default search action
SEC 2007: Sandton, South Africa
- Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms:
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. IFIP 232, Springer 2007, ISBN 978-0-387-72366-2
Digital Forensics
- John Haggerty, Mark John Taylor:
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. 1-12 - Talania Grobler, Buks Louwrens:
Digital Forensic Readiness as a Component of Information Security Best Practice. 13-24
Human-Computer Interaction I
- Christer Magnusson, Josef Molvidsson, Sven Zetterqvist:
Value creation and Return On Security Investments (ROSI). 25-35 - Almut Herzog, Nahid Shahmehri:
Usability and Security of Personal Firewalls. 37-48
Computer-Based Trust
- Nicolai Kuntze, Andreas U. Schmidt:
Trusted Ticket Systems and Applications. 49-60 - Luiz Fernando Rust C. Carmo, Breno G. de Oliveira, Augusto C. Braga:
Trust Evaluation for Web Applications based on Behavioral Analysis. 61-72
Information Security Management I
- Rose-Mharie Åhlfeldt, Paolo Spagnoletti, Guttorm Sindre:
Improving the Information Security Model by using TFI. 73-84 - Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edgar R. Weippl:
Ontological Mapping of Common Criteria's Security Assurance Requirements. 85-95
Network Security I
- Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Management of Exceptions on Access Control Policies. 97-108 - Tieyan Li, Guilin Wang:
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. 109-120
Information Security Management II
- Natsuko Hikage, Yuko Murayama, Carl Hauser:
Exploratory survey on an Evaluation Model for a Sense of Security. 121-132 - Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood:
Employees' Adherence to Information Security Policies: An Empirical Study. 133-144
Network Security II
- Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, Jens B. Schmitt:
Phishing in the Wireless: Implementation and Analysis. 145-156 - Tyler Moore, Jolyon Clulow:
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. 157-168
Access Control I
- Liesje Demuynck, Bart De Decker, Wouter Joosen:
A Credential-Based System for the Anonymous Delegation of Rights. 169-180 - Christian J. Eibl, Basie von Solms, Sigrid E. Schubert:
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content. 181-192
Human-Computer Interaction II
- Tjaart Steyn, Hennie A. Kruger, Lynette Drevin:
Identity Theft - Empirical evidence from a Phishing Exercise. 193-203 - Steven Furnell, Dimitris Katsabas, Paul Dowland, Fraser Reid:
A Practical Usability Evaluation of Security Features in End-User Applications. 205-216
Intrusion Detection Systems
- A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff:
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. 217-228 - Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
A Survey of Bots Used for Distributed Denial of Service Attacks. 229-240
Access Control II
- Srijith Krishnan Nair, Muhammad Torabi Dashti, Bruno Crispo, Andrew S. Tanenbaum:
A Hybrid PKI-IBC Based Ephemerizer System. 241-252 - Sevasti Karatzouni, Nathan L. Clarke:
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. 253-263
Information Privacy I
- Guilin Wang, Feng Bao:
Security Remarks on a Convertible Nominative Signature Scheme. 265-275 - Alapan Arnab, Andrew Hutchison:
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions. 277-288
Access Control III
- Evangelos Kotsovinos, Ingo Friese, Martin Kurze, Jörg Heuer:
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation. 289-300 - Yuri Demchenko, Leon Gommans, Cees de Laat:
Extending Role Based Access Control Model for Distributed Multidomain Applications. 301-312
Information Privacy II
- Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy. 313-324 - Jan Zibuschka, Lothar Fritsch, Mike Radmacher, Tobias Scherner, Kai Rannenberg:
Enabling Privacy of Real-Life LBS. 325-336
Access Control IV
- Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
Crafting Web Counters into Covert Channels. 337-348 - Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia:
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM. 349-360
Security Services
- Nicolai Kuntze, Andreas U. Schmidt, Christian Hett:
Non-Repudiation in Internet Telephony. 361-372 - Håvard D. Johansen, Dag Johansen, Robbert van Renesse:
FirePatch: Secure and Time-Critical Dissemination of Software Patches. 373-384
Access Control V
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. 385-396 - Jan Paul Kolter, Rolf Schillinger, Günther Pernul:
Building a Distributed Semantic-aware Security Architecture. 397-408
Trust and Intrusion Detection Systems
- Andriy Panchenko, Lexi Pimenidis:
Using Trust to Resist Censorship in the Presence of Collusion. 409-420 - Zhuowei Li, Amitabha Das, Jianying Zhou:
Evaluating the Effects of Model Generalization on Intrusion Detection Performance. 421-432
Keynote Paper
- William J. Caelli:
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. 433-442
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society
- Carsten Rudolph:
Covert Identity Information in Direct Anonymous Attestation (DAA). 443-448 - Adolf Hohl, Alf Zugenmaier:
Safeguarding Personal Data using Rights Management in Distributed Applications. 449-456 - Stephen Flowerday, Gideon Ranga:
Identification Now and in the Future: Social Grant Distribution Process in South Africa. 457-459 - Paula Thomas, Theodore Tryfonas:
Hard-drive Disposal and Identity Fraud. 461-466 - Eleni Kosta, Martin Meints, Marit Hansen, Mark Gasson:
An analysis of security and privacy issues relating to RFID enabled ePassports. 467-472
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and SkUls for Manageable Information Security
- Nicholas Tate, Sharman Lichtenstein, Matthew J. Warren:
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework. 473-478 - Tatjana Welzer, Marko Hölbl, Ana Habjanic, Bostjan Brumen, Marjan Druzovec:
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program. 479-484 - Ronald C. Dodge, Corey Bertram, Daniel Ragsdale:
Remote Virtual Information Assurance Network. 485-490 - Kara L. Nance, Brian Hay:
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model. 491-496
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.