Skip to main content
  • Conference proceedings
  • © 2013

Secure IT Systems

18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings

  • Fast track conference proceedings
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8208)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): NordSec: Nordic Conference on Secure IT Systems

Conference proceedings info: NordSec 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

  2. Cyber-Physical Systems

    1. Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

      • Alessio Di Mauro, Xenofon Fafoutis, Sebastian Mödersheim, Nicola Dragoni
      Pages 1-16
    2. Security Games for Cyber-Physical Systems

      • Roberto Vigo, Alessandro Bruni, Ender Yüksel
      Pages 17-32
    3. Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials

      • Willem Burgers, Roel Verdult, Marko van Eekelen
      Pages 33-50
  3. Security Policies

    1. Inferring Required Permissions for Statically Composed Programs

      • Tero Hasu, Anya Helene Bagge, Magne Haveraaen
      Pages 51-66
    2. SafeScript: JavaScript Transformation for Policy Enforcement

      • Mike Ter Louw, Phu H. Phung, Rohini Krishnamurti, Venkat N. Venkatakrishnan
      Pages 67-83
  4. Information Flow

    1. Lazy Programs Leak Secrets

      • Pablo Buiras, Alejandro Russo
      Pages 116-122
  5. Security Experiences

    1. High-Performance Qualified Digital Signatures for X-Road

      • Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson
      Pages 123-138
    2. Identification and Evaluation of Security Activities in Agile Projects

      • Tigist Ayalew, Tigist Kidane, Bengt Carlsson
      Pages 139-153
  6. Cyber-Physical Systems

    1. Resilience of Process Control Systems to Cyber-Physical Attacks

      • Marina Krotofil, Alvaro A. Cárdenas
      Pages 166-182
    2. Femtocell Security in Theory and Practice

      • Fabian van den Broek, Ronny Wichers Schreur
      Pages 183-198
    3. Security Analysis of Building Automation Networks

      • Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi
      Pages 199-214
  7. Web Security

    1. Controlling Data Flow with a Policy-Based Programming Language for the Web

      • Thierry Sans, Iliano Cervesato, Soha Hussein
      Pages 215-230
    2. A Survey on Control-Flow Integrity Means in Web Application Frameworks

      • Bastian Braun, Christian v. Pollak, Joachim Posegga
      Pages 231-246
  8. Security Policies

    1. Incremental Hyperproperty Model Checking via Games

      • Dimiter Milushev, Dave Clarke
      Pages 247-262
  9. Network Security

    1. Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds

      • Nicolae Paladi, Christian Gehrmann, Fredric Morenius
      Pages 279-296

Other Volumes

  1. Secure IT Systems

About this book

This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013. The 18 revised regular papers together with 3 short papers and one invited talk were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security policies, information flow, security experiences, Web security, and network security.

Editors and Affiliations

  • Department of Applied Mathematics and Computer Science, DTU Compute, Technical University of Denmark, Lyngby, Denmark

    Hanne Riis Nielson

  • Institut für Sicherheit in verteilten Anwendungen, Technische Universität Hamburg-Harburg, Hamburg, Germany

    Dieter Gollmann

Bibliographic Information

  • Book Title: Secure IT Systems

  • Book Subtitle: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings

  • Editors: Hanne Riis Nielson, Dieter Gollmann

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-41488-6

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2013

  • Softcover ISBN: 978-3-642-41487-9Published: 09 October 2013

  • eBook ISBN: 978-3-642-41488-6Published: 01 October 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 321

  • Number of Illustrations: 64 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Algorithm Analysis and Problem Complexity

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access