Limit search to available items
Book Cover
Author IFIP TC11 International Conference on Information Security (26th : 2011 : Lucerne, Switzerland)

Title Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Camenisch [and others] (eds.)
Published Heidelberg [u.a.] : Springer, 2011
Heidelberg : Springer, [2011]


Location Call no. Vol. Availability
 MELB  005.8 Cam/Fci  AVAILABLE
Description xiii, 328 pages : illustrations ; 24 cm
Series IFIP advances in information and communication technology, 1868-4238 ; 354
IFIP advances in information and communication technology ; 354
Contents Contents note continued: Piracy Protection for Streaming Content in Home Networks / Jeffrey Lotspiech -- Software Security -- JIT Defender: A Defense against JIT Spraying Attacks / Li Xie -- Retrofitting Security in COTS Software with Binary Rewriting / Angelos D. Keromytis -- Generating Optimised and Formally Checked Packet Parsing Code / Thomas Plagemann -- Policy Compliance and Obligations -- Organizational Power and Information Security Rule Compliance / Gurpreet Dhillon -- Delegation of Obligations and Responsibility / Guillaume Piolle -- Distributed Security Policy Conformance / Roy H. Campbell -- Privacy Attacks and Privacy-Enhancing Technologies -- Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets / Sadayuki Hongo -- Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement / Benjamin Kellermann -- Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users / Ge Zhang -- Risk Analysis and Security Metrics --
Contents note continued: Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain / Bashar Nuseibeh -- On Computing Enterprise IT Risk Metrics / Prasad Rao -- A Kolmogorov Complexity Approach for Measuring Attack Path Complexity / Bharat Bhargava -- Intrusion Detection -- Extending LSCs for Behavioral Signature Modeling / Andy Schurr -- Detecting Illegal System Calls Using a Data-Oriented Detection Model / Frederic Tronel -- Appendix -- IFIP Technical Committee 11: Security and Privacy Protection in Information Processing Systems / Leon Strous
Machine generated contents note: Patience, Persistence, and Faith: Evolving the Gold Standard in Privacy and Data Protection / Ann Cavoukian -- Malware, Information Flow and DoS Attacks -- iSAM: An iPhone Stealth Airborne Malware / Stefanos Gritzalis -- TCP Ack Storm DoS Attacks / Amir Herzberg -- Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications / Sebastian Schinzel -- Authentication -- Breaking reCAPTCHA: A Holistic Approach via Shape Recognition / Benjamin Milde -- From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? / Alessandro Sorniotti -- Quantifying the Effect of Graphical Password Guidelines for Better Security / Paul Dowland -- Network Security and Security Protocols -- A Case Study in Practical Security of Cable Networks / Christian Schindelhauer -- Ceremony Analysis: Strengths and Weaknesses / Margot Brereton -- Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes / Stephan Fischli --
Bibliography Includes bibliographical references and index
Subject Computer networks -- Security measures -- Congresses.
Computer security -- Congresses.
Data protection -- Congresses.
Genre/Form Conference papers and proceedings.
Author Camenisch, Jan.
International Federation for Information Processing.
LC no. 2011927858
ISBN 9783642214233