index - ICT Systems Security and Privacy Protection (SEC 2014) Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
ICT Systems Security and Privacy Protection
Nora Cuppens-Boulahia Frédéric Cuppens, Sushil Jajodia Anas Abou El Kalam, Thierry Sans (Eds.)
Front Matter

Intrusion Detection


Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists
Nizar Kheir, Frédéric Tran, Pierre Caron, Nicolas Deschamps
1-14
Game Theory Meets Information Security Management
Andrew Fielder, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi
15-29
Model-Based Detection of CSRF
Marco Rocchetto, Martín Ochoa, Mohammad Torabi Dashti
30-43
Lightweight Resource Management for DDoS Traffic Isolation in a Cloud Environment
Ibnu Mubarok, Kiryong Lee, Sihyung Lee, Heejo Lee
44-51

Data Security


Multi-keyword Similarity Search over Encrypted Cloud Data
Mikhail Strizhov, Indrajit Ray
52-65
Security of the Multiple-Key Blom’s Key Agreement Scheme for Sensor Networks
Mee Yang, Adnan Anbuky, William Liu
66-79
New Algorithmic Approaches to Point Constellation Recognition
Thomas Bourgeat, Julien Bringer, Hervé Chabanne, Robin Champenois, Jérémie Clément, Houda Ferradi, Marc Heinrich, Paul Melotti, David Naccache, Antoine Voizard
80-90
Protection Profile for PUF-Based Devices
Andrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann
91-98

Mobile Security


Text-Based Active Authentication for Mobile Devices
Hataichanok Saevanee, Nathan Clarke, Steven Furnell, Valerio Biscione
99-112
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones
Gökhan Bal, Kai Rannenberg, Jason Hong
113-126
A Trusted UI for the Mobile Web
Bastian Braun, Johannes Koestler, Joachim Posegga, Martin Johns
127-141
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph
Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie
142-155

Privacy I


Privacy Risks from Public Data Sources
Zacharias Tzermias, Vassilis Prevelakis, Sotiris Ioannidis
156-168
Security and Privacy in Video Surveillance: Requirements and Challenges
Qasim Rajpoot, Christian Jensen
169-184
Playing Hide and Seek with Mobile Dating Applications
Guojun Qin, Constantinos Patsakis, Mélanie Bouroche
185-196
Towards a Framework for Benchmarking Privacy-ABC Technologies
Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri
197-204

Metrics and Risk Assessment


Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing
Dominik Herrmann, Max Maaß, Hannes Federrath
205-219
A Novel Metric for the Evaluation of IDSs Effectiveness
Khalid Nasr, Anas Kalam
220-233
How to Assess Confidentiality Requirements of Corporate Assets?
Gabriela Cervantes, Stefan Fenz
234-241
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks
Suhaila Ismail, Elena Sitnikova, Jill Slay
242-249

Information Flow Control


Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS
Thomas Bauereiss, Dieter Hutter
250-263
Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications
Bastian Braun, Caspar Gries, Benedikt Petschkuhn, Joachim Posegga
264-277
An Information Flow Monitor-Inlining Compiler for Securing a Core of JavaScript
José Fragoso Santos, Tamara Rezk
278-292

Identity Management


Authenticated Dictionary Based on Frequency
Kévin Atighehchi, Alexis Bonnecaze, Traian Muntean
293-306
Géant-TrustBroker: Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures
Daniela Pöhn, Stefan Metzger, Wolfgang Hommel
307-320
Efficient Identity-Based Signature from Lattices
Miaomiao Tian, Liusheng Huang
321-329
Context-Aware Multifactor Authentication Based on Dynamic Pin
Yair Diaz-Tellez, Eliane Bodanese, Theo Dimitrakos, Michael Turner
330-338

Identifiability and Decision Making


Authorship Attribution for Forensic Investigation with Thousands of Authors
Min Yang, Kam-Pui Chow
339-350
Detection and Labeling of Personal Identifiable Information in E-mails
Christoph Bier, Jonas Prior
351-358
A Preliminary Study on User’s Decision Making towards Retweet Messages
Nor Abdullah, Dai Nishioka, Yuko Tanaka, Yuko Murayama
359-365

Malicious Behavior and Fraud


Behavior Analysis of Web Service Attacks
Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula
366-379
BankSealer: An Online Banking Fraud Analysis and Decision Support System
Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero
380-394
Security Assessment of Payment Systems under PCI DSS Incompatibilities
Şerif Bahtiyar, Gürkan Gür, Levent Altay
395-402

Organizational Security


PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications
Andreas Put, Italo Dacosta, Milica Milutinovic, Bart Decker
403-416
Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values
Lena Connolly, Michael Lang, Doug Tygar
417-430
Organizational Transformation and Information Security Culture: A Telecom Case Study
Gurpreet Dhillon, Romilla Chowdhuri, Cristiane Pedron
431-437
A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model
Theodoros Spyridopoulos, Ioanna-Aikaterini Topa, Theo Tryfonas, Maria Karyda
438-445

Privacy II


Privacy Design Strategies
Jaap-Henk Hoepman
446-459
Distance Computation between Two Private Preference Functions
Alberto Blanco, Josep Domingo-Ferrer, Oriol Farràs, David Sánchez
460-470
Privacy-Preserving Implicit Authentication
Nashad Safa, Reihaneh Safavi-Naini, Siamak Shahandashti
471-484
Trusted Computing to Increase Security and Privacy in eID Authentication
Jan Vossaert, Jorn Lapon, Bart Decker, Vincent Naessens
485-492

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/