|
Kristian Beckman Award Awardee Keynote |
|
|
|
The 5 Waves of Information Security - From Kristian Beckman to the Present |
|
|
1 | (8) |
|
|
|
|
A Business Continuity Management Simulator |
|
|
9 | (10) |
|
|
|
|
Mining Business-Relevant RBAC States through Decomposition |
|
|
19 | (12) |
|
|
|
|
|
Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study |
|
|
31 | (12) |
|
|
|
Security Management & Governance |
|
|
|
Using Actor Network Theory to Understand Information Security Management |
|
|
43 | (12) |
|
|
|
|
Information Security Governance: When Compliance Becomes More Important than Security |
|
|
55 | (13) |
|
|
|
|
Network Security & Authentication |
|
|
|
Understanding Domain Registration Abuses |
|
|
68 | (12) |
|
|
|
|
|
|
Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites |
|
|
80 | (10) |
|
|
|
|
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems |
|
|
90 | (13) |
|
|
|
|
|
Qualified Mobile Server Signature |
|
|
103 | (9) |
|
|
|
|
Intrusion Detection, Trust Management, and Models |
|
|
|
Fraud Detection in ERP Systems Using Scenario Matching |
|
|
112 | (12) |
|
|
|
|
|
|
|
|
Use of IP Addresses for High Rate Flooding Attack Detection |
|
|
124 | (12) |
|
|
|
|
|
Angmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information |
|
|
136 | (12) |
|
|
|
|
|
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment |
|
|
148 | (13) |
|
|
|
|
|
Software Security and Assurance |
|
|
|
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism |
|
|
161 | (12) |
|
|
Konstantinos Markantonakis |
|
|
|
On-the-fly Inlining of Dynamic Security Monitors |
|
|
173 | (14) |
|
|
|
|
A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems |
|
|
187 | (16) |
|
|
|
Evaluation of the Offensive Approach in Information Security Education |
|
|
203 | (12) |
|
|
|
|
|
Research Methodologies in Information Security Research: The Road Ahead |
|
|
215 | (2) |
|
|
|
Access Control and Privacy |
|
|
|
Purpose-Based Access Control Policies and Conflicting Analysis |
|
|
217 | (12) |
|
|
|
|
Delegation in Predicate Encryption Supporting Disjunctive Queries |
|
|
229 | (12) |
|
|
|
|
|
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy |
|
|
241 | (12) |
|
|
|
|
|
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments |
|
|
253 | (12) |
|
|
|
|
|
|
Towards Fair Indictment for Data Collection with Self-Enforcing Privacy |
|
|
265 | (12) |
|
|
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project |
|
|
277 | (12) |
|
|
|
|
|
|
Performance Analysis of Accumulator-Based Revocation Mechanisms |
|
|
289 | (13) |
|
|
|
|
Appendix IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems |
|
302 | (9) |
|
|
|
Author Index |
|
311 | |