Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers /
Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers /
NordSec 2010
Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg (eds.).
- Heidelberg : Springer, ©2012.
- 1 online resource (x, 288 pages) : illustrations
- Lecture notes in computer science, 7127 0302-9743 ; LNCS sublibrary. SL 4, Security and cryptology .
- Lecture notes in computer science ; 7127. LNCS sublibrary. SL 4, Security and cryptology. .
Includes bibliographical references and index.
BloomCasting: Security in Bloom Filter Based Multicast / Authentication Session Migration / Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles / Experimental Analysis of the Femtocell Location Verification Techniques / Why Wasn't I Notified?: Information Security Incident Reporting Demystified / Use of Ratings from Personalized Communities for Trustworthy Application Installation / Practical Private Information Aggregation in Large Networks / Tracking Malicious Hosts on a 10Gbps Backbone Link / Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices / Mikko Särelä, Christian Esteve Rothenberg, András Zahemszky, Pekka Nikander and Jörg Ott -- Sanna Suoranta, Jani Heikkinen and Pekka Silvekoski -- Miika Komu, Sasu Tarkoma and Andrey Lukyanenko -- Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert -- Erka Koivunen -- Pern Hui Chia, Andreas P. Heiner and N. Asokan -- Gunnar Kreitz, Mads Dam and Douglas Wikström -- Magnus Almgren and Wolfgang John -- Elahe Kani-Zabihi and Lizzie Coles-Kemp. Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions / A Framework for the Modular Specification and Orchestration of Authorization Policies / Credential Disabling from Trusted Execution Environments / Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications / Implementing Erasure Policies Using Taint Analysis / A Taint Mode for Python via a Library / Security of Web Mashups: A Survey / Safe Wrappers and Sane Policies for Self Protecting JavaScript / Protocol Implementation Generator / Secure and Fast Implementations of Two Involution Ciphers / The PASSERINE Public Key Encryption and Authentication Mechanism / Dominik Herrmann, Christoph Gerber, Christian Banse and Hannes Federrath -- Jason Crampton and Michael Huth -- Kari Kostiainen, N. Asokan and Jan-Erik Ekberg -- Olga Gadyatskaya, Fabio Massacci, Federica Paci and Sergey Stankevich -- Filippo Del Tedesco, Alejandro Russo and David Sands -- Juan José Conti and Alejandro Russo -- Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens and Wouter Joosen -- Jonas Magazinius, Phu H. Phung and David Sands -- Jose Quaresma and Christian W. Probst -- Billy Bob Brumley -- Markku-Juhani O. Saarinen.
Annotation This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.
9783642279379 3642279376
10.1007/978-3-642-27937-9 doi
Data protection--Congresses.
Computer security--Congresses.
Computer networks--Security measures--Congresses.
Protection de l'information (Informatique)--Congrès.
Sécurité informatique--Congrès.
Réseaux d'ordinateurs--Sécurité--Mesures--Congrès.
Informatique.
Computer networks--Security measures
Computer security
Data protection
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
QA76.9.A25 / N67 2009
005.8
Includes bibliographical references and index.
BloomCasting: Security in Bloom Filter Based Multicast / Authentication Session Migration / Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles / Experimental Analysis of the Femtocell Location Verification Techniques / Why Wasn't I Notified?: Information Security Incident Reporting Demystified / Use of Ratings from Personalized Communities for Trustworthy Application Installation / Practical Private Information Aggregation in Large Networks / Tracking Malicious Hosts on a 10Gbps Backbone Link / Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices / Mikko Särelä, Christian Esteve Rothenberg, András Zahemszky, Pekka Nikander and Jörg Ott -- Sanna Suoranta, Jani Heikkinen and Pekka Silvekoski -- Miika Komu, Sasu Tarkoma and Andrey Lukyanenko -- Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert -- Erka Koivunen -- Pern Hui Chia, Andreas P. Heiner and N. Asokan -- Gunnar Kreitz, Mads Dam and Douglas Wikström -- Magnus Almgren and Wolfgang John -- Elahe Kani-Zabihi and Lizzie Coles-Kemp. Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions / A Framework for the Modular Specification and Orchestration of Authorization Policies / Credential Disabling from Trusted Execution Environments / Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications / Implementing Erasure Policies Using Taint Analysis / A Taint Mode for Python via a Library / Security of Web Mashups: A Survey / Safe Wrappers and Sane Policies for Self Protecting JavaScript / Protocol Implementation Generator / Secure and Fast Implementations of Two Involution Ciphers / The PASSERINE Public Key Encryption and Authentication Mechanism / Dominik Herrmann, Christoph Gerber, Christian Banse and Hannes Federrath -- Jason Crampton and Michael Huth -- Kari Kostiainen, N. Asokan and Jan-Erik Ekberg -- Olga Gadyatskaya, Fabio Massacci, Federica Paci and Sergey Stankevich -- Filippo Del Tedesco, Alejandro Russo and David Sands -- Juan José Conti and Alejandro Russo -- Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens and Wouter Joosen -- Jonas Magazinius, Phu H. Phung and David Sands -- Jose Quaresma and Christian W. Probst -- Billy Bob Brumley -- Markku-Juhani O. Saarinen.
Annotation This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.
9783642279379 3642279376
10.1007/978-3-642-27937-9 doi
Data protection--Congresses.
Computer security--Congresses.
Computer networks--Security measures--Congresses.
Protection de l'information (Informatique)--Congrès.
Sécurité informatique--Congrès.
Réseaux d'ordinateurs--Sécurité--Mesures--Congrès.
Informatique.
Computer networks--Security measures
Computer security
Data protection
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
QA76.9.A25 / N67 2009
005.8