Foundations and Practice of Security

5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers

  • Joaquin Garcia-Alfaro
  • Frédéric Cuppens
  • Nora Cuppens-Boulahia
  • Ali Miri
  • Nadia Tawbi
Conference proceedings FPS 2012

DOI: 10.1007/978-3-642-37119-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7743)

Table of contents (25 papers)

  1. Front Matter
  2. Cryptography and Information Theory

    1. Proofs of Retrievability via Fountain Code
      Sumanta Sarkar, Reihaneh Safavi-Naini
      Pages 18-32
    2. MARC: Modified ARC4
      Jianliang Zheng, Jie Li
      Pages 33-44
    3. Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements
      Pawel Chwalinski, Roman Belavkin, Xiaochun Cheng
      Pages 45-61
  3. Key Management and Cryptographic Protocols

  4. Privacy and Trust

    1. Classifying Online Social Network Users through the Social Graph
      Cristina Pérez-Solà, Jordi Herrera-Joancomartí
      Pages 115-131
    2. A Formal Derivation of Composite Trust
      Tim Muller, Patrick Schweitzer
      Pages 132-148
    3. IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability
      Ahmad AlSa’deh, Hosnieh Rafiee, Christoph Meinel
      Pages 149-161
  5. Policies and Applications Security

    1. Policy Administration in Tag-Based Authorization
      Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone
      Pages 162-179
    2. Enabling Dynamic Security Policy in the Java Security Manager
      Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens
      Pages 180-193
    3. A Novel Obfuscation: Class Hierarchy Flattening
      Christophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere
      Pages 194-210
    4. RESource: A Framework for Online Matching of Assembly with Open Source Code
      Ashkan Rahimian, Philippe Charland, Stere Preda, Mourad Debbabi
      Pages 211-226
    5. Touchjacking Attacks on Web in Android, iOS, and Windows Phone
      Tongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du
      Pages 227-243
  6. Network and Adaptive Security

    1. Short-Term Linkable Group Signatures with Categorized Batch Verification
      Lukas Malina, Jordi Castellà-Roca, Arnau Vives-Guasch, Jan Hajny
      Pages 244-260
    2. GHUMVEE: Efficient, Effective, and Flexible Replication
      Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere
      Pages 261-277
    3. Extracting Attack Scenarios Using Intrusion Semantics
      Sherif Saad, Issa Traore
      Pages 278-292
    4. On Securely Manipulating XML Data
      Houari Mahfoud, Abdessamad Imine
      Pages 293-307

About these proceedings


This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012.

The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.


attacks security protocols social Web threat analysis trust management

Editors and affiliations

  • Joaquin Garcia-Alfaro
    • 1
  • Frédéric Cuppens
    • 2
  • Nora Cuppens-Boulahia
    • 2
  • Ali Miri
    • 3
  • Nadia Tawbi
    • 4
  1. 1.TELECOM SudParisEvryFrance
  2. 2.TELECOM BretagneCesson SévignéFrance
  3. 3.Ryerson UniversityTorontoCanada
  4. 4.Université LavalQuebecCanada

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-37118-9
  • Online ISBN 978-3-642-37119-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349