Information security and privacy research : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings /
Saved in:
Meeting name: | IFIP TC11 International Conference on Information Security (27th : 2012 : Ērakleion, Greece) |
---|---|
Imprint: | Berlin ; New York : Springer, ©2012. |
Description: | 1 online resource. |
Language: | English |
Series: | IFIP advances in information and communication technology, 1868-4238 ; 376 IFIP advances in information and communication technology ; 376. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11076972 |
Table of Contents:
- Relay Attacks on Secure Element-Enabled Mobile Devices / Virtual Pickpocketing Revisited / Michael Roland, Josef Langer and Josef Scharinger
- Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) / Alessandro Armando, Alessio Merlo, Mauro Migliardi and Luca Verderame
- An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling / Bernhard J. Berger and Karsten Sohr
- Embedded Eavesdropping on Java Card / Guillaume Barbu, Christophe Giraud and Vincent Guerin
- Authenticated Key Exchange (AKE) in Delay Tolerant Networks / Sofia Anna Menesidou and Vasilios Katos
- OFELIA
- A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management / Alexandre B. Augusto and Manuel Eduardo Correia
- Smart OpenID: A Smart Card Based OpenID Protocol / Andreas Leicher, Andreas U. Schmidt and Yogendra Shah
- Peer to Peer Botnet Detection Based on Flow Intervals / David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed and Sherif Saad, et al.
- Towards a Universal Data Provenance Framework Using Dynamic Instrumentation / Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis and Sotiris Ioannidis
- Improving Flask Implementation Using Hardware Assisted In-VM Isolation / Baozeng Ding, Fufeng Yao, Yanjun Wu and Yeping He.
- HyperForce: Hypervisor-enForced Execution of Security-Critical Code / Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg and Wouter Joosen
- RandHyp: Preventing Attacks via Xen Hypercall Interface / Feifei Wang, Ping Chen, Bing Mao and Li Xie
- Role Mining under Role-Usage Cardinality Constraint / John C. John, Shamik Sural, Vijayalakshmi Atluri and Jaideep S. Vaidya
- HIDE_DHCP: Covert Communications through Network Configuration Messages / Ruben Rios, Jose A. Onieva and Javier Lopez
- Handling Stateful Firewall Anomalies / Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Tarik Moataz and Xavier Rimasson
- A Framework for Threat Assessment in Access Control Systems / Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi and Luigi Logrippo
- Support for Write Privileges on Outsourced Data / Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati
- Malicious Users' Transactions: Tackling Insider Threat / Weihan Li, Brajendra Panda and Qussai Yaseen
- Privacy-Preserving Television Audience Measurement Using Smart TVs / George Drosatos, Aimilia Tasidou and Pavlos S. Efraimidis
- Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility / Christian Banse, Dominik Herrmann and Hannes Federrath.
- Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition / Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou and Dimitris Gritzalis
- Modeling Social Engineering Botnet Dynamics across Multiple Social Networks / Shuhao Li, Xiaochun Yun, Zhiyu Hao, Yongzheng Zhang and Xiang Cui, et al.
- Layered Analysis of Security Ceremonies / Giampaolo Bella and Lizzie Coles-Kemp
- A Small Depth-16 Circuit for the AES S-Box / Joan Boyar and René Peralta
- Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol / Maria Christofi and Aline Gouget
- My Authentication Album: Adaptive Images-Based Login Mechanism / Amir Herzberg and Ronen Margulies
- Balancing Security and Usability of Local Security Mechanisms for Mobile Devices / Shuzhe Yang and Gökhan Bal
- Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation / Ella Kolkowska and Bart De Decker
- When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems / Gurpreet Dhillon, Tiago Oliveira, Santa Susarapu and Mário Caldeira
- Security-by-Contract for the OSGi Platform / Olga Gadyatskaya, Fabio Massacci and Anton Philippov
- Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis / Hyundo Park, Sung-Oh David Jung, Heejo Lee and Hoh Peter In.
- Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds / Yulong Zhang, Min Li, Kun Bai, Meng Yu and Wanyu Zang
- Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework / Han Jiao, Jixue Liu, Jiuyong Li and Chengfei Liu
- A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation / Giuseppe D'Acquisto, Marta Flamini and Maurizio Naldi
- Optimizing Network Patching Policy Decisions / Yolanta Beres and Jonathan Griffin
- A Risk Assessment Method for Smartphones / Marianthi Theoharidou, Alexios Mylonas and Dimitris Gritzalis
- Empirical Benefits of Training to Phishing Susceptibility / Ronald Dodge, Kathryn Coronges and Ericka Rovira
- Multi-modal Behavioural Biometric Authentication for Mobile Devices / Hataichanok Saevanee, Nathan L. Clarke and Steven M. Furnell
- Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks / Christoforos Ntantogian, Christos Xenakis and Ioannis Stavrakakis
- Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks / Yongge Wang
- Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains / Shaoying Cai, Yingjiu Li and Yunlei Zhao
- Enhanced Dictionary Based Rainbow Table / Vrizlynn L.L. Thing and Hwei-Ming Ying.
- Authorization Policies for Materialized Views / Sarah Nait-Bahloul, Emmanuel Coquery and Mohand-Saïd Hacid
- Enhancing the Security of On-line Transactions with CAPTCHA Keyboard / Yongdong Wu and Zhigang Zhao
- Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach / Xin Kang and Yongdong Wu
- A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network / Ioannis Psaroudakis, Vasilios Katos and Pavlos S. Efraimidis
- A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages / Marco Prandini and Marco Ramilli
- Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System / Milica Milutinovic, Vincent Naessens and Bart De Decker
- Web Services Security Assessment: An Authentication-Focused Approach / Yannis Soupionis and Miltiadis Kandias
- Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case / Nineta Polemi and Theodoros Ntouskas
- A Response Strategy Model for Intrusion Response Systems / Nor Badrul Anuar, Maria Papadaki, Steven Furnell and Nathan Clarke
- Intrusion Tolerance of Stealth DoS Attacks to Web Services / Massimo Ficco and Massimiliano Rak
- Towards Use-Based Usage Control / Christos Grompanopoulos and Ioannis Mavridis.