SEC 2009: Pafos, Cyprus
Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings
Dimitris Gritzalis, Javier Lopez
Springer, IFIP Advances in Information and Communication Technology 297, ISBN: 978-3-642-01243-3
Contents
Identification and Authentication I
Flexible and Transparent User Authentication for Mobile Devices.
Nathan L. Clarke, Sevasti Karatzouni, Steven Furnell
1-12
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable.
Amir Herzberg
13-24
Threats and Attacks
Discovering Application-Level Insider Attacks Using Symbolic Execution.
Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer
63-75
Identification and Authentication II
Custom JPEG Quantization for Improved Iris Recognition Accuracy.
Gerald Stefan Kostmajer, Herbert Stögner, Andreas Uhl
76-86
On the IPP Properties of Reed-Solomon Codes.
Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo
87-97
Applications of Cryptography and Information Hiding
Media-Break Resistant eSignatures in eGovernment: An Austrian Experience.
Herbert Leitold, Reinhard Posch, Thomas Rössler
109-118
How to Bootstrap Security for Ad-Hoc Network: Revisited.
Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
119-131
Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros
132-142
Trusted Computing
On the Impossibility of Detecting Virtual Machine Monitors.
Shay Gueron, Jean-Pierre Seifert
143-151
Implementation of a Trusted Ticket System.
Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt
152-163
Security Policies
Guillermo Navarro-Arribas, Joaquín García-Alfaro
164-175
Validation, Verification, Evaluation
On the Security Validation of Integrated Security Solutions.
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph
190-201
Verification of Security Policy Enforcement in Enterprise Systems.
Puneet Gupta, Scott D. Stoller
202-213
Optimization of the Controlled Evaluation of Closed Relational Queries.
Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag
214-225
Privacy Protection - Security Assessment
Collaborative Privacy - A Community-Based Privacy Infrastructure.
Jan Kolter, Thomas Kernchen, Günther Pernul
226-236
Security and Privacy Improvements for the Belgian eID Technology.
Pieter Verhaeghe, Jorn Lapon, Bart De Decker, Vincent Naessens, Kristof Verslype
237-247
Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum
248-258
Role Mining and Content Protection
Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde
259-269
Privacy-Preserving Content-Based Publish/Subscribe Networks.
Abdullatif Shikfa, Melek Önen, Refik Molva
270-282
Ontology-Based Secure XML Content Distribution.
Mohammad Ashiqur Rahaman, Yves Roudier, Philip Miseldine, Andreas Schaad
294-306
Security Protocols
A Provably Secure Secret Handshake with Dynamic Controlled Matching.
Alessandro Sorniotti, Refik Molva
330-341
Towards a Theory of White-Box Security.
Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo
342-352
Access Control
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.
Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati
364-375
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications.
Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde
376-386
Internet and Web Applications Security
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security.
Yianna Danidou, Burkhard Schafer
399-409
Persona: Network Layer Anonymity and Accountability for Next Generation Internet.
Yannis Mallios, Sudeep Modi, Aditya Agarwala, Christina Johns
410-420
Jason: A Scalable Reputation System for the Semantic Web.
Sandra Steinbrecher, Stephan Groß, Markus Meichau
421-431
Which Web Browsers Process SSL Certificates in a Standardized Way?
Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri
432-442