Security and Privacy – Silver Linings in the Cloud 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings /
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Techn...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Σειρά: | IFIP Advances in Information and Communication Technology,
330 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Kristian Beckman Award Awardee Keynote
- The 5 Waves of Information Security – From Kristian Beckman to the Present
- Security Management
- A Business Continuity Management Simulator
- Mining Business-Relevant RBAC States through Decomposition
- Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study
- Security Management & Governance
- Using Actor Network Theory to Understand Information Security Management
- Information Security Governance: When Compliance Becomes More Important than Security
- Network Security & Authentication
- Understanding Domain Registration Abuses
- Who on Earth Is “Mr. Cypher”: Automated Friend Injection Attacks on Social Networking Sites
- Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems
- Qualified Mobile Server Signature
- Intrusion Detection, Trust Management, and Models
- Fraud Detection in ERP Systems Using Scenario Matching
- Use of IP Addresses for High Rate Flooding Attack Detection
- Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information
- Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment
- Software Security and Assurance
- A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism
- On-the-fly Inlining of Dynamic Security Monitors
- A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems
- Evaluation of the Offensive Approach in Information Security Education
- Panel
- Research Methodologies in Information Security Research: The Road Ahead
- Access Control and Privacy
- Purpose-Based Access Control Policies and Conflicting Analysis
- Delegation in Predicate Encryption Supporting Disjunctive Queries
- Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy
- k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments
- Privacy
- Towards Fair Indictment for Data Collection with Self-Enforcing Privacy
- How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project
- Performance Analysis of Accumulator-Based Revocation Mechanisms
- IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems.