Advertisement

© 2009

iNetSec 2009 – Open Research Problems in Network Security

IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers

  • Jan Camenisch
  • Dogan Kesdogan
Conference proceedings

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 309)

Table of contents

  1. Front Matter
  2. Involving Humans

    1. Raphael C. -W. Phan, John N. Whitley, David J. Parish
      Pages 1-8
    2. Carlos Javier Hernandez-Castro, Arturo Ribagorda
      Pages 9-26
  3. Web 2.0

    1. Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe
      Pages 27-36
    2. San-Tsai Sun, Konstantin Beznosov
      Pages 37-51
  4. Protecting Resources

    1. Manuel Egele, Engin Kirda, Christopher Kruegel
      Pages 52-62
    2. Michael Kirkpatrick, Elisa Bertino
      Pages 63-75
  5. Pervasive Devices

    1. Erik-Oliver Blass, Refik Molva
      Pages 76-84
    2. Erik-Oliver Blass, Martina Zitterbart
      Pages 85-92
  6. Protocol Security

    1. Christian Cachin
      Pages 93-94
    2. Roel Peeters, Markulf Kohlweiss, Bart Preneel
      Pages 111-124
  7. Privacy

    1. Vincent Naessens, Mehmet Tahir Sandikkaya, Jorn Lapon, Kristof Verslype, Pieter Verhaeghe, Girma Nigusse et al.
      Pages 125-138
    2. Craig Asher, Jean-Philippe Aumasson, Raphael C. -W. Phan
      Pages 139-148
    3. Dang Vinh Pham, Joss Wright
      Pages 149-168
  8. Back Matter

About these proceedings

Introduction

This book constitutes the refereed post conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2009, held in Zurich, Switzerland, in April 2009.

The 14 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on involving humans; Web 2.0; protecting resources; pervasive devices; protocol security; and privacy.

Keywords

CAPTCHA access control address space randomization anomaly detection anonymity metrics authentication biometric browser security buffer overflow code-injection drive-by download attacks human-involved networks implement privacy security

Editors and affiliations

  • Jan Camenisch
    • 1
  • Dogan Kesdogan
    • 2
  1. 1.IBM Research - ZurichRüschlikonSwitzerland
  2. 2.Institut für WirtschaftsinformatikUniversität SiegenSiegenGermany

Bibliographic information

Industry Sectors
Automotive
Biotechnology
IT & Software
Telecommunications
Consumer Packaged Goods
Pharma
Materials & Steel
Finance, Business & Banking
Electronics
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering

Reviews

From the reviews:

“The iNetSec conference papers collected in this book focus on the discussion of open research problems. … this review focuses on the papers selected in 2009. However, the contents of these papers are still very relevant. … This conference provides a thought-provoking international platform for intellectuals interested in the network security problems of tomorrow.” (Phoram Mehta, ACM Computing Reviews, August, 2010)