Atjaunināt sīkdatņu piekrišanu

Open Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 164 pages, height x width: 235x155 mm, weight: 270 g, VIII, 164 p., 1 Paperback / softback
  • Sērija : Security and Cryptology 7039
  • Izdošanas datums: 12-Jan-2012
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642275842
  • ISBN-13: 9783642275845
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 164 pages, height x width: 235x155 mm, weight: 270 g, VIII, 164 p., 1 Paperback / softback
  • Sērija : Security and Cryptology 7039
  • Izdošanas datums: 12-Jan-2012
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642275842
  • ISBN-13: 9783642275845
This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised full papers were carefully reviewed and selected from 28 initial submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on assisting users, malware detection, saving energy, policies, and problems in the cloud.
I Assisting Users
Evoking Comprehensive Mental Models of Anonymous Credentials
1(14)
Erik Wastlund
Julio Angulo
Simone Fischer-Hubner
Towards Usable Interfaces for Proof Based Access Rights on Mobile Devices
15(13)
Marcel Heupel
Dogan Kesdogan
Commercial Home Assistance (eHealth) Services
28(15)
Milica Milutinovic
Koen Decroix
Vincent Naessens
Bart De Decker
II Malware Detection
Detecting Computer Worms in the Cloud
43(12)
Sebastian Biedermann
Stefan Katzenbeisser
Efficient and Stealthy Instruction Tracing and Its Applications in Automated Malware Analysis: Open Problems and Challenges
55(10)
Endre Bangerter
Stefan Buhlmann
Engin Kirda
Challenges for Dynamic Analysis of iOS Applications
65(13)
Martin Szydlowski
Manuel Egele
Christopher Kruegel
Giovanni Vigna
III Saving Energy
Energy-Efficient Cryptographic Engineering Paradigm
78(11)
Marine Minier
Raphael C.-W. Phan
IV Policies
Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies
89(15)
Inger Anne Tøndel
Asmund Ahlmann Nyre
Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA
104(15)
Laurent Bussard
Ulrich Pinsdorf
Flexible and Dynamic Consent-Capturing
119(13)
Muhammad Rizwan Asghar
Giovanni Russello
V Problems in the Cloud
Towards User Centric Data Governance and Control in the Cloud
132(13)
Stephan Groß
Alexander Schill
Securing Data Provenance in the Cloud
145(16)
Muhammad Rizwan Asghar
Mihaela Ion
Giovanni Russello
Bruno Crispo
Author Index 161