Digital Forensics |
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor |
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens |
Human-Computer Interaction I |
Value creation and Return on Security Investments (ROSI) / Christer Magnusson ; Josef Molvidsson ; Sven Zetterqvist |
Usability and Security of Personal Firewalls / Almut Herzog ; Nahid Shahmehri |
Computer-Based Trust |
Trusted Ticket Systems and Applications / Andreas U. Schmidt ; Nicolai Kuntze |
Trust Evaluation for Web Applications based on Behavioral Analysis / Luiz da Costa Carmo ; Breno de Oliveira ; Augusto Braga |
Information Security Management I |
Improving the Information Security Model by using TFI / Rose-Mharie Ahlfeldt ; Paolo Spagnoletti ; Guttorm Sindre |
Ontological Mapping of Common Criteria's Security Assurance Requirements / Andreas Ekelhart ; Stefan Fenz ; Gernot Goluch ; Edgar Weippl |
Network Security I |
Management of Exceptions on Access Control Policies / Joaquin Garcia-Alfaro ; Frederic Cuppens ; Nora Cuppens-Boulahia |
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols / Tieyan Li ; Guilin Wang |
Information Security Management II |
Exploratory Survey on an Evaluation Model for a Sense of Security / Natsuko Hikage ; Yuko Murayama ; Carl Hauser |
Employees' Adherence to Information Security Policies: An Empirical Study / Mikko Siponen ; Seppo Pahnila ; Adam Mahmood |
Network Security II |
Phishing in the Wireless: Implementation and Analysis / Ivan Martinovic ; Frank Zdarsky ; Adam Bachorek ; Christian Jung ; Jens Schmitt |
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks / Tyler Moore ; Jolyon Clulow |
Access Control I |
A Credential-Based System for the Anonymous Delegation of Rights / Liesje Demuynck ; Bart De Decker ; Wouter Joosen |
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content / Christian Josef Eibl ; S.H. Basie von Solms ; Sigrid Schubert |
Human-Computer Interaction II |
Identity Theft - Empirical Evidence from a Phishing Exercise / Tjaart Steyn ; Hennie Kruger ; Lynette Drevin |
A Practical Usability Evaluation of Security Features in End-User Applications / Steven Furnell ; Dimitris Katsabas ; Paul Dowland ; Fraser Reid |
Intrusion Detection Systems |
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis / Maciej Rossudowski ; Hein Venter ; Jan Eloff |
A Survey of Bots Used for Distributed Denial of Service Attacks / Vrizlynn Thing ; Morris Sloman ; Naranker Dulay |
Access Control II |
A Hybrid PKI-IBC Based Ephemerizer System / Srijith Nair ; Mohammad Dashti ; Bruno Crispo ; Andrew Tanenbaum |
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices / Sevasti Karatzouni ; Nathan Clarke |
Information Privacy I |
Security Remarks on a Convertible Nominative Signature Scheme / Feng Bao |
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions / Alapan Arnab ; Andrew Hutchison |
Access Control III |
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation / Evangelos Kotsovinos ; Ingo Friese ; Martin Kurze ; Jorg Heuer |
Extending Role Based Access Control Model for Distributed Multidomain Applications / Yuri Demchenko ; Leon Gommans ; Cees de Laat |
Information Privacy II |
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy / Claudio Ardagna ; Marco Cremonini ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Pierangela Samarati |
Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning / Jan Zibuschka ; Lothar Fritsch ; Mike Radmacher ; Tobias Scherner ; Kai Rannenberg |
Access Control IV |
Crafting Web Counters into Covert Channels / Xiapu Luo ; Edmond Chan ; Rocky Chang |
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM / Thierry Sans |
Security Services |
Non-Repudiation in Internet Telephony / Andreas Schmidt ; Christian Hett |
FirePatch: Secure and Time-Critical Dissemination of Software Patches / Havard Johansen ; Dag Johansen ; Robbert van Renesse |
Access Control V |
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing / Sara Foresti ; Sushil Jajodia ; Stefano Paraboschi |
Building a Distributed Semantic-aware Security Architecture / Jan Kolter ; Rolf Schillinger ; Gunther Pernul |
Trust and Intrusion Detection Systems |
Using Trust to Resist Censorship in the Presence of Collusion / Andriy Panchenko ; Lexi Pimenidis |
Evaluating the Effects of Model Generalization on Intrusion Detection Performance / Zhuowei Li ; Amitabha Das ; Jianying Zhou |
Keynote paper |
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM / William Caelli |
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society |
Covert Identity Information in Direct Anonymous Attestation (DAA) / Carsten Rudolph |
Safeguarding Personal Data using Rights Management in Distributed Applications / Adolf Hohl ; Alf Zugenmaier |
Identification Now and in the Future: Social Grant Distribution Process in South Africa / Stephen Flowerday ; Gideon Ranga |
Hard-drive Disposal and Identity Fraud / Paula Thomas ; Theodore Tryfonas |
An analysis of security and privacy issues relating to RFID enabled ePassports / Eleni Kosta ; Martin Meints ; Marit Hansen ; Mark Gasson |
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Manageable Information Security |
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework / Nicholas Tate ; Sharman Lichtenstein ; Matthew Warren |
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program / Tatjana Welzer ; Marko Holbl ; Ana Habjanic ; Bostjan Brumen ; Marjan Druzovec |
Remote Virtual Information Assurance Network / Ronald Dodge ; Corey Bertram ; Daniel Ragsdale |
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model / Kara Nance ; Brian Hay |
Author Index |
Digital Forensics |
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor |
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens |
Human-Computer Interaction I |
Value creation and Return on Security Investments (ROSI) / Christer Magnusson ; Josef Molvidsson ; Sven Zetterqvist |
Usability and Security of Personal Firewalls / Almut Herzog ; Nahid Shahmehri |