My Library

University LibraryCatalogue

     
Limit search to items available for borrowing or consultation
Result Page: Previous Next
Can't find that book? Try BONUS+
 
Look for full text

Search Discovery

Search CARM Centre Catalogue

Search Trove

Add record to RefWorks

Cover Art
E-RESOURCE
Author IFIP TC11 International Conference on Information Security (27th : 2012 : Ērakleion, Greece)

Title Information security and privacy research [electronic resource] : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.).

Published Berlin ; New York : Springer, c2012.

Copies

Location Call No. Status
 UniM INTERNET resource    AVAILABLE
Physical description 1 online resource.
Series IFIP advances in information and communication technology, 1868-4238 ; 376
IFIP advances in information and communication technology ; 376.
Contents Relay Attacks on Secure Element-Enabled Mobile Devices / Virtual Pickpocketing Revisited / Michael Roland, Josef Langer and Josef Scharinger -- Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) / Alessandro Armando, Alessio Merlo, Mauro Migliardi and Luca Verderame -- An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling / Bernhard J. Berger and Karsten Sohr -- Embedded Eavesdropping on Java Card / Guillaume Barbu, Christophe Giraud and Vincent Guerin -- Authenticated Key Exchange (AKE) in Delay Tolerant Networks / Sofia Anna Menesidou and Vasilios Katos -- OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management / Alexandre B. Augusto and Manuel Eduardo Correia -- Smart OpenID: A Smart Card Based OpenID Protocol / Andreas Leicher, Andreas U. Schmidt and Yogendra Shah -- Peer to Peer Botnet Detection Based on Flow Intervals / David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed and Sherif Saad, et al. -- Towards a Universal Data Provenance Framework Using Dynamic Instrumentation / Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis and Sotiris Ioannidis -- Improving Flask Implementation Using Hardware Assisted In-VM Isolation / Baozeng Ding, Fufeng Yao, Yanjun Wu and Yeping He.
HyperForce: Hypervisor-enForced Execution of Security-Critical Code / Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg and Wouter Joosen -- RandHyp: Preventing Attacks via Xen Hypercall Interface / Feifei Wang, Ping Chen, Bing Mao and Li Xie -- Role Mining under Role-Usage Cardinality Constraint / John C. John, Shamik Sural, Vijayalakshmi Atluri and Jaideep S. Vaidya -- HIDE_DHCP: Covert Communications through Network Configuration Messages / Ruben Rios, Jose A. Onieva and Javier Lopez -- Handling Stateful Firewall Anomalies / Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Tarik Moataz and Xavier Rimasson -- A Framework for Threat Assessment in Access Control Systems / Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi and Luigi Logrippo -- Support for Write Privileges on Outsourced Data / Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati -- Malicious Users' Transactions: Tackling Insider Threat / Weihan Li, Brajendra Panda and Qussai Yaseen -- Privacy-Preserving Television Audience Measurement Using Smart TVs / George Drosatos, Aimilia Tasidou and Pavlos S. Efraimidis -- Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility / Christian Banse, Dominik Herrmann and Hannes Federrath.
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition / Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou and Dimitris Gritzalis -- Modeling Social Engineering Botnet Dynamics across Multiple Social Networks / Shuhao Li, Xiaochun Yun, Zhiyu Hao, Yongzheng Zhang and Xiang Cui, et al. -- Layered Analysis of Security Ceremonies / Giampaolo Bella and Lizzie Coles-Kemp -- A Small Depth-16 Circuit for the AES S-Box / Joan Boyar and René Peralta -- Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol / Maria Christofi and Aline Gouget -- My Authentication Album: Adaptive Images-Based Login Mechanism / Amir Herzberg and Ronen Margulies -- Balancing Security and Usability of Local Security Mechanisms for Mobile Devices / Shuzhe Yang and Gökhan Bal -- Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation / Ella Kolkowska and Bart De Decker -- When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems / Gurpreet Dhillon, Tiago Oliveira, Santa Susarapu and Mário Caldeira -- Security-by-Contract for the OSGi Platform / Olga Gadyatskaya, Fabio Massacci and Anton Philippov -- Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis / Hyundo Park, Sung-Oh David Jung, Heejo Lee and Hoh Peter In.
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds / Yulong Zhang, Min Li, Kun Bai, Meng Yu and Wanyu Zang -- Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework / Han Jiao, Jixue Liu, Jiuyong Li and Chengfei Liu -- A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation / Giuseppe D'Acquisto, Marta Flamini and Maurizio Naldi -- Optimizing Network Patching Policy Decisions / Yolanta Beres and Jonathan Griffin -- A Risk Assessment Method for Smartphones / Marianthi Theoharidou, Alexios Mylonas and Dimitris Gritzalis -- Empirical Benefits of Training to Phishing Susceptibility / Ronald Dodge, Kathryn Coronges and Ericka Rovira -- Multi-modal Behavioural Biometric Authentication for Mobile Devices / Hataichanok Saevanee, Nathan L. Clarke and Steven M. Furnell -- Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks / Christoforos Ntantogian, Christos Xenakis and Ioannis Stavrakakis -- Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks / Yongge Wang -- Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains / Shaoying Cai, Yingjiu Li and Yunlei Zhao -- Enhanced Dictionary Based Rainbow Table / Vrizlynn L. L. Thing and Hwei-Ming Ying.
Authorization Policies for Materialized Views / Sarah Nait-Bahloul, Emmanuel Coquery and Mohand-Saïd Hacid -- Enhancing the Security of On-line Transactions with CAPTCHA Keyboard / Yongdong Wu and Zhigang Zhao -- Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach / Xin Kang and Yongdong Wu -- A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network / Ioannis Psaroudakis, Vasilios Katos and Pavlos S. Efraimidis -- A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages / Marco Prandini and Marco Ramilli -- Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System / Milica Milutinovic, Vincent Naessens and Bart De Decker -- Web Services Security Assessment: An Authentication-Focused Approach / Yannis Soupionis and Miltiadis Kandias -- Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case / Nineta Polemi and Theodoros Ntouskas -- A Response Strategy Model for Intrusion Response Systems / Nor Badrul Anuar, Maria Papadaki, Steven Furnell and Nathan Clarke -- Intrusion Tolerance of Stealth DoS Attacks to Web Services / Massimo Ficco and Massimiliano Rak -- Towards Use-Based Usage Control / Christos Grompanopoulos and Ioannis Mavridis.
Notes International conference proceedings.
Bibliography Includes bibliographical references and author index.
Other author Gritzalis, Dimitris.
Furnell, Steven, 1970-
Theoharidou, Marianthi.
Subject Computer security -- Congresses.
Data protection -- Congresses.
Computer networks -- Security measures -- Congresses.
Internet -- Security measures -- Congresses.
Computer networks -- Access control -- Congresses.
Computer science.
Computer Communication Networks.
Data encryption (Computer science).
Computer software.
Information Systems.
Management of Computing and Information Systems.
Data Encryption.
Computers and Society.
Algorithm Analysis and Problem Complexity.
Information Systems Applications (incl. Internet).
Electronic books.
Variant Title SEC 2012
ISBN 9783642304361 (electronic bk.)
3642304362 (electronic bk.)
9783642304354