Table of Contents
|
Security and Privacy Protection in Information Processing Systems Lech J. Janczewski, Henry B.Wolfe, Sujeet Shenoi (Eds.)
|
Front Matter |
Malware
|
Exploring Timeline-Based Malware Classification Rafiqul Islam, Irfan Altas, Md. Islam |
1-13 |
Screening Smartphone Applications Using Behavioral Signatures Suyeon Lee, Jehyun Lee, Heejo Lee |
14-27 |
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mengmeng Ge |
28-41 |
Authentication and Authorization
|
Evolving a Secure Internet William Caelli, Lam-For Kwok, Dennis Longley |
42-54 |
Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones Yuxin Meng, Wenjuan Li, Lam-For Kwok |
55-68 |
Applying DAC Principles to the RDF Graph Data Model Sabrina Kirrane, Alessandra Mileo, Stefan Decker |
69-82 |
A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error Thang Hoang, Deokjai Choi, Viet Vo, Anh Nguyen, Thuc Nguyen |
83-101 |
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes |
102-110 |
Network Security/ Cryptography
|
Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig |
111-124 |
Key Derivation Function: The SCKDF Scheme Chai Chuah, Edward Dawson, Leonie Simpson |
125-138 |
Sustainable Pseudo-random Number Generator Huafei Zhu, Wee-Siong Ng, See-Kiong Ng |
139-147 |
Software Security
|
Improving Mobile Device Security with Operating System-Level Virtualization Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert |
148-161 |
Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath |
162-175 |
An Empirical Evaluation of the Android Security Framework Alessandro Armando, Alessio Merlo, Luca Verderame |
176-189 |
A Security Engineering Process Approach for the Future Development of Complex Aircraft Cabin Systems Hartmut Hintze, Benjamin Wiegraefe, Ralf God |
190-202 |
Mobile Device Encryption Systems Peter Teufl, Thomas Zefferer, Christof Stromberger |
203-216 |
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation Vrizlynn Thing, Zheng-Leong Chua |
217-230 |
Program Transformation for Non-interference Verification on Programs with Pointers Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel |
231-244 |
Policy Compliance and Obligations
|
A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System Ezzat Alqurashi, Gary Wills, Lester Gilbert |
245-256 |
A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance Teodor Sommestad, Jonas Hallberg |
257-271 |
Privacy Protection
|
Enforcement of Privacy Requirements Padmanabhan Krishnan, Kostyantyn Vorobyov |
272-285 |
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar Weippl |
286-299 |
On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud Bernd Zwattendorfer, Daniel Slamanig |
300-314 |
Risk Analysis and Security Metrics
|
Using the Conflicting Incentives Risk Analysis Method Lisa Rajbhandari, Einar Snekkenes |
315-329 |
Performance Analysis of Scalable Attack Representation Models Jin Hong, Dong Kim |
330-343 |
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy Chris Simmons, Sajjan Shiva, Harkeerat Bedi, Vivek Shandilya |
344-365 |
Social Engineering
|
Phishing for the Truth: A Scenario-Based Experiment of Users’ Behavioural Response to Emails Kathryn Parsons, Agata Mccormac, Malcolm Pattinson, Marcus Butavicius, Cate Jerram |
366-378 |
Phishing and Organisational Learning Wayne Kearney, Hennie Kruger |
379-390 |
A Case for Societal Digital Security Culture Lotfi Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat Bhargava, Mohd Mohamad |
391-404 |
Security Management/Forensic
|
Secure Outsourcing: An Investigation of the Fit between Clients and Providers Gurpreet Dhillon, Romilla Chowdhuri, Filipe Sá-Soares |
405-418 |
Performance Analysis of File Carving Tools Thomas Laurenson |
419-433 |