did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642214233

Future Challenges in Security and Privacy for Academia and Industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings

by ; ; ; ;
  • ISBN13:

    9783642214233

  • ISBN10:

    3642214231

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2011-06-21
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $129.00

Summary

This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion detection.

Table of Contents

Kristian Beckman Award Keynote
Patience, Persistence, Faith: Evolving the Gold Standard in Privacy and Data Protectionp. 1
Malware, Information Flow and DoS Attacks
iSAM: An iPhone Stealth Airborne Malwarep. 17
TCP Ack Storm DoS Attacksp. 29
Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applicationsp. 41
Authentication
Breaking reCAPTCHA: A Holistic Approach via Shape Recognitionp. 56
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?p. 68
Quantifying the Effect of Graphical Password Guidelines for Better Securityp. 80
Network Security and Security Protocols
A Case Study in Practical Security of Cable Networksp. 92
Ceremony Analysis: Strengths and Weaknessesp. 104
Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemesp. 116
Piracy Protection for Streaming Content in Home Networksp. 128
Software Security
JITDefende: A Defense against JIT Spraying Attacksp. 142
Retrofitting Security in COTS Software with Binary Rewritingp. 154
Generating Optimised and Formally Checked Packet Parsing Codep. 173
Policy Compliance and Obligations
Organizational Power and Information Security Rule Compliancep. 185
Delegation of Obligations and Responsibilityp. 197
Distributed Security Policy Conformancep. 210
Privacy Attacks and Privacy-Enhancing Technologies
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasetsp. 223
Privacy-Enhanced Web-Based Event Scheduling with Majority Agreementp. 235
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Usersp. 247
Risk Analysis and Security Metrics
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domainp. 259
On Computing Enterprise IT Risk Metricsp. 271
A Kolmogorov Complexity Approach for Measuring Attack Path Complexityp. 281
Intrusion Detection
Extending LSCs for Behavioral Signature Modelingp. 293
Detecting Illegal System Calls Using a Data-Oriented Detection Modelp. 305
Appendix
IFIP Technical Committee 11: Security and Privacy Protection in Information Processing Systemsp. 317
Author Indexp. 327
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program