Amazon cover image
Image from Amazon.com

Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers / Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 7127. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Heidelberg : Springer, ©2012.Description: 1 online resource (x, 288 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642279379
  • 3642279376
Other title:
  • NordSec 2010
Subject(s): Genre/Form: Additional physical formats: Print version:: Information security technology for applications.DDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 N67 2009
Online resources:
Contents:
BloomCasting: Security in Bloom Filter Based Multicast / Mikko Särelä, Christian Esteve Rothenberg, András Zahemszky, Pekka Nikander and Jörg Ott -- Authentication Session Migration / Sanna Suoranta, Jani Heikkinen and Pekka Silvekoski -- Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles / Miika Komu, Sasu Tarkoma and Andrey Lukyanenko -- Experimental Analysis of the Femtocell Location Verification Techniques / Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert -- Why Wasn't I Notified?: Information Security Incident Reporting Demystified / Erka Koivunen -- Use of Ratings from Personalized Communities for Trustworthy Application Installation / Pern Hui Chia, Andreas P. Heiner and N. Asokan -- Practical Private Information Aggregation in Large Networks / Gunnar Kreitz, Mads Dam and Douglas Wikström -- Tracking Malicious Hosts on a 10Gbps Backbone Link / Magnus Almgren and Wolfgang John -- Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices / Elahe Kani-Zabihi and Lizzie Coles-Kemp.
Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions / Dominik Herrmann, Christoph Gerber, Christian Banse and Hannes Federrath -- A Framework for the Modular Specification and Orchestration of Authorization Policies / Jason Crampton and Michael Huth -- Credential Disabling from Trusted Execution Environments / Kari Kostiainen, N. Asokan and Jan-Erik Ekberg -- Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications / Olga Gadyatskaya, Fabio Massacci, Federica Paci and Sergey Stankevich -- Implementing Erasure Policies Using Taint Analysis / Filippo Del Tedesco, Alejandro Russo and David Sands -- A Taint Mode for Python via a Library / Juan José Conti and Alejandro Russo -- Security of Web Mashups: A Survey / Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens and Wouter Joosen -- Safe Wrappers and Sane Policies for Self Protecting JavaScript / Jonas Magazinius, Phu H. Phung and David Sands -- Protocol Implementation Generator / Jose Quaresma and Christian W. Probst -- Secure and Fast Implementations of Two Involution Ciphers / Billy Bob Brumley -- The PASSERINE Public Key Encryption and Authentication Mechanism / Markku-Juhani O. Saarinen.
Summary: Annotation This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and index.

Print version record.

BloomCasting: Security in Bloom Filter Based Multicast / Mikko Särelä, Christian Esteve Rothenberg, András Zahemszky, Pekka Nikander and Jörg Ott -- Authentication Session Migration / Sanna Suoranta, Jani Heikkinen and Pekka Silvekoski -- Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles / Miika Komu, Sasu Tarkoma and Andrey Lukyanenko -- Experimental Analysis of the Femtocell Location Verification Techniques / Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert -- Why Wasn't I Notified?: Information Security Incident Reporting Demystified / Erka Koivunen -- Use of Ratings from Personalized Communities for Trustworthy Application Installation / Pern Hui Chia, Andreas P. Heiner and N. Asokan -- Practical Private Information Aggregation in Large Networks / Gunnar Kreitz, Mads Dam and Douglas Wikström -- Tracking Malicious Hosts on a 10Gbps Backbone Link / Magnus Almgren and Wolfgang John -- Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices / Elahe Kani-Zabihi and Lizzie Coles-Kemp.

Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions / Dominik Herrmann, Christoph Gerber, Christian Banse and Hannes Federrath -- A Framework for the Modular Specification and Orchestration of Authorization Policies / Jason Crampton and Michael Huth -- Credential Disabling from Trusted Execution Environments / Kari Kostiainen, N. Asokan and Jan-Erik Ekberg -- Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications / Olga Gadyatskaya, Fabio Massacci, Federica Paci and Sergey Stankevich -- Implementing Erasure Policies Using Taint Analysis / Filippo Del Tedesco, Alejandro Russo and David Sands -- A Taint Mode for Python via a Library / Juan José Conti and Alejandro Russo -- Security of Web Mashups: A Survey / Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens and Wouter Joosen -- Safe Wrappers and Sane Policies for Self Protecting JavaScript / Jonas Magazinius, Phu H. Phung and David Sands -- Protocol Implementation Generator / Jose Quaresma and Christian W. Probst -- Secure and Fast Implementations of Two Involution Ciphers / Billy Bob Brumley -- The PASSERINE Public Key Encryption and Authentication Mechanism / Markku-Juhani O. Saarinen.

Annotation This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.

Powered by Koha