Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
ICT Systems Security and Privacy Protection
Hannes Federrath, Dieter Gollmann (Eds.)
Front Matter

Privacy


O-PSI: Delegated Private Set Intersection on Outsourced Datasets
Aydin Abadi, Sotirios Terzis, and Changyu Dong
3-17
Flexible and Robust Privacy-Preserving Implicit Authentication
Josep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia
18-34
Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack
Dang Pham, Dogan Kesdogan
35-50
POSN: A Personal Online Social Network
Esra Erdin, Eric Klukovich, Gurhan Gunduz, Mehmet Gunes
51-66
Strategic Noninterference
Wojciech Jamroga, Masoud Tabatabaei
67-81
Verifying Observational Determinism
Jaber Karimpour, Ayaz Isazadeh, Ali Noroozi
82-93

Web Security


Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing
Chetan Bansal, Sören Preibusch, Natasa Milic-Frayling
97-111
Enforcing Usage Constraints on Credentials for Web Applications
Jinwei Hu, Heiko Mantel, Sebastian Ruhleder
112-125
A Survey of Alerting Websites: Risks and Solutions
Aydin Abadi, Sotirios Terzis, Changyu Dong
126-141

Access Control, Trust and Identity Management


A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant
Asahiko Yamada
145-158
Enhancing Passwords Security Using Deceptive Covert Communication
Mohammed Almeshekah, Mikhail Atallah, Eugene Spafford
159-173
Information Sharing and User Privacy in the Third-Party Identity Management Landscape
Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri
174-188
An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems
Mohsen Rezvani, Mohammad Allahbakhsh, Lorenzo Vigentini, Aleksandar Ignjatovic, Sanjay Jha
189-203
A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control
Timothy Carbino, Michael Temple, Juan Lopez Jr.
204-217
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems
Salvador Martínez, Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot
218-233

Network Security


Authenticated File Broadcast Protocol
Simão Reis, André Zúquete, Carlos Faneca, José Vieira
237-251
Automated Classification of C&C Connections Through Malware
URL Clustering
Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro,
and Dingqi Yang
252-266
B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications
Christoph Pohl, Alf Zugenmaier, Michael Meier, Hans-Joachim Hof
267-280

Security Management and Human Aspects of Security


Investigation of Employee Security Behaviour: A Grounded Theory Approach
Lena Connolly, Michael Lang, J. Tygar
283-296
Practice-Based Discourse Analysis of InfoSec Policies
Fredrik Karlsson, Göran Goldkuhl, Karin Hedström
297-310
Understanding Collaborative Challenges in IT Security Preparedness Exercises
Maria Line, Nils Moe
311-324
Social Groupings and Information Security Obedience Within Organizations
Teodor Sommestad
325-338
Attack Trees with Sequential Conjunction
Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Saša
Radomirović,
and Rolando Trujillo-Rasua
339-353
Enhancing the Security of Image CAPTCHAs Through Noise Addition
David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri
354-368

Software Security


SHRIFT System-Wide HybRid Information Flow Tracking
Enrico Lovat, Alexander Fromm, Martin Mohr, Alexander Pretschner
371-385
ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries
Liang Deng, Qingkai Zeng, Yao Liu
386-400
Exploit Generation for Information Flow Leaks in Object-Oriented Programs
Quoc Do, Richard Bubel, Reiner Hähnle
401-415
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference
Jiang Ming, Dongpeng Xu, Dinghao Wu
416-430
Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach
Zhijiao Zhang, Yashuai Lü, Yu Chen, Yongqiang Lü, Yuanchun Shi
431-445
Integrity for Approximate Joins on Untrusted Computational Servers
Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
446-459

Applied Cryptography


Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
Wouter Lueks, Gergely Alpár, Jaap- Hoepman, Pim Vullers
463-478
Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment
Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong, Isao Echizen
479-494
A Secure Exam Protocol Without Trusted Parties
Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Ryan
495-509

Mobile and Cloud Services Security


ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis
Li Li, Alexandre Bartel, Tegawendé Bissyandé, Jacques Klein, Yves Traon
513-527
Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases
Francisco Vigário, Miguel Neto, Diogo Fonseca, Mário Freire, Pedro Inácio
528-541
An Empirical Study on Android for Saving Non-shared Data on Public Storage
Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang
542-556
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation
Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah
557-570
On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps
Konstantin Knorr, David Aspinall, Maria Wolters
571-584
A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration
Alevtina Dubovitskaya, Visara Urovi, Matteo Vasirani, Karl Aberer, Michael Schumacher
585-598

Cyber-physical Systems and Critical Infrastructures Security


Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems
Konstantinos Maraslis, Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mo Haghighi
601-615
Securing BACnet’s Pitfalls
Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier
616-629
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios
Nicolai Kuntze, Andreas Fuchs, and Carsten Rudolph
630-644

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/