Atjaunināt sīkdatņu piekrišanu

E-grāmata: Security and Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings

Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 2023. The call for papers went out with the challenging motto of Security & Privacy  Silver Linings in the Cloud building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.
Kristian Beckman Award Awardee Keynote
The 5 Waves of Information Security - From Kristian Beckman to the Present
1(8)
S. H. (Basie) von Solms
Security Management
A Business Continuity Management Simulator
9(10)
William J. Caelli
Lam-For Kwok
Dennis Longley
Mining Business-Relevant RBAC States through Decomposition
19(12)
Alessandro Colantonio
Roberto Di Pietro
Alberto Ocello
Nino Vincenzo Verde
Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study
31(12)
Rostyslav Barabanov
Stewart Kowalski
Security Management & Governance
Using Actor Network Theory to Understand Information Security Management
43(12)
Karin Hedstrom
Gurpreet Dhillon
Fredrik Karlsson
Information Security Governance: When Compliance Becomes More Important than Security
55(13)
Terence C. C. Tan
Anthonie B. Ruighaver
Atif Ahmad
Network Security & Authentication
Understanding Domain Registration Abuses
68(12)
Scott E. Coull
Andrew M. White
Ting-Fang Yen
Fabian Monrose
Michael K. Reiter
Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites
80(10)
Markus Huber
Martin Mulazzani
Edgar Weippl
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems
90(13)
Julian Schutte
Nicolai Kuntze
Andreas Fuchs
Atta Badii
Qualified Mobile Server Signature
103(9)
Clemens Orthacker
Martin Centner
Christian Kittl
Intrusion Detection, Trust Management, and Models
Fraud Detection in ERP Systems Using Scenario Matching
112(12)
Asadul Khandoker Islam
Malcom Corney
George Mohay
Andrew Clark
Shane Bracher
Tobias Raub
Ulrich Flegel
Use of IP Addresses for High Rate Flooding Attack Detection
124(12)
Ejaz Ahmed
George Mohay
Alan Tickle
Sajal Bhatia
Angmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information
136(12)
Sascha Hanke
Martin Pyka
Markus Borschbach
Dominik Heider
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment
148(13)
Nizar Kheir
Nora Cuppens-Boulahia
Frederic Cuppens
Herve Debar
Software Security and Assurance
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism
161(12)
Raja Naeem Akram
Konstantinos Markantonakis
Keith Mayes
On-the-fly Inlining of Dynamic Security Monitors
173(14)
Jonas Magazinius
Alejandro Russo
Andrei Sabelfeld
A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems
187(16)
Gideon Myles
Hongxia Jin
Evaluation of the Offensive Approach in Information Security Education
203(12)
Martin Mink
Rainer Greifeneder
Panel
Research Methodologies in Information Security Research: The Road Ahead
215(2)
Johan F. van Niekerk
Rossouw von Solms
Access Control and Privacy
Purpose-Based Access Control Policies and Conflicting Analysis
217(12)
Hua Wang
Lili Sun
Vijay Varadharajan
Delegation in Predicate Encryption Supporting Disjunctive Queries
229(12)
Dongdong Sun
Colin Boyd
Juan Manuel
Gonzalez Nieto
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy
241(12)
Sven Wohlgemuth
Isao Echizen
Noboru Sonehara
Gunter Muller
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments
253(12)
Omar Hasan
Lionel Brunie
Elisa Bertino
Privacy
Towards Fair Indictment for Data Collection with Self-Enforcing Privacy
265(12)
Mark Stegelmann
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project
277(12)
Christian Kahl
Katja Bottcher
Markus Tschersich
Stephan Heim
Kai Rannenberg
Performance Analysis of Accumulator-Based Revocation Mechanisms
289(13)
Jorn Lapon
Markulf Kohlweiss
Bart De Decker
Vincent Naessens
Appendix IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems 302(9)
Kai Rannenberg
S. H. (Basie) von Solms
Leon Strous
Author Index 311