Full Text Documents

Search


Table of Contents
Security and Privacy – Silver Linings in the Cloud
Kai Rannenberg, Vijay Varadharajan, Christian Weber
Front Matter

Kristian Beckman Award Awardee Keynote


The 5 Waves of Information Security - From Kristian Beckman to the Present
S. H. (basie) Solms
1-8

Security Management


A Business Continuity Management Simulator
W. J. Caelli, L. F. Kwok, D. Longley
9-18
Mining Business-Relevant RBAC States Through Decomposition
Alessandro Colantonio, Roberto Pietro, Alberto Ocello, Nino Vincenzo Verde
19-30
Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study
Rostyslav Barabanov, Stewart Kowalski
31-42

Security Management & Governance


Using Actor Network Theory to Understand Information Security Management
Karin Hedström, Gurpreet Dhillon, Fredrik Karlsson
43-54
Information Security Governance: When Compliance Becomes More Important than Security
Terence C. C. Tan, Anthonie B. Ruighaver, Atif Ahmad
55-67

Network Security & Authentication


Understanding Domain Registration Abuses
Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter
68-79
Who On Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites
Markus Huber, Martin Mulazzani, Edgar Weippl
80-89
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems
Julian Schutte, Nicolai Kuntze, Andreas Fuchs, Atta Badii
90-102
Qualified Mobile Server Signature
Clemens Orthacker, Martin Centner, Christian Kittl
103-111

Intrusion Detection, Trust Management, and Models


Fraud Detection in ERP Systems Using Scenario Matching
Asadul Khandoker Islam, Malcom Corney, George Mohay, Andrew Clark, Shane Bracher, Tobias Raub, Ulrich Flegel
112-123
Use of IP Addresses for High Rate Flooding Attack Detection
Ejaz Ahmed, George Mohay, Alan Tickle, Sajal Bhatia
124-135
Augmenting Reputation-based Trust Metrics with Rumor-like Dissemination of Reputation Information
Sascha Hauke, Martin Pyka, Markus Borschbach, Dominik Heider
136-147
Ex-SDF: an extended service dependency framework for intrusion impact assessment
Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar
148-160

Software Security and Assurance


A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
161-172
On-the-fly Inlining of Dynamic Security Monitors
Jonas Magazinius, Alejandro Russo, Andrei Sabelfeld
173-186
A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems
Gideon Myles, Hongxia Jin
187-202
Evaluation of the Offensive Approach in Information Security Education
Martin Mink, Rainer Greifeneder
203-214

Panel


Research Methodologies in Information Security Research: The Road Ahead
Johan F. Niekerk, Rossouw Solms
215-216

Access Control and Privacy


Purpose-based access control policies and conflicting analysis
Hua Wang, Lili Sun, Vijay Varadharajan
217-228
Delegation in Predicate Encryption Supporting Disjunctive Queries
Dongdong Sun, Colin Boyd, Juan Manuel González Nieto
229-240
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy
Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller
241-252
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments
Omar Hasan, Lionel Brunie, Elisa Bertino
253-264

Privacy


Towards Fair Indictment for Data Collection with Self-Enforcing Privacy
Mark Stegelmann
265-276
How to enhance Privacy and Identity Management for Mobile Communities: Approach and User driven Concepts of the PICOS Project
Christian Kahl, Katja Böttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg
277-288
Performance Analysis of Accumulator-based Revocation Mechanisms
Jorn Lapon, Markulf Kohlweiss, Bart Decker, Vincent Naessens
289-301

Appendix


IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems
Kai Rannenberg, S. H. (basie) Von Solms, Leon Strous
302-310