Normal view MARC view ISBD view

Secure IT Systems [electronic resource] : 19th Nordic Conference, NordSec 2014, Troms�, Norway, October 15-17, 2014, Proceedings / edited by Karin Bernsmed, Simone Fischer-H�ubner.

Contributor(s): Bernsmed, Karin [editor.] | Fischer-H�ubner, Simone [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 8788Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014Description: XII, 296 p. 81 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319115993.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Biometrics (Biology) | Computer Science | Systems and Data Security | Data Encryption | BiometricsAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Accountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- (Ss(B-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients' Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied (Ss(B-Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798-2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication.
In: Springer eBooksSummary: This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Troms�, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.
    average rating: 0.0 (0 votes)
No physical items for this record

Accountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- (Ss(B-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients' Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied (Ss(B-Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798-2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication.

This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Troms�, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.

There are no comments for this item.

Log in to your account to post a comment.