Full Text Documents

Search


Table of Contents
ICT Systems Security and Privacy Protection
Hannes Federrath, Dieter Gollmann (Eds.)
Front Matter

Privacy


O-PSI: Delegated Private Set Intersection on Outsourced Datasets
Aydin Abadi, Sotirios Terzis, and Changyu Dong
3-17
Flexible and Robust Privacy-Preserving Implicit Authentication
Josep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia
18-34
Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack
Dang Pham, Dogan Kesdogan
35-50
POSN: A Personal Online Social Network
Esra Erdin, Eric Klukovich, Gurhan Gunduz, Mehmet Gunes
51-66
Strategic Noninterference
Wojciech Jamroga, Masoud Tabatabaei
67-81
Verifying Observational Determinism
Jaber Karimpour, Ayaz Isazadeh, Ali Noroozi
82-93

Web Security


Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing
Chetan Bansal, Sören Preibusch, Natasa Milic-Frayling
97-111
Enforcing Usage Constraints on Credentials for Web Applications
Jinwei Hu, Heiko Mantel, Sebastian Ruhleder
112-125
A Survey of Alerting Websites: Risks and Solutions
Aydin Abadi, Sotirios Terzis, Changyu Dong
126-141

Access Control, Trust and Identity Management


A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant
Asahiko Yamada
145-158
Enhancing Passwords Security Using Deceptive Covert Communication
Mohammed Almeshekah, Mikhail Atallah, Eugene Spafford
159-173
Information Sharing and User Privacy in the Third-Party Identity Management Landscape
Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri
174-188
An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems
Mohsen Rezvani, Mohammad Allahbakhsh, Lorenzo Vigentini, Aleksandar Ignjatovic, Sanjay Jha
189-203
A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control
Timothy Carbino, Michael Temple, Juan Lopez Jr.
204-217
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems
Salvador Martínez, Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot
218-233

Network Security


Authenticated File Broadcast Protocol
Simão Reis, André Zúquete, Carlos Faneca, José Vieira
237-251
Automated Classification of C&C Connections Through Malware
URL Clustering
Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro,
and Dingqi Yang
252-266
B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications
Christoph Pohl, Alf Zugenmaier, Michael Meier, Hans-Joachim Hof
267-280

Security Management and Human Aspects of Security


Investigation of Employee Security Behaviour: A Grounded Theory Approach
Lena Connolly, Michael Lang, J. Tygar
283-296
Practice-Based Discourse Analysis of InfoSec Policies
Fredrik Karlsson, Göran Goldkuhl, Karin Hedström
297-310
Understanding Collaborative Challenges in IT Security Preparedness Exercises
Maria Line, Nils Moe
311-324
Social Groupings and Information Security Obedience Within Organizations
Teodor Sommestad
325-338
Attack Trees with Sequential Conjunction
Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Saša
Radomirović,
and Rolando Trujillo-Rasua
339-353
Enhancing the Security of Image CAPTCHAs Through Noise Addition
David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri
354-368

Software Security


SHRIFT System-Wide HybRid Information Flow Tracking
Enrico Lovat, Alexander Fromm, Martin Mohr, Alexander Pretschner
371-385
ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries
Liang Deng, Qingkai Zeng, Yao Liu
386-400
Exploit Generation for Information Flow Leaks in Object-Oriented Programs
Quoc Do, Richard Bubel, Reiner Hähnle
401-415
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference
Jiang Ming, Dongpeng Xu, Dinghao Wu
416-430
Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach
Zhijiao Zhang, Yashuai Lü, Yu Chen, Yongqiang Lü, Yuanchun Shi
431-445
Integrity for Approximate Joins on Untrusted Computational Servers
Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
446-459

Applied Cryptography


Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
Wouter Lueks, Gergely Alpár, Jaap- Hoepman, Pim Vullers
463-478
Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment
Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong, Isao Echizen
479-494
A Secure Exam Protocol Without Trusted Parties
Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Ryan
495-509

Mobile and Cloud Services Security


ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis
Li Li, Alexandre Bartel, Tegawendé Bissyandé, Jacques Klein, Yves Traon
513-527
Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases
Francisco Vigário, Miguel Neto, Diogo Fonseca, Mário Freire, Pedro Inácio
528-541
An Empirical Study on Android for Saving Non-shared Data on Public Storage
Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang
542-556
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation
Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah
557-570
On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps
Konstantin Knorr, David Aspinall, Maria Wolters
571-584
A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration
Alevtina Dubovitskaya, Visara Urovi, Matteo Vasirani, Karl Aberer, Michael Schumacher
585-598

Cyber-physical Systems and Critical Infrastructures Security


Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems
Konstantinos Maraslis, Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mo Haghighi
601-615
Securing BACnet’s Pitfalls
Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier
616-629
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios
Nicolai Kuntze, Andreas Fuchs, and Carsten Rudolph
630-644

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/