Information Security and Privacy Research

27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings

  • Dimitris Gritzalis
  • Steven Furnell
  • Marianthi Theoharidou

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 376)

Table of contents

  1. Front Matter
  2. Attacks and Malicious Code

    1. Michael Roland, Josef Langer, Josef Scharinger
      Pages 1-12
    2. Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame
      Pages 13-24
    3. Guillaume Barbu, Christophe Giraud, Vincent Guerin
      Pages 37-48
  3. Security Architectures

    1. Sofia Anna Menesidou, Vasilios Katos
      Pages 49-60
    2. Andreas Leicher, Andreas U. Schmidt, Yogendra Shah
      Pages 75-86
    3. David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu
      Pages 87-102
  4. System Security

    1. Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis
      Pages 103-114
    2. Baozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He
      Pages 115-125
    3. Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen
      Pages 126-137
    4. Feifei Wang, Ping Chen, Bing Mao, Li Xie
      Pages 138-149
  5. Access Control

    1. John C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep S. Vaidya
      Pages 150-161
    2. Ruben Rios, Jose A. Onieva, Javier Lopez
      Pages 162-173
    3. Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Tarik Moataz, Xavier Rimasson
      Pages 174-186
    4. Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo
      Pages 187-198
  6. Database Security

    1. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
      Pages 199-210
    2. Weihan Li, Brajendra Panda, Qussai Yaseen
      Pages 211-222
  7. Privacy Attitudes and Properties

    1. George Drosatos, Aimilia Tasidou, Pavlos S. Efraimidis
      Pages 223-234

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.

Keywords

Web authentication botnet cryptanalysis phishing smart cards

Editors and affiliations

  • Dimitris Gritzalis
    • 1
  • Steven Furnell
    • 2
  • Marianthi Theoharidou
    • 1
  1. 1.Department of Informatics, Information Security and Critical Infrastructure Protection Research GroupAthens University of Economics and BusinessAthensGreece
  2. 2.School of Computing Communications and ElectronicsUniversity of PlymouthPlymouthUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-30436-1
  • Copyright Information IFIP International Federation for Information Processing 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-30435-4
  • Online ISBN 978-3-642-30436-1
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1861-2288
  • About this book