


default search action
SEC 2010: Brisbane, Australia
- Kai Rannenberg, Vijay Varadharajan, Christian Weber

:
Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings. IFIP Advances in Information and Communication Technology 330, Springer 2010, ISBN 978-3-642-15256-6
Kristian Beckman Award Awardee Keynote
- S. H. (Basie) von Solms:

The 5 Waves of Information Security - From Kristian Beckman to the Present. 1-8
Security Management
- William J. Caelli, Lam-for Kwok

, Dennis Longley:
A Business Continuity Management Simulator. 9-18 - Alessandro Colantonio, Roberto Di Pietro

, Alberto Ocello, Nino Vincenzo Verde:
Mining Business-Relevant RBAC States through Decomposition. 19-30 - Rostyslav Barabanov, Stewart Kowalski:

Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study. 31-42
Security Management & Governance
- Karin Hedström

, Gurpreet Dhillon
, Fredrik Karlsson
:
Using Actor Network Theory to Understand Information Security Management. 43-54 - C. C. Terence Tan, Anthonie B. Ruighaver, Atif Ahmad:

Information Security Governance: When Compliance Becomes More Important than Security. 55-67
Network Security & Authentication
- Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter:

Understanding Domain Registration Abuses. 68-79 - Markus Huber

, Martin Mulazzani, Edgar R. Weippl:
Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites. 80-89 - Julian Schütte

, Nicolai Kuntze, Andreas Fuchs, Atta Badii:
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems. 90-102 - Clemens Orthacker, Martin Centner, Christian Kittl:

Qualified Mobile Server Signature. 103-111
Intrusion Detection, Trust Management, and Models
- Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel:

Fraud Detection in ERP Systems Using Scenario Matching. 112-123 - Ejaz Ahmed, George M. Mohay, Alan Tickle, Sajal Bhatia

:
Use of IP Addresses for High Rate Flooding Attack Detection. 124-135 - Sascha Hauke, Martin Pyka, Markus Borschbach, Dominik Heider

:
Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information. 136-147 - Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar

:
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment. 148-160
Software Security and Assurance
- Raja Naeem Akram

, Konstantinos Markantonakis
, Keith Mayes:
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism. 161-172 - Jonas Magazinius, Alejandro Russo

, Andrei Sabelfeld:
On-the-fly Inlining of Dynamic Security Monitors. 173-186 - Gideon Myles, Hongxia Jin:

A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems. 187-202 - Martin Mink, Rainer Greifeneder

:
Evaluation of the Offensive Approach in Information Security Education. 203-214
Panel
- Johan Van Niekerk, Rossouw von Solms:

Research Methodologies in Information Security Research: The Road Ahead. 215-216
Access Control and Privacy
- Hua Wang

, Lili Sun, Vijay Varadharajan
:
Purpose-Based Access Control Policies and Conflicting Analysis. 217-228 - Dongdong Sun, Colin Boyd, Juan Manuel González Nieto:

Delegation in Predicate Encryption Supporting Disjunctive Queries. 229-240 - Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:

Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy. 241-252 - Omar Hasan, Lionel Brunie, Elisa Bertino:

k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments. 253-264
Privacy
- Mark Stegelmann:

Towards Fair Indictment for Data Collection with Self-Enforcing Privacy. 265-276 - Christian Kahl, Katja Böttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg:

How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project. 277-288 - Jorn Lapon

, Markulf Kohlweiss
, Bart De Decker, Vincent Naessens:
Performance Analysis of Accumulator-Based Revocation Mechanisms. 289-301
Appendix
- Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous:

IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. 302-310

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














