Atjaunināt sīkdatņu piekrišanu

Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings [Hardback]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Hardback, 330 pages, height x width: 235x155 mm, weight: 682 g, XIV, 330 p., 1 Hardback
  • Sērija : IFIP Advances in Information and Communication Technology 354
  • Izdošanas datums: 24-May-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642214231
  • ISBN-13: 9783642214233
  • Hardback
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 330 pages, height x width: 235x155 mm, weight: 682 g, XIV, 330 p., 1 Hardback
  • Sērija : IFIP Advances in Information and Communication Technology 354
  • Izdošanas datums: 24-May-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642214231
  • ISBN-13: 9783642214233
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion detection.
Kristian Beckman Award Keynote
Patience, Persistence, and Faith: Evolving the Gold Standard in Privacy and Data Protection
1(16)
Ann Cavoukian
Malware, Information Flow and DoS Attacks
iSAM: An iPhone Stealth Airborne Malware
17(12)
Dimitrios Damopoulos
Georgios Kambourakis
Stefanos Gritzalis
TCP Ack Storm DoS Attacks
29(12)
Raz Abramov
Amir Herzberg
Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications
41(15)
Felix C. Freiling
Sebastian Schinzel
Authentication
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition
56(12)
Paul Baecher
Niklas Buscher
Marc Fischlin
Benjamin Milde
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?
68(12)
Alessandro Armando
Roberto Carbone
Luca Compagna
Jorge Cuellar
Giancarlo Pellegrino
Alessandro Sorniotti
Quantifying the Effect of Graphical Password Guidelines for Better Security
80(12)
Mohd Jali
Steven Furnell
Paul Dowland
Network Security and Security Protocols
A Case Study in Practical Security of Cable Networks
92(12)
Amir Alsbih
Felix C. Freiling
Christian Schindelhauer
Ceremony Analysis: Strengths and Weaknesses
104(12)
Kenneth Radke
Colin Boyd
Juan Gonzalez Nieto
Margot Brereton
Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes
116(12)
Reto Koenig
Rolf Haenni
Stephan Fischli
Piracy Protection for Streaming Content in Home Networks
128(14)
Hongxia Jin
Jeffrey Lotspiech
Software Security
JIT Defender: A Defense against JIT Spraying Attacks
142(12)
Ping Chen
Yi Fang
Bing Mao
Li Xie
Retrofitting Security in COTS Software with Binary Rewriting
154(19)
Padraig O'Sullivan
Kapil Anand
Aparna Kotha
Matthew Smithson
Rajeev Barua
Angelos D. Keromytis
Generating Optimised and Formally Checked Packet Parsing Code
173(12)
Sebastien Mondet
Ion Alberdi
Thomas Plagemann
Policy Compliance and Obligations
Organizational Power and Information Security Rule Compliance
185(12)
Ella Kolkowska
Gurpreet Dhillon
Delegation of Obligations and Responsibility
197(13)
Meriam Ben Ghorbel-Talbi
Frederic Cuppens
Nora Cuppens-Boulahia
Daniel Le Metayer
Guillaume Piolle
Distributed Security Policy Conformance
210(13)
Mirko Montanari
Ellick Chan
Kevin Larson
Wucherl Yoo
Roy H. Campbell
Privacy Attacks and Privacy-Enhancing Technologies
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets
223(12)
Hiroaki Kikuchi
Daisuke Kagawa
Anirban Basu
Kazuhiko Ishii
Masayuki Terada
Sadayuki Hongo
Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement
235(12)
Benjamin Kellermann
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users
247(12)
Ge Zhang
Risk Analysis and Security Metrics
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain
259(12)
Stefan Taubenberger
Jan Jurjens
Yijun Yu
Bashar Nuseibeh
On Computing Enterprise IT Risk Metrics
271(10)
Sandeep Bhatt
William Horne
Prasad Rao
A Kolmogorov Complexity Approach for Measuring Attack Path Complexity
281(12)
Nwokedi Idika
Bharat Bhargava
Intrusion Detection
Extending LSCs for Behavioral Signature Modeling
293(12)
Sven Patzina
Lars Patzina
Andy Schurr
Detecting Illegal System Calls Using a Data-Oriented Detection Model
305(12)
Jonathan-Christofer Demay
Frederic Majorczyk
Eric Totel
Frederic Tronel
Appendix
IFIP Technical Committee 11: Security and Privacy Protection in Information Processing Systems
317(10)
Kai Rannenberg
S.H. Basie von Solms
Leon Strous
Author Index 327