin ; New York : Springer, ©2012. |
Description: | 1 online resource. |
Language: | English |
Series: | IFIP advances in information and communication technology, 1868-4238 ; 376 IFIP advances in information and communication technology ; 376. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11076972 |
MARC
LEADER | 00000cam a2200000Ka 4500 | ||
---|---|---|---|
001 | 11076972 | ||
005 | 20170630045816.5 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 120618s2012 gw ob 101 0 eng d | ||
003 | ICU | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d ZMC |d OCLCQ |d E7B |d MEAUC |d OCLCF |d BEDGE |d NLGGC |d OCLCO |d COO |d YDXCP |d OCLCA |d OCL |d OCLCO |d OCLCQ |d EBLCP |d OCLCQ |d VT2 |d Z5A | ||
019 | |a 808198658 | ||
020 | |a 9783642304361 |q (electronic bk.) | ||
020 | |a 3642304362 |q (electronic bk.) | ||
020 | |a 3642304354 | ||
020 | |a 9783642304354 | ||
020 | |z 9783642304354 | ||
024 | 7 | |a 10.1007/978-3-642-30436-1 |2 doi | |
035 | |a (OCoLC)795715536 |z (OCoLC)808198658 | ||
050 | 4 | |a QA76.9.A25 |b I35 2012 | |
084 | |a 54.62 |2 bcl | ||
084 | |a 54.32 |2 bcl | ||
049 | |a MAIN | ||
111 | 2 | |a IFIP TC11 International Conference on Information Security |n (27th : |d 2012 : |c Ērakleion, Greece) | |
245 | 1 | 0 | |a Information security and privacy research : |b 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / |c Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.). |
246 | 3 | 0 | |a SEC 2012 |
260 | |a Berlin ; |a New York : |b Springer, |c ©2012. | ||
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
490 | 1 | |a IFIP advances in information and communication technology, |x 1868-4238 ; |v 376 | |
505 | 0 | 0 | |t Relay Attacks on Secure Element-Enabled Mobile Devices / |r Virtual Pickpocketing Revisited / |r Michael Roland, Josef Langer and Josef Scharinger -- |t Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) / |r Alessandro Armando, Alessio Merlo, Mauro Migliardi and Luca Verderame -- |t An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling / |r Bernhard J. Berger and Karsten Sohr -- |t Embedded Eavesdropping on Java Card / |r Guillaume Barbu, Christophe Giraud and Vincent Guerin -- |t Authenticated Key Exchange (AKE) in Delay Tolerant Networks / |r Sofia Anna Menesidou and Vasilios Katos -- |t OFELIA -- A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management / |r Alexandre B. Augusto and Manuel Eduardo Correia -- |t Smart OpenID: A Smart Card Based OpenID Protocol / |r Andreas Leicher, Andreas U. Schmidt and Yogendra Shah -- |t Peer to Peer Botnet Detection Based on Flow Intervals / |r David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed and Sherif Saad, et al. -- |t Towards a Universal Data Provenance Framework Using Dynamic Instrumentation / |r Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis and Sotiris Ioannidis -- |t Improving Flask Implementation Using Hardware Assisted In-VM Isolation / |r Baozeng Ding, Fufeng Yao, Yanjun Wu and Yeping He. |
505 | 0 | 0 | |t HyperForce: Hypervisor-enForced Execution of Security-Critical Code / |r Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg and Wouter Joosen -- |t RandHyp: Preventing Attacks via Xen Hypercall Interface / |r Feifei Wang, Ping Chen, Bing Mao and Li Xie -- |t Role Mining under Role-Usage Cardinality Constraint / |r John C. John, Shamik Sural, Vijayalakshmi Atluri and Jaideep S. Vaidya -- |t HIDE_DHCP: Covert Communications through Network Configuration Messages / |r Ruben Rios, Jose A. Onieva and Javier Lopez -- |t Handling Stateful Firewall Anomalies / |r Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Tarik Moataz and Xavier Rimasson -- |t A Framework for Threat Assessment in Access Control Systems / |r Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi and Luigi Logrippo -- |t Support for Write Privileges on Outsourced Data / |r Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati -- |t Malicious Users' Transactions: Tackling Insider Threat / |r Weihan Li, Brajendra Panda and Qussai Yaseen -- |t Privacy-Preserving Television Audience Measurement Using Smart TVs / |r George Drosatos, Aimilia Tasidou and Pavlos S. Efraimidis -- |t Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility / |r Christian Banse, Dominik Herrmann and Hannes Federrath. |
505 | 0 | 0 | |t Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition / |r Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou and Dimitris Gritzalis -- |t Modeling Social Engineering Botnet Dynamics across Multiple Social Networks / |r Shuhao Li, Xiaochun Yun, Zhiyu Hao, Yongzheng Zhang and Xiang Cui, et al. -- |t Layered Analysis of Security Ceremonies / |r Giampaolo Bella and Lizzie Coles-Kemp -- |t A Small Depth-16 Circuit for the AES S-Box / |r Joan Boyar and René Peralta -- |t Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol / |r Maria Christofi and Aline Gouget -- |t My Authentication Album: Adaptive Images-Based Login Mechanism / |r Amir Herzberg and Ronen Margulies -- |t Balancing Security and Usability of Local Security Mechanisms for Mobile Devices / |r Shuzhe Yang and Gökhan Bal -- |t Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation / |r Ella Kolkowska and Bart De Decker -- |t When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems / |r Gurpreet Dhillon, Tiago Oliveira, Santa Susarapu and Mário Caldeira -- |t Security-by-Contract for the OSGi Platform / |r Olga Gadyatskaya, Fabio Massacci and Anton Philippov -- |t Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis / |r Hyundo Park, Sung-Oh David Jung, Heejo Lee and Hoh Peter In. |
