Security and Privacy – Silver Linings in the Cloud 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings /

These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Techn...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Rannenberg, Kai (Επιμελητής έκδοσης), Varadharajan, Vijay (Επιμελητής έκδοσης), Weber, Christian (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Σειρά:IFIP Advances in Information and Communication Technology, 330
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Kristian Beckman Award Awardee Keynote
  • The 5 Waves of Information Security – From Kristian Beckman to the Present
  • Security Management
  • A Business Continuity Management Simulator
  • Mining Business-Relevant RBAC States through Decomposition
  • Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study
  • Security Management & Governance
  • Using Actor Network Theory to Understand Information Security Management
  • Information Security Governance: When Compliance Becomes More Important than Security
  • Network Security & Authentication
  • Understanding Domain Registration Abuses
  • Who on Earth Is “Mr. Cypher”: Automated Friend Injection Attacks on Social Networking Sites
  • Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems
  • Qualified Mobile Server Signature
  • Intrusion Detection, Trust Management, and Models
  • Fraud Detection in ERP Systems Using Scenario Matching
  • Use of IP Addresses for High Rate Flooding Attack Detection
  • Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information
  • Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment
  • Software Security and Assurance
  • A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism
  • On-the-fly Inlining of Dynamic Security Monitors
  • A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems
  • Evaluation of the Offensive Approach in Information Security Education
  • Panel
  • Research Methodologies in Information Security Research: The Road Ahead
  • Access Control and Privacy
  • Purpose-Based Access Control Policies and Conflicting Analysis
  • Delegation in Predicate Encryption Supporting Disjunctive Queries
  • Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy
  • k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments
  • Privacy
  • Towards Fair Indictment for Data Collection with Self-Enforcing Privacy
  • How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project
  • Performance Analysis of Accumulator-Based Revocation Mechanisms
  • IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems.