Atjaunināt sīkdatņu piekrišanu

Security and Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings [Hardback]

Edited by , Edited by , Edited by
  • Formāts: Hardback, 312 pages, height x width: 235x155 mm, weight: 664 g, XVII, 312 p., 1 Hardback
  • Sērija : IFIP Advances in Information and Communication Technology 330
  • Izdošanas datums: 02-Sep-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642152562
  • ISBN-13: 9783642152566
  • Hardback
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 312 pages, height x width: 235x155 mm, weight: 664 g, XVII, 312 p., 1 Hardback
  • Sērija : IFIP Advances in Information and Communication Technology 330
  • Izdošanas datums: 02-Sep-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642152562
  • ISBN-13: 9783642152566
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 2023. The call for papers went out with the challenging motto of Security & Privacy  Silver Linings in the Cloud building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.
Kristian Beckman Award Awardee Keynote
The 5 Waves of Information Security - From Kristian Beckman to the Present
1(8)
S. H. (Basie) von Solms
Security Management
A Business Continuity Management Simulator
9(10)
William J. Caelli
Lam-For Kwok
Dennis Longley
Mining Business-Relevant RBAC States through Decomposition
19(12)
Alessandro Colantonio
Roberto Di Pietro
Alberto Ocello
Nino Vincenzo Verde
Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study
31(12)
Rostyslav Barabanov
Stewart Kowalski
Security Management & Governance
Using Actor Network Theory to Understand Information Security Management
43(12)
Karin Hedstrom
Gurpreet Dhillon
Fredrik Karlsson
Information Security Governance: When Compliance Becomes More Important than Security
55(13)
Terence C. C. Tan
Anthonie B. Ruighaver
Atif Ahmad
Network Security & Authentication
Understanding Domain Registration Abuses
68(12)
Scott E. Coull
Andrew M. White
Ting-Fang Yen
Fabian Monrose
Michael K. Reiter
Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites
80(10)
Markus Huber
Martin Mulazzani
Edgar Weippl
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems
90(13)
Julian Schutte
Nicolai Kuntze
Andreas Fuchs
Atta Badii
Qualified Mobile Server Signature
103(9)
Clemens Orthacker
Martin Centner
Christian Kittl
Intrusion Detection, Trust Management, and Models
Fraud Detection in ERP Systems Using Scenario Matching
112(12)
Asadul Khandoker Islam
Malcom Corney
George Mohay
Andrew Clark
Shane Bracher
Tobias Raub
Ulrich Flegel
Use of IP Addresses for High Rate Flooding Attack Detection
124(12)
Ejaz Ahmed
George Mohay
Alan Tickle
Sajal Bhatia
Angmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information
136(12)
Sascha Hanke
Martin Pyka
Markus Borschbach
Dominik Heider
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment
148(13)
Nizar Kheir
Nora Cuppens-Boulahia
Frederic Cuppens
Herve Debar
Software Security and Assurance
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism
161(12)
Raja Naeem Akram
Konstantinos Markantonakis
Keith Mayes
On-the-fly Inlining of Dynamic Security Monitors
173(14)
Jonas Magazinius
Alejandro Russo
Andrei Sabelfeld
A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems
187(16)
Gideon Myles
Hongxia Jin
Evaluation of the Offensive Approach in Information Security Education
203(12)
Martin Mink
Rainer Greifeneder
Panel
Research Methodologies in Information Security Research: The Road Ahead
215(2)
Johan F. van Niekerk
Rossouw von Solms
Access Control and Privacy
Purpose-Based Access Control Policies and Conflicting Analysis
217(12)
Hua Wang
Lili Sun
Vijay Varadharajan
Delegation in Predicate Encryption Supporting Disjunctive Queries
229(12)
Dongdong Sun
Colin Boyd
Juan Manuel
Gonzalez Nieto
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy
241(12)
Sven Wohlgemuth
Isao Echizen
Noboru Sonehara
Gunter Muller
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments
253(12)
Omar Hasan
Lionel Brunie
Elisa Bertino
Privacy
Towards Fair Indictment for Data Collection with Self-Enforcing Privacy
265(12)
Mark Stegelmann
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project
277(12)
Christian Kahl
Katja Bottcher
Markus Tschersich
Stephan Heim
Kai Rannenberg
Performance Analysis of Accumulator-Based Revocation Mechanisms
289(13)
Jorn Lapon
Markulf Kohlweiss
Bart De Decker
Vincent Naessens
Appendix IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems 302(9)
Kai Rannenberg
S. H. (Basie) von Solms
Leon Strous
Author Index 311