Information Security Technology for Applications

15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers

  • Tuomas Aura
  • Kimmo Järvinen
  • Kaisa Nyberg
Conference proceedings NordSec 2010
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7127)

Table of contents

  1. Front Matter
  2. Network Security

    1. Mikko Särelä, Christian Esteve Rothenberg, András Zahemszky, Pekka Nikander, Jörg Ott
      Pages 1-16
    2. Sanna Suoranta, Jani Heikkinen, Pekka Silvekoski
      Pages 17-32
    3. Miika Komu, Sasu Tarkoma, Andrey Lukyanenko
      Pages 33-48
    4. Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert
      Pages 49-54
  3. Invited Talk

  4. Monitoring and Reputation

    1. Pern Hui Chia, Andreas P. Heiner, N. Asokan
      Pages 71-88
    2. Gunnar Kreitz, Mads Dam, Douglas Wikström
      Pages 89-103
    3. Magnus Almgren, Wolfgang John
      Pages 104-120
  5. Privacy

    1. Dominik Herrmann, Christoph Gerber, Christian Banse, Hannes Federrath
      Pages 136-154
  6. Policy Enforcement

    1. Kari Kostiainen, N. Asokan, Jan-Erik Ekberg
      Pages 171-186
    2. Olga Gadyatskaya, Fabio Massacci, Federica Paci, Sergey Stankevich
      Pages 187-192
    3. Filippo Del Tedesco, Alejandro Russo, David Sands
      Pages 193-209
  7. Selected OWASP AppSec Research 2010 Papers

    1. Juan José Conti, Alejandro Russo
      Pages 210-222
    2. Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens, Wouter Joosen
      Pages 223-238
    3. Jonas Magazinius, Phu H. Phung, David Sands
      Pages 239-255
  8. Cryptography and Protocols

    1. Jose Quaresma, Christian W. Probst
      Pages 256-268

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010.
The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.

Keywords

event monitoring language based security malicious traffic user-centered design wireless sensor networks

Editors and affiliations

  • Tuomas Aura
    • 1
  • Kimmo Järvinen
    • 2
  • Kaisa Nyberg
    • 2
  1. 1.School of Science and TechnologyAalto UniversityEspooFinland
  2. 2.Department of Information and Computer ScienceAalto UniversityAaltoFinland

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-27937-9
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-27936-2
  • Online ISBN 978-3-642-27937-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349