Full Text Documents

Search


Table of Contents
ICT Systems Security and Privacy Protection
Nora Cuppens-Boulahia Frédéric Cuppens, Sushil Jajodia Anas Abou El Kalam, Thierry Sans (Eds.)
Front Matter

Intrusion Detection


Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists
Nizar Kheir, Frédéric Tran, Pierre Caron, Nicolas Deschamps
1-14
Game Theory Meets Information Security Management
Andrew Fielder, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi
15-29
Model-Based Detection of CSRF
Marco Rocchetto, Martín Ochoa, Mohammad Torabi Dashti
30-43
Lightweight Resource Management for DDoS Traffic Isolation in a Cloud Environment
Ibnu Mubarok, Kiryong Lee, Sihyung Lee, Heejo Lee
44-51

Data Security


Multi-keyword Similarity Search over Encrypted Cloud Data
Mikhail Strizhov, Indrajit Ray
52-65
Security of the Multiple-Key Blom’s Key Agreement Scheme for Sensor Networks
Mee Yang, Adnan Anbuky, William Liu
66-79
New Algorithmic Approaches to Point Constellation Recognition
Thomas Bourgeat, Julien Bringer, Hervé Chabanne, Robin Champenois, Jérémie Clément, Houda Ferradi, Marc Heinrich, Paul Melotti, David Naccache, Antoine Voizard
80-90
Protection Profile for PUF-Based Devices
Andrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann
91-98

Mobile Security


Text-Based Active Authentication for Mobile Devices
Hataichanok Saevanee, Nathan Clarke, Steven Furnell, Valerio Biscione
99-112
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones
Gökhan Bal, Kai Rannenberg, Jason Hong
113-126
A Trusted UI for the Mobile Web
Bastian Braun, Johannes Koestler, Joachim Posegga, Martin Johns
127-141
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph
Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie
142-155

Privacy I


Privacy Risks from Public Data Sources
Zacharias Tzermias, Vassilis Prevelakis, Sotiris Ioannidis
156-168
Security and Privacy in Video Surveillance: Requirements and Challenges
Qasim Rajpoot, Christian Jensen
169-184
Playing Hide and Seek with Mobile Dating Applications
Guojun Qin, Constantinos Patsakis, Mélanie Bouroche
185-196
Towards a Framework for Benchmarking Privacy-ABC Technologies
Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri
197-204

Metrics and Risk Assessment


Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing
Dominik Herrmann, Max Maaß, Hannes Federrath
205-219
A Novel Metric for the Evaluation of IDSs Effectiveness
Khalid Nasr, Anas Kalam
220-233
How to Assess Confidentiality Requirements of Corporate Assets?
Gabriela Cervantes, Stefan Fenz
234-241
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks
Suhaila Ismail, Elena Sitnikova, Jill Slay
242-249

Information Flow Control


Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS
Thomas Bauereiss, Dieter Hutter
250-263
Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications
Bastian Braun, Caspar Gries, Benedikt Petschkuhn, Joachim Posegga
264-277
An Information Flow Monitor-Inlining Compiler for Securing a Core of JavaScript
José Fragoso Santos, Tamara Rezk
278-292

Identity Management


Authenticated Dictionary Based on Frequency
Kévin Atighehchi, Alexis Bonnecaze, Traian Muntean
293-306
Géant-TrustBroker: Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures
Daniela Pöhn, Stefan Metzger, Wolfgang Hommel
307-320
Efficient Identity-Based Signature from Lattices
Miaomiao Tian, Liusheng Huang
321-329
Context-Aware Multifactor Authentication Based on Dynamic Pin
Yair Diaz-Tellez, Eliane Bodanese, Theo Dimitrakos, Michael Turner
330-338

Identifiability and Decision Making


Authorship Attribution for Forensic Investigation with Thousands of Authors
Min Yang, Kam-Pui Chow
339-350
Detection and Labeling of Personal Identifiable Information in E-mails
Christoph Bier, Jonas Prior
351-358
A Preliminary Study on User’s Decision Making towards Retweet Messages
Nor Abdullah, Dai Nishioka, Yuko Tanaka, Yuko Murayama
359-365

Malicious Behavior and Fraud


Behavior Analysis of Web Service Attacks
Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula
366-379
BankSealer: An Online Banking Fraud Analysis and Decision Support System
Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero
380-394
Security Assessment of Payment Systems under PCI DSS Incompatibilities
Şerif Bahtiyar, Gürkan Gür, Levent Altay
395-402

Organizational Security


PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications
Andreas Put, Italo Dacosta, Milica Milutinovic, Bart Decker
403-416
Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values
Lena Connolly, Michael Lang, Doug Tygar
417-430
Organizational Transformation and Information Security Culture: A Telecom Case Study
Gurpreet Dhillon, Romilla Chowdhuri, Cristiane Pedron
431-437
A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model
Theodoros Spyridopoulos, Ioanna-Aikaterini Topa, Theo Tryfonas, Maria Karyda
438-445

Privacy II


Privacy Design Strategies
Jaap-Henk Hoepman
446-459
Distance Computation between Two Private Preference Functions
Alberto Blanco, Josep Domingo-Ferrer, Oriol Farràs, David Sánchez
460-470
Privacy-Preserving Implicit Authentication
Nashad Safa, Reihaneh Safavi-Naini, Siamak Shahandashti
471-484
Trusted Computing to Increase Security and Privacy in eID Authentication
Jan Vossaert, Jorn Lapon, Bart Decker, Vincent Naessens
485-492

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/