Advertisement

ICT Systems Security and Privacy Protection

30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings

  • Hannes Federrath
  • Dieter Gollmann

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 455)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Privacy

    1. Front Matter
      Pages 1-1
    2. Aydin Abadi, Sotirios Terzis, Changyu Dong
      Pages 3-17
    3. Josep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia
      Pages 18-34
    4. Esra Erdin, Eric Klukovich, Gurhan Gunduz, Mehmet Hadi Gunes
      Pages 51-66
    5. Wojciech Jamroga, Masoud Tabatabaei
      Pages 67-81
    6. Jaber Karimpour, Ayaz Isazadeh, Ali A. Noroozi
      Pages 82-93
  3. Web Security

    1. Front Matter
      Pages 95-95
    2. Chetan Bansal, Sören Preibusch, Natasa Milic-Frayling
      Pages 97-111
    3. Jinwei Hu, Heiko Mantel, Sebastian Ruhleder
      Pages 112-125
    4. Amrit Kumar, Cédric Lauradoux
      Pages 126-141
  4. Access Control, Trust and Identity Management

    1. Front Matter
      Pages 143-143
    2. Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford
      Pages 159-173
    3. Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri
      Pages 174-188
    4. Mohsen Rezvani, Mohammad Allahbakhsh, Lorenzo Vigentini, Aleksandar Ignjatovic, Sanjay Jha
      Pages 189-203
    5. Timothy J. Carbino, Michael A. Temple, Juan Lopez Jr.
      Pages 204-217
    6. Salvador Martínez, Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot
      Pages 218-233
  5. Network Security

    1. Front Matter
      Pages 235-235
    2. Simão Reis, André Zúquete, Carlos Faneca, José Vieira
      Pages 237-251
    3. Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro, Dingqi Yang
      Pages 252-266
    4. Christoph Pohl, Alf Zugenmaier, Michael Meier, Hans-Joachim Hof
      Pages 267-280
  6. Security Management and Human Aspects of Security

    1. Front Matter
      Pages 281-281
    2. Lena Connolly, Michael Lang, J. D. Tygar
      Pages 283-296
    3. Fredrik Karlsson, Göran Goldkuhl, Karin Hedström
      Pages 297-310
    4. Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Saša Radomirović, Rolando Trujillo-Rasua
      Pages 339-353
    5. David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri
      Pages 354-368
  7. Software Security

    1. Front Matter
      Pages 369-369
    2. Enrico Lovat, Alexander Fromm, Martin Mohr, Alexander Pretschner
      Pages 371-385
    3. Quoc Huy Do, Richard Bubel, Reiner Hähnle
      Pages 401-415
    4. Zhijiao Zhang, Yashuai Lü, Yu Chen, Yongqiang Lü, Yuanchun Shi
      Pages 431-445
    5. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
      Pages 446-459
  8. Applied Cryptography

    1. Front Matter
      Pages 461-461
    2. Wouter Lueks, Gergely Alpár, Jaap- Henk Hoepman, Pim Vullers
      Pages 463-478
    3. Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong, Isao Echizen
      Pages 479-494
    4. Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan
      Pages 495-509
  9. Mobile and Cloud Services Security

    1. Front Matter
      Pages 511-511
    2. Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon
      Pages 513-527
    3. Francisco Vigário, Miguel Neto, Diogo Fonseca, Mário M. Freire, Pedro R. M. Inácio
      Pages 528-541
    4. Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang
      Pages 542-556
    5. Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah
      Pages 557-570
    6. Konstantin Knorr, David Aspinall, Maria Wolters
      Pages 571-584
    7. Alevtina Dubovitskaya, Visara Urovi, Matteo Vasirani, Karl Aberer, Michael I. Schumacher
      Pages 585-598
  10. Cyber-physical Systems and Critical Infrastructures Security

    1. Front Matter
      Pages 599-599
    2. Konstantinos Maraslis, Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mo Haghighi
      Pages 601-615

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.

Keywords

Access control Attack trees Authentication Cloud security Critical infrastructures Cryptography Cyber-physical systems Honey networks Identity management Mobile security Network security Password security Privacy enhancing technologies Software security Trust management Web application security

Editors and affiliations

  • Hannes Federrath
    • 1
  • Dieter Gollmann
    • 2
  1. 1.Universität HamburgHamburgGermany
  2. 2.Technische Universität Hamburg-HarburgHamburgGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-18467-8
  • Copyright Information IFIP International Federation for Information Processing 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-18466-1
  • Online ISBN 978-3-319-18467-8
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site