Secure IT Systems

19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings

  • Karin Bernsmed
  • Simone Fischer-Hübner
Conference proceedings NordSec 2014

DOI: 10.1007/978-3-319-11599-3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8788)

Table of contents

  1. Front Matter
    Pages 1-10
  2. Keynote Paper

    1. Front Matter
      Pages 1-1
  3. Information Management and Data Privacy

    1. Front Matter
      Pages 25-25
    2. Erik Bergström, Rose-Mharie Åhlfeldt
      Pages 27-41
    3. Kalpana Gondi, A. Prasad Sistla, V. N. Venkatakrishnan
      Pages 42-58
  4. Cloud, Big Data and Virtualization Security

    1. Front Matter
      Pages 75-75
    2. Elena Reshetova, Janne Karhunen, Thomas Nyman, N. Asokan
      Pages 77-93
    3. Alberto Trombetta, Giuseppe Persiano, Stefano Braghin
      Pages 94-109
    4. Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy
      Pages 110-128
    5. Julio Angulo, Erik Wästlund, Johan Högberg
      Pages 129-145
  5. Network Security and Logging

    1. Front Matter
      Pages 147-147
    2. Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards
      Pages 149-164
    3. Frédéric Besson, Nataliia Bielova, Thomas Jensen
      Pages 181-196
  6. Attacks and Defenses

    1. Front Matter
      Pages 197-197
    2. Aleksandr Lenin, Jan Willemson, Dyan Permata Sari
      Pages 199-212
    3. Aapo Kalliola, Tuomas Aura, Sanja Šćepanović
      Pages 213-228
    4. Markku Antikainen, Tuomas Aura, Mikko Särelä
      Pages 229-244

About these proceedings

Introduction

This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromsø, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.

Keywords

applied security authentication biometrics cloud based storage cloud computing distributed systems information security intrusion detection network security security and privacy security services systems security

Editors and affiliations

  • Karin Bernsmed
    • 1
  • Simone Fischer-Hübner
    • 2
  1. 1.SINTEF ICTTrondheimNorway
  2. 2.Karlstad UniversityKarlstadSweden

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-11598-6
  • Online ISBN 978-3-319-11599-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349