Advertisement

Information Security and Privacy Research

27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings

  • Dimitris Gritzalis
  • Steven Furnell
  • Marianthi Theoharidou

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 376)

Table of contents

  1. Front Matter
  2. Attacks and Malicious Code

    1. Michael Roland, Josef Langer, Josef Scharinger
      Pages 1-12
    2. Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame
      Pages 13-24
    3. Guillaume Barbu, Christophe Giraud, Vincent Guerin
      Pages 37-48
  3. Security Architectures

    1. Sofia Anna Menesidou, Vasilios Katos
      Pages 49-60
    2. Andreas Leicher, Andreas U. Schmidt, Yogendra Shah
      Pages 75-86
    3. David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu
      Pages 87-102
  4. System Security

    1. Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis
      Pages 103-114
    2. Baozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He
      Pages 115-125
    3. Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen
      Pages 126-137
    4. Feifei Wang, Ping Chen, Bing Mao, Li Xie
      Pages 138-149
  5. Access Control

    1. John C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep S. Vaidya
      Pages 150-161
    2. Ruben Rios, Jose A. Onieva, Javier Lopez
      Pages 162-173
    3. Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Tarik Moataz, Xavier Rimasson
      Pages 174-186
    4. Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo
      Pages 187-198
  6. Database Security

    1. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
      Pages 199-210
    2. Weihan Li, Brajendra Panda, Qussai Yaseen
      Pages 211-222
  7. Privacy Attitudes and Properties

    1. George Drosatos, Aimilia Tasidou, Pavlos S. Efraimidis
      Pages 223-234
    2. Christian Banse, Dominik Herrmann, Hannes Federrath
      Pages 235-248
    3. Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis
      Pages 249-260
  8. Social Networks and Social Engineering

    1. Shuhao Li, Xiaochun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang
      Pages 261-272
    2. Giampaolo Bella, Lizzie Coles-Kemp
      Pages 273-286
  9. Applied Cryptography, Anonymity and Trust

  10. Usable Security

  11. Security and Trust Models

    1. Olga Gadyatskaya, Fabio Massacci, Anton Philippov
      Pages 364-375
    2. Hyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In
      Pages 376-387
    3. Yulong Zhang, Min Li, Kun Bai, Meng Yu, Wanyu Zang
      Pages 388-399
    4. Han Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu
      Pages 400-411
  12. Security Economics

    1. Giuseppe D’Acquisto, Marta Flamini, Maurizio Naldi
      Pages 412-423
    2. Yolanta Beres, Jonathan Griffin
      Pages 424-442
    3. Marianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis
      Pages 443-456
    4. Ronald Dodge, Kathryn Coronges, Ericka Rovira
      Pages 457-464
  13. Authentication and Delegation

    1. Hataichanok Saevanee, Nathan L. Clarke, Steven M. Furnell
      Pages 465-474
    2. Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis
      Pages 475-488
    3. Shaoying Cai, Yingjiu Li, Yunlei Zhao
      Pages 501-512
    4. Vrizlynn L. L. Thing, Hwei-Ming Ying
      Pages 513-524
  14. Short Papers

    1. Sarah Nait-Bahloul, Emmanuel Coquery, Mohand-Saïd Hacid
      Pages 525-530
    2. Ioannis Psaroudakis, Vasilios Katos, Pavlos S. Efraimidis
      Pages 543-548
    3. Milica Milutinovic, Vincent Naessens, Bart De Decker
      Pages 555-560
    4. Yannis Soupionis, Miltiadis Kandias
      Pages 561-566

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.

Keywords

Web authentication botnet cryptanalysis phishing smart cards

Editors and affiliations

  • Dimitris Gritzalis
    • 1
  • Steven Furnell
    • 2
  • Marianthi Theoharidou
    • 1
  1. 1.Department of Informatics, Information Security and Critical Infrastructure Protection Research GroupAthens University of Economics and BusinessAthensGreece
  2. 2.School of Computing Communications and ElectronicsUniversity of PlymouthPlymouthUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-30436-1
  • Copyright Information IFIP International Federation for Information Processing 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-30435-4
  • Online ISBN 978-3-642-30436-1
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1861-2288
  • Buy this book on publisher's site