Kristian Beckman Award Awardee Keynote |
The 5 Waves of Information Security - From Kristian Beckman to the Present / S.H. (Basie) von Solms |
Security Management |
A Business Continuity Management Simulator / William J. Caelli ; Lam-For Kwok ; Dennis Longley |
Mining Business-Relevant RBAC States through Decomposition / Alessandro Colantonio ; Roberto Di Pietro ; Alberto Ocello ; Nino Vincenzo Verde |
Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study / Rostyslav Barabanov ; Stewart Kowalski |
Security Management & Governance |
Using Actor Network Theory to Understand Information Security Management / Karin Hedström ; Gurpreet Dhillon ; Fredrik Karlsson |
Information Security Governance: When Compliance Becomes More Important than Security / Terence C.C. Tan ; Anthonie B. Ruighaver ; Atif Ahmad |
Network Security & Authentication |
Understanding Domain Registration Abuses / Scott E. Coull ; Andrew M. White ; Ting-Fang Yen ; Fabian Monrose ; Michael K. Reiter |
Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites / Markus Huber ; Martin Mulazzani ; Edgar Weippl |
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems / Julian Schütte ; Nicolai Kuntze ; Andreas Fuchs ; Atta Badii |
Qualified Mobile Server Signature / Clemens Orthacker ; Martin Centner ; Christian Kittl |
Intrusion Detection, Trust Management, and Models |
Fraud Detection in ERP Systems Using Scenario Matching / Asadul Khandoker Islam ; Malcom Corney ; George Mohay ; Andrew Clark ; Shane Bracher ; Tobias Raub ; Ulrich Flegel |
Use of IP Addresses for High Rate Flooding Attack Detection / Ejaz Ahmed ; Alan Tickle ; Sajal Bhatia |
Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information / Sascha Hauke ; Martin Pyka ; Markus Borschbach ; Dominik Heider |
Ex-SDF; An Extended Service Dependency Framework for Intrusion Impact Assessment / Nizar Kheir ; Nora Cuppens-Boulahia ; Frédéric Cuppens ; Hervé Debar |
Software Security and Assurance |
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism / Raja Naeem Akram ; Konstantinos Markantonakis ; Keith Mayes |
On-the-fly Inlining of Dynamic Security Monitors / Jonas Magazinius ; Alejandro Russo ; Andrei Sabelfeld |
A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems / Gideon Mylesc ; Hongxia Jin |
Evaluation of the Offensive Approach in Information Security Education / Martin Mink ; Rainer Greifeneder |
Panel |
Research Methodologies in Information Security Research: The Road Ahead / Johan F. van Niekerk ; Rossouw von Solms |
Access Control and Privacy |
Purpose-Based Access Control Policies and Conflicting Analysis / Hua Wang ; Lili Sun ; Vijay Varadharajan |
Delegation in Predicate Encryption Supporting Disjunctive Queries / Dongdong Sun ; Colin Boyd ; Juan Manuel González Nieto |
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy / Sven Wohlgemuth ; Isao Echizen ; Noboru Sonehara ; Günter Müller |
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments / Omar Hasan ; Lionel Brunie ; Elisa Bertino |
Privacy |
Towards Fair Indictment for Data Collection with Self-Enforcing Privacy / Mark Stegelmann |
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project / Christian Kahl ; Katja Böttcher ; Markus Tschersich ; Stephan Heim ; Kai Rannenberg |
Performance Analysis of Accumulator-Based Revocation Mechanisms / Jorn Lapon ; Markulf Kohlweiss ; Bart De Decker ; Vincent Naessens |
Appendix |
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems / Leon Strous |
Author Index |
Kristian Beckman Award Awardee Keynote |
The 5 Waves of Information Security - From Kristian Beckman to the Present / S.H. (Basie) von Solms |
Security Management |
A Business Continuity Management Simulator / William J. Caelli ; Lam-For Kwok ; Dennis Longley |
Mining Business-Relevant RBAC States through Decomposition / Alessandro Colantonio ; Roberto Di Pietro ; Alberto Ocello ; Nino Vincenzo Verde |
Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study / Rostyslav Barabanov ; Stewart Kowalski |