Emerging Challenges for Security, Privacy and Trust

24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings

  • Dimitris Gritzalis
  • Javier Lopez
Conference proceedings SEC 2009

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 297)

Table of contents

  1. Front Matter
  2. Identification and Authentication I

    1. Nathan Clarke, Sevasti Karatzouni, Steven Furnell
      Pages 1-12
    2. Yannis Soupionis, George Tountas, Dimitris Gritzalis
      Pages 25-38
  3. Threats and Attacks

    1. Lucas Nussbaum, Pierre Neyron, Olivier Richard
      Pages 51-62
    2. Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar Iyer
      Pages 63-75
  4. Identification and Authentication II

    1. Gerald Stefan Kostmajer, Herbert Stögner, Andreas Uhl
      Pages 76-86
    2. Marcel Fernandez, Josep Cotrina, Miguel Soriano, Neus Domingo
      Pages 87-97
    3. Li Yao, Ning Zhang
      Pages 98-108
  5. Applications of Cryptography and Information Hiding

    1. Herbert Leitold, Reinhard Posch, Thomas Rössler
      Pages 109-118
    2. Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
      Pages 119-131
    3. Jorge Blasco, Julio C. Hernandez-Castro, Juan M. E. Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros
      Pages 132-142
  6. Trusted Computing

    1. Shay Gueron, Jean-Pierre Seifert
      Pages 143-151
    2. Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt
      Pages 152-163
  7. Security Policies

    1. Anas Abou El Kalam, Philippe Balbiani
      Pages 176-189
  8. Validation, Verification, Evaluation

    1. Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph
      Pages 190-201
    2. Puneet Gupta, Scott D. Stoller
      Pages 202-213
    3. Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag
      Pages 214-225
  9. Privacy Protection - Security Assessment

    1. Jan Kolter, Thomas Kernchen, Günther Pernul
      Pages 226-236
    2. Pieter Verhaeghe, Jorn Lapon, Bart De Decker, Vincent Naessens, Kristof Verslype
      Pages 237-247
    3. Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum
      Pages 248-258
  10. Role Mining and Content Protection

    1. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde
      Pages 259-269
    2. Abdullatif Shikfa, Melek Önen, Refik Molva
      Pages 270-282
    3. Hongxia Jin, Jeffery Lotspiech
      Pages 283-293
    4. Mohammad Ashiqur Rahaman, Yves Roudier, Philip Miseldine, Andreas Schaad
      Pages 294-306
  11. Security Protocols

    1. Felix S. Leder, Peter Martini
      Pages 307-317
    2. Mayla Brusò, Agostino Cortesi
      Pages 318-329
    3. Alessandro Sorniotti, Refik Molva
      Pages 330-341
    4. Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo
      Pages 342-352
  12. Access Control

    1. Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson
      Pages 353-363
    2. Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi et al.
      Pages 364-375
    3. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde
      Pages 376-386
  13. Internet and Web Applications Security

    1. Yannis Mallios, Sudeep Modi, Aditya Agarwala, Christina Johns
      Pages 410-420
    2. Sandra Steinbrecher, Stephan Groß, Markus Meichau
      Pages 421-431
    3. Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrere, AbdelMalek Benzekri
      Pages 432-442
  14. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 24th IFIP TC 11 International Information Security Conference, SEC 2009,  held in Pafos, Cyprus, in May 2009.

The 38 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers are organized in topical sections on identification and authentication, threats and attacks, applications of cryptography and information hiding, trusted computing, security policies, validation, verification and evaluation, privacy protection and security assessment, role mining and content protection, security protocols, access control, and internet and Web applications security.


Trusted Computing ad-hoc networks botnet protocols cryptanalysis data security egovernment encryption esignatures information intrusion detection iris recognition mobile networking privacy steganalysis voip

Editors and affiliations

  • Dimitris Gritzalis
    • 1
  • Javier Lopez
    • 2
  1. 1.Information Security and Infrastructure Protection Research Group, Dept. of InformaticsAthens University of Economics and BusinessAthensGreece
  2. 2.Computer Science Department, E.T.S.I. InformaticaUniversity of MalagaMalagaSpain

Bibliographic information

  • DOI
  • Copyright Information IFIP International Federation for Information Processing 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-01243-3
  • Online ISBN 978-3-642-01244-0
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site