Full Text Documents

Search


Table of Contents
Open Problems in Network Security
Jan Camenisch, Dogan Kesdogan (Eds.)
Front Matter

Assisting Users


Evoking Comprehensive Mental Models of Anonymous Credentials
Erik Wästlund, Julio Angulo, Simone Fischer-Hübner
1-14
Towards Usable Interfaces for Proof Based Access Rights on Mobile Devices
Marcel Heupel, Dogan Kesdogan
15-27
Commercial Home Assistance (eHealth) Services
Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart Decker
28-42

Malware Detection


Detecting Computer Worms in the Cloud
Sebastian Biedermann, Stefan Katzenbeisser
43-54
Efficient and Stealthy Instruction Tracing and Its Applications in Automated Malware Analysis: Open Problems and Challenges
Endre Bangerter, Stefan Bühlmann, Engin Kirda
55-64
Challenges for Dynamic Analysis of iOS Applications
Martin Szydlowski, Manuel Egele, Christopher Kruegel, Giovanni Vigna
65-77

Saving Energy


Energy-Efficient Cryptographic Engineering Paradigm
Marine Minier, Raphael Phan
78-88

Policies


Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies
Inger Tøndel, Åsmund Nyre
89-103
Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA
Laurent Bussard, Ulrich Pinsdorf
104-118
Flexible and Dynamic Consent-Capturing
Muhammad Asghar, Giovanni Russello
119-131

Problems in the Cloud


Towards User Centric Data Governance and Control in the Cloud
Stephan Groß, Alexander Schill
132-144
Securing Data Provenance in the Cloud
Muhammad Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
145-160

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/