SEC 2010: Brisbane, Australia
Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings
Kai Rannenberg, Vijay Varadharajan, Christian Weber
Springer, IFIP Advances in Information and Communication Technology 330, ISBN: 978-3-642-15256-6
Contents
Kristian Beckman Award Awardee Keynote
The 5 Waves of Information Security - From Kristian Beckman to the Present.
S. H. (Basie) von Solms
1-8
Security Management
Mining Business-Relevant RBAC States through Decomposition.
Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde
19-30
Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study.
Rostyslav Barabanov, Stewart Kowalski
31-42
Security Management & Governance
Using Actor Network Theory to Understand Information Security Management.
Karin Hedström, Gurpreet Dhillon, Fredrik Karlsson
43-54
Information Security Governance: When Compliance Becomes More Important than Security.
C. C. Terence Tan, Anthonie B. Ruighaver, Atif Ahmad
55-67
Network Security & Authentication
Understanding Domain Registration Abuses.
Scott E. Coull, Andrew M. White 0002, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter
68-79
Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites.
Markus Huber, Martin Mulazzani, Edgar Weippl
80-89
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems.
Julian Schütte, Nicolai Kuntze, Andreas Fuchs, Atta Badii
90-102
Intrusion Detection, Trust Management, and Models
Fraud Detection in ERP Systems Using Scenario Matching.
Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel
112-123
Use of IP Addresses for High Rate Flooding Attack Detection.
Ejaz Ahmed, George M. Mohay, Alan Tickle, Sajal Bhatia
124-135
Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information.
Sascha Hauke, Martin Pyka, Markus Borschbach, Dominik Heider
136-147
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment.
Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar
148-160
Software Security and Assurance
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism.
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
161-172
On-the-fly Inlining of Dynamic Security Monitors.
Jonas Magazinius, Alejandro Russo, Andrei Sabelfeld
173-186
A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems.
Gideon Myles, Hongxia Jin
187-202
Evaluation of the Offensive Approach in Information Security Education.
Martin Mink, Rainer Greifeneder
203-214
Panel
Research Methodologies in Information Security Research: The Road Ahead.
Johan Van Niekerk, Rossouw von Solms
215-216
Access Control and Privacy
Purpose-Based Access Control Policies and Conflicting Analysis.
Hua Wang, Lili Sun, Vijay Varadharajan
217-228
Delegation in Predicate Encryption Supporting Disjunctive Queries.
Dongdong Sun, Colin Boyd, Juan Manuel González Nieto
229-240
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy.
Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller
241-252
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments.
Omar Hasan, Lionel Brunie, Elisa Bertino
253-264
Privacy
Christian Kahl, Katja Böttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg
277-288
Performance Analysis of Accumulator-Based Revocation Mechanisms.
Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens
289-301
Appendix
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems.
Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous
302-310