Description |
1 online resource (viii, 160 pages) |
Series |
Lecture notes in computer science, 0302-9743 ; 7039 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7039.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Machine generated contents note: I. Assisting Users -- Evoking Comprehensive Mental Models of Anonymous Credentials / Simone Fischer-Hubner -- Towards Usable Interfaces for Proof Based Access Rights on Mobile Devices / Dogan Kesdogan -- Commercial Home Assistance (eHealth) Services / Bart De Decker -- II. Malware Detection -- Detecting Computer Worms in the Cloud / Stefan Katzenbeisser -- Efficient and Stealthy Instruction Tracing and Its Applications in Automated Malware Analysis: Open Problems and Challenges / Engin Kirda -- Challenges for Dynamic Analysis of iOS Applications / Giovanni Vigna -- III. Saving Energy -- Energy-Efficient Cryptographic Engineering Paradigm / Raphael C.-W. Phan -- IV. Policies -- Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies / Asmund Ahlmann Nyre -- Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA / Ulrich Pinsdorf -- Flexible and Dynamic Consent-Capturing / Giovanni Russello -- V. Problems in the Cloud -- Towards User Centric Data Governance and Control in the Cloud / Alexander Schill -- Securing Data Provenance in the Cloud / Bruno Crispo |
Summary |
Annotation This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised full papers were carefully reviewed and selected from 28 initial submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on assisting users, malware detection, saving energy, policies, and problems in the cloud |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data protection |
|
Data encryption (Computer science) |
|
Information Systems |
|
Systems and Data Security |
|
Management of Computing and Information Systems |
|
Computers and Society |
|
Information Systems Applications (incl. Internet) |
Bibliography |
Includes bibliographical references and author index |
Subject |
Computer networks -- Security measures -- Congresses
|
|
Computer networks -- Access control -- Congresses.
|
|
Informatique.
|
|
Computer networks -- Access control
|
|
Computer networks -- Security measures
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Camenisch, Jan.
|
|
Kesdogan, Dogan.
|
ISBN |
9783642275852 |
|
3642275850 |
|
3642275842 |
|
9783642275845 |
|