Foundations and Practice of Security

5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers

  • Joaquin Garcia-Alfaro
  • Frédéric Cuppens
  • Nora Cuppens-Boulahia
  • Ali Miri
  • Nadia Tawbi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7743)

Table of contents

  1. Front Matter
  2. Cryptography and Information Theory

    1. Sumanta Sarkar, Reihaneh Safavi-Naini
      Pages 18-32
    2. Jianliang Zheng, Jie Li
      Pages 33-44
    3. Pawel Chwalinski, Roman Belavkin, Xiaochun Cheng
      Pages 45-61
  3. Key Management and Cryptographic Protocols

  4. Privacy and Trust

    1. Cristina Pérez-Solà, Jordi Herrera-Joancomartí
      Pages 115-131
    2. Tim Muller, Patrick Schweitzer
      Pages 132-148
    3. Ahmad AlSa’deh, Hosnieh Rafiee, Christoph Meinel
      Pages 149-161
  5. Policies and Applications Security

    1. Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone
      Pages 162-179
    2. Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens
      Pages 180-193
    3. Christophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere
      Pages 194-210
    4. Ashkan Rahimian, Philippe Charland, Stere Preda, Mourad Debbabi
      Pages 211-226
    5. Tongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du
      Pages 227-243
  6. Network and Adaptive Security

    1. Lukas Malina, Jordi Castellà-Roca, Arnau Vives-Guasch, Jan Hajny
      Pages 244-260
    2. Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere
      Pages 261-277
    3. Sherif Saad, Issa Traore
      Pages 278-292
    4. Houari Mahfoud, Abdessamad Imine
      Pages 293-307

About these proceedings

Introduction

This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012.

The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.

Keywords

attacks security protocols social Web threat analysis trust management

Editors and affiliations

  • Joaquin Garcia-Alfaro
    • 1
  • Frédéric Cuppens
    • 2
  • Nora Cuppens-Boulahia
    • 2
  • Ali Miri
    • 3
  • Nadia Tawbi
    • 4
  1. 1.TELECOM SudParisEvryFrance
  2. 2.TELECOM BretagneCesson SévignéFrance
  3. 3.Ryerson UniversityTorontoCanada
  4. 4.Université LavalQuebecCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-37119-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-37118-9
  • Online ISBN 978-3-642-37119-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book