Decision and Game Theory for Security

First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

  • Tansu Alpcan
  • Levente Buttyán
  • John S. Baras
Conference proceedings GameSec 2010
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6442)

Table of contents

  1. Front Matter
  2. Security Investments and Planning

    1. Assane Gueye, Jean C. Walrand, Venkat Anantharam
      Pages 1-20
    2. Rainer Böhme, Márk Félegyházi
      Pages 21-37
  3. Privacy and Anonymity

    1. Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger, Jean-Pierre Hubaux
      Pages 38-57
    2. Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das
      Pages 58-71
    3. Murat Kantarcioglu, Alain Bensoussan, SingRu(Celine) Hoe
      Pages 72-86
  4. Adversarial and Robust Control

    1. Eitan Altman, Tamer Başar, Veeraruna Kavitha
      Pages 87-106
    2. Saurabh Amin, Galina A. Schwartz, S. Shankar Sastry
      Pages 107-122
    3. Eitan Altman, Alireza Aram, Tamer Başar, Corinne Touati, Saswati Sarkar
      Pages 123-134
  5. Network Security and Botnets

    1. Alain Bensoussan, Murat Kantarcioglu, SingRu(Celine) Hoe
      Pages 135-148
    2. Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim Raya, Jean-Pierre Hubaux
      Pages 149-167
    3. Nicola Gatti, Mattia Monga, Sabrina Sicari
      Pages 168-179
    4. Alberto Volpatto, Federico Maggi, Stefano Zanero
      Pages 180-191
  6. Authorization and Authentication

    1. Sören Preibusch, Joseph Bonneau
      Pages 192-207
    2. Farzad Salim, Jason Reid, Uwe Dulleck, Ed Dawson
      Pages 208-219
  7. Theory and Algorithms for Security

    1. Steve Alpern, Robbert Fokkink, Joram op den Kelder, Tom Lidbetter
      Pages 220-233
    2. Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang
      Pages 234-244
    3. Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Patrick Schweitzer
      Pages 245-256
    4. Christopher Kiekintveld, Janusz Marecki, Milind Tambe
      Pages 257-265
  8. Back Matter

About these proceedings

Introduction

Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. - cision and game theory provides a rich set of analyticalmethods and approaches to address various resource allocation and decision-making problems arising in security. This edited volume contains the contributions presented at the inaugural Conference on Decision and Game Theory for Security - GameSec 2010. These 18 articles (12 full and 6 short papers) are thematically categorized into the following six sections: – “Security investments and planning” contains two articles, which present optimization methods for (security) investments when facing adversaries. – “Privacy and anonymity” has three articles discussing location privacy, - line anonymity, and economic aspects of privacy. – “Adversarial and robust control” contains three articles, which investigate security and robustness aspects of control in networks. – “Networksecurityandbotnets”hasfourarticlesfocusingondefensivestra- giesagainstbotnetsaswellasdetectionofmaliciousadversariesinnetworks. – “Authorizationandauthentication”hasanarticleonpasswordpracticesand another one presenting a game-theoretic authorization model. – “Theory and algorithms for security” contains four articles on various th- retic and algorithmic aspects of security.

Keywords

algorithms approximate algorithms game theory information security networked control systems optimization security

Editors and affiliations

  • Tansu Alpcan
    • 1
  • Levente Buttyán
    • 2
  • John S. Baras
    • 3
  1. 1.Deutsche Telekom LaboratoriesTechnische Universität BerlinBerlinGermany
  2. 2.Laboratory of Cryptography and System Security (CrySyS)Budapest University of Technology and EconomicsBudapestHungary
  3. 3.Department of Electrical and Computer EngineeringUniversity of MarylandCollege ParkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-17197-0
  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-17196-3
  • Online ISBN 978-3-642-17197-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349