505 | 0 | 0 | |t Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds / |r Yulong Zhang, Min Li, Kun Bai, Meng Yu and Wanyu Zang -- |t Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework / |r Han Jiao, Jixue Liu, Jiuyong Li and Chengfei Liu -- |t A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation / |r Giuseppe D'Acquisto, Marta Flamini and Maurizio Naldi -- |t Optimizing Network Patching Policy Decisions / |r Yolanta Beres and Jonathan Griffin -- |t A Risk Assessment Method for Smartphones / |r Marianthi Theoharidou, Alexios Mylonas and Dimitris Gritzalis -- |t Empirical Benefits of Training to Phishing Susceptibility / |r Ronald Dodge, Kathryn Coronges and Ericka Rovira -- |t Multi-modal Behavioural Biometric Authentication for Mobile Devices / |r Hataichanok Saevanee, Nathan L. Clarke and Steven M. Furnell -- |t Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks / |r Christoforos Ntantogian, Christos Xenakis and Ioannis Stavrakakis -- |t Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks / |r Yongge Wang -- |t Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains / |r Shaoying Cai, Yingjiu Li and Yunlei Zhao -- |t Enhanced Dictionary Based Rainbow Table / |r Vrizlynn L.L. Thing and Hwei-Ming Ying. |
505 | 0 | 0 | |t Authorization Policies for Materialized Views / |r Sarah Nait-Bahloul, Emmanuel Coquery and Mohand-Saïd Hacid -- |t Enhancing the Security of On-line Transactions with CAPTCHA Keyboard / |r Yongdong Wu and Zhigang Zhao -- |t Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach / |r Xin Kang and Yongdong Wu -- |t A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network / |r Ioannis Psaroudakis, Vasilios Katos and Pavlos S. Efraimidis -- |t A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages / |r Marco Prandini and Marco Ramilli -- |t Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System / |r Milica Milutinovic, Vincent Naessens and Bart De Decker -- |t Web Services Security Assessment: An Authentication-Focused Approach / |r Yannis Soupionis and Miltiadis Kandias -- |t Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case / |r Nineta Polemi and Theodoros Ntouskas -- |t A Response Strategy Model for Intrusion Response Systems / |r Nor Badrul Anuar, Maria Papadaki, Steven Furnell and Nathan Clarke -- |t Intrusion Tolerance of Stealth DoS Attacks to Web Services / |r Massimo Ficco and Massimiliano Rak -- |t Towards Use-Based Usage Control / |r Christos Grompanopoulos and Ioannis Mavridis. |
504 | |a Includes bibliographical references and author index. | ||
520 | |a This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation. | ||
650 | 0 | |a Computer security |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101458 | |
650 | 0 | |a Data protection |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008102034 | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101490 | |
650 | 0 | |a Internet |x Security measures |v Congresses. | |
650 | 0 | |a Computer networks |x Access control |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2007008426 | |
650 | 7 | |a Informatique. |2 eclas | |
650 | 7 | |a Computer networks |x Access control. |2 fast |0 (OCoLC)fst00872298 | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Data protection. |2 fast |0 (OCoLC)fst00887958 | |
650 | 7 | |a Internet |x Security measures. |2 fast |0 (OCoLC)fst01751426 | |
653 | 4 | |a Computer science. | |
653 | 4 | |a Computer Communication Networks. | |
653 | 4 | |a Data encryption (Computer science) | |
653 | 4 | |a Computer software. | |
653 | 4 | |a Information Systems. | |
653 | 4 | |a Management of Computing and Information Systems. | |
653 | 4 | |a Data Encryption. | |
653 | 4 | |a Computers and Society. | |
653 | 4 | |a Algorithm Analysis and Problem Complexity. | |
653 | 4 | |a Information Systems Applications (incl. Internet) | |
655 | 4 | |a Electronic books. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772 | |
700 | 1 | |a Gritzalis, Dimitris. |0 http://id.loc.gov/authorities/names/nr97001921 |1 http://viaf.org/viaf/12209857 | |
700 | 1 | |a Furnell, Steven, |d 1970- |0 http://id.loc.gov/authorities/names/n2001108205 |1 http://viaf.org/viaf/85656877 | |
700 | 1 | |a Theoharidou, Marianthi. |0 http://id.loc.gov/authorities/names/nb2010024568 |1 http://viaf.org/viaf/306105316 | |
776 | 0 | 8 | |i Printed edition: |z 9783642304354 |
830 | 0 | |a IFIP advances in information and communication technology ; |v 376. | |
856 | 4 | 0 | |u http://link.springer.com/10.1007/978-3-642-30436-1 |y SpringerLink |
903 | |a HeVa | ||
929 | |a eresource | ||
999 | f | f | |i e24c47d5-aacb-5ff2-86ad-448ee60b1965 |s 5cf207f9-ca5b-57ef-af45-b6abb090223d |
928 | |t Library of Congress classification |a QA76.9.A25 I35 2012 |l Online |c UC-FullText |u http://link.springer.com/10.1007/978-3-642-30436-1 |z SpringerLink |g ebooks |i 9887152 |