TY - BOOK AU - Aura,Tuomas AU - Järvinen,Kimmo AU - Nyberg,Kaisa ED - Nordic Conference on Secure IT Systems TI - Information security technology for applications: 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers T2 - Lecture notes in computer science, SN - 9783642279379 AV - QA76.9.A25 N67 2009 U1 - 005.8 23 PY - 2012/// CY - Heidelberg PB - Springer KW - Data protection KW - Congresses KW - Computer security KW - Computer networks KW - Security measures KW - Protection de l'information (Informatique) KW - Congrès KW - Sécurité informatique KW - Réseaux d'ordinateurs KW - Sécurité KW - Mesures KW - Informatique KW - eclas KW - fast KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - Includes bibliographical references and index; BloomCasting: Security in Bloom Filter Based Multicast; Mikko Särelä, Christian Esteve Rothenberg, András Zahemszky, Pekka Nikander and Jörg Ott --; Authentication Session Migration; Sanna Suoranta, Jani Heikkinen and Pekka Silvekoski --; Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles; Miika Komu, Sasu Tarkoma and Andrey Lukyanenko --; Experimental Analysis of the Femtocell Location Verification Techniques; Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert --; Why Wasn't I Notified?: Information Security Incident Reporting Demystified; Erka Koivunen --; Use of Ratings from Personalized Communities for Trustworthy Application Installation; Pern Hui Chia, Andreas P. Heiner and N. Asokan --; Practical Private Information Aggregation in Large Networks; Gunnar Kreitz, Mads Dam and Douglas Wikström --; Tracking Malicious Hosts on a 10Gbps Backbone Link; Magnus Almgren and Wolfgang John --; Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices; Elahe Kani-Zabihi and Lizzie Coles-Kemp; Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions; Dominik Herrmann, Christoph Gerber, Christian Banse and Hannes Federrath --; A Framework for the Modular Specification and Orchestration of Authorization Policies; Jason Crampton and Michael Huth --; Credential Disabling from Trusted Execution Environments; Kari Kostiainen, N. Asokan and Jan-Erik Ekberg --; Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications; Olga Gadyatskaya, Fabio Massacci, Federica Paci and Sergey Stankevich --; Implementing Erasure Policies Using Taint Analysis; Filippo Del Tedesco, Alejandro Russo and David Sands --; A Taint Mode for Python via a Library; Juan José Conti and Alejandro Russo --; Security of Web Mashups: A Survey; Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens and Wouter Joosen --; Safe Wrappers and Sane Policies for Self Protecting JavaScript; Jonas Magazinius, Phu H. Phung and David Sands --; Protocol Implementation Generator; Jose Quaresma and Christian W. Probst --; Secure and Fast Implementations of Two Involution Ciphers; Billy Bob Brumley --; The PASSERINE Public Key Encryption and Authentication Mechanism; Markku-Juhani O. Saarinen N2 - Annotation; This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols UR - https://link.springer.com/10.1007/978-3-642-27937-9 ER -