default search action
SEC 2010: Brisbane, Australia
- Kai Rannenberg, Vijay Varadharajan, Christian Weber:
Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings. IFIP Advances in Information and Communication Technology 330, Springer 2010, ISBN 978-3-642-15256-6
Kristian Beckman Award Awardee Keynote
- S. H. (Basie) von Solms:
The 5 Waves of Information Security - From Kristian Beckman to the Present. 1-8
Security Management
- William J. Caelli, Lam-for Kwok, Dennis Longley:
A Business Continuity Management Simulator. 9-18 - Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Mining Business-Relevant RBAC States through Decomposition. 19-30 - Rostyslav Barabanov, Stewart Kowalski:
Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study. 31-42
Security Management & Governance
- Karin Hedström, Gurpreet Dhillon, Fredrik Karlsson:
Using Actor Network Theory to Understand Information Security Management. 43-54 - C. C. Terence Tan, Anthonie B. Ruighaver, Atif Ahmad:
Information Security Governance: When Compliance Becomes More Important than Security. 55-67
Network Security & Authentication
- Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter:
Understanding Domain Registration Abuses. 68-79 - Markus Huber, Martin Mulazzani, Edgar R. Weippl:
Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites. 80-89 - Julian Schütte, Nicolai Kuntze, Andreas Fuchs, Atta Badii:
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems. 90-102 - Clemens Orthacker, Martin Centner, Christian Kittl:
Qualified Mobile Server Signature. 103-111
Intrusion Detection, Trust Management, and Models
- Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel:
Fraud Detection in ERP Systems Using Scenario Matching. 112-123 - Ejaz Ahmed, George M. Mohay, Alan Tickle, Sajal Bhatia:
Use of IP Addresses for High Rate Flooding Attack Detection. 124-135 - Sascha Hauke, Martin Pyka, Markus Borschbach, Dominik Heider:
Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information. 136-147 - Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment. 148-160
Software Security and Assurance
- Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism. 161-172 - Jonas Magazinius, Alejandro Russo, Andrei Sabelfeld:
On-the-fly Inlining of Dynamic Security Monitors. 173-186 - Gideon Myles, Hongxia Jin:
A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems. 187-202 - Martin Mink, Rainer Greifeneder:
Evaluation of the Offensive Approach in Information Security Education. 203-214
Panel
- Johan Van Niekerk, Rossouw von Solms:
Research Methodologies in Information Security Research: The Road Ahead. 215-216
Access Control and Privacy
- Hua Wang, Lili Sun, Vijay Varadharajan:
Purpose-Based Access Control Policies and Conflicting Analysis. 217-228 - Dongdong Sun, Colin Boyd, Juan Manuel González Nieto:
Delegation in Predicate Encryption Supporting Disjunctive Queries. 229-240 - Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy. 241-252 - Omar Hasan, Lionel Brunie, Elisa Bertino:
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments. 253-264
Privacy
- Mark Stegelmann:
Towards Fair Indictment for Data Collection with Self-Enforcing Privacy. 265-276 - Christian Kahl, Katja Böttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg:
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project. 277-288 - Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens:
Performance Analysis of Accumulator-Based Revocation Mechanisms. 289-301
Appendix
- Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous:
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. 302-310
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.