Identity and Privacy in the Internet Age

14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings

  • Audun Jøsang
  • Torleiv Maseng
  • Svein Johan Knapskog

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5838)

Table of contents

  1. Front Matter
  2. Session 1: Anonymity and Privacy

    1. Heiko Roßnagel, Jan Zibuschka, Lexi Pimenides, Thomas Deselaers
      Pages 15-27
    2. Md. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar
      Pages 44-59
  3. Session 2: Modelling and Design

    1. Karsten Peder Holth, Do van Thuan, Ivar Jørstad, Do van Thanh
      Pages 60-71
    2. Riccardo Focardi, Flaminia L. Luccio, Graham Steel
      Pages 88-103
  4. Session 3: Network Layer Security

    1. Finn M. Halvorsen, Olav Haugen, Martin Eian, Stig F. Mjølsnes
      Pages 120-132
  5. Session 4: Security for Mobile Users

    1. Naveed Ahmed, Christian D. Jensen
      Pages 148-162
    2. Jan Bouda, Jan Krhovjak, Vashek Matyas, Petr Svenda
      Pages 179-189
  6. Session 5: Embedded Systems and Mechanisms

    1. Mikko Kiviharju, Teijo Venäläinen, Suna Kinnunen
      Pages 190-206
    2. Arne Ansper, Sven Heiberg, Helger Lipmaa, Tom André Øverland, Filip van Laenen
      Pages 207-222
    3. Thomas Vilarinho, Kjetil Haslum, Josef Noll
      Pages 223-238
    4. Nataliia Bielova, Fabio Massacci, Andrea Micheletti
      Pages 239-254
  7. Session 6: Protocols and Protocol Analysis

    1. Benedikt Westermann
      Pages 255-270
    2. Peeter Laud, Meelis Roos
      Pages 271-286

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 14th International Conference on Secure IT Systems, NordSec 2009, held in Oslo, Norway, October 14-16, 2009.

The 20 revised full papers and 8 short papers presented were carefully reviewed and selected from 52 submissions. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile networks under an increasingly serious threat picture. Among the contemporary security issues discussed were Security Services Modeling, Petri Nets, Attack Graphs, Electronic Voting Schemes, Anonymous Payment Schemes, Mobile ID-Protocols, SIM Cards, Network Embedded Systems, Trust, Wireless Sensor Networks, Privacy, Privacy Disclosure Regulations, Financial Cryptography, PIN Verification, Temporal Access Control, Random Number Generators, and some more.

Keywords

attack graphs authentication cryptography e-Business e-Commerce e-Payment e-Voting embedded systems information petri nets privacy security services service modeling trust wireless sensor networks

Editors and affiliations

  • Audun Jøsang
    • 1
  • Torleiv Maseng
    • 2
  • Svein Johan Knapskog
    • 3
  1. 1.University of Oslo, University Graduate CenterKjellerNorway
  2. 2.Norwegian Defence Research EstablishmentKjellerNorway
  3. 3.Norwegian University of Science and Technology, Centre for Quantifiable Quality of Service in Communication SystemsTrondheimNorway

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-04766-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-04765-7
  • Online ISBN 978-3-642-04766-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book