Secure IT Systems

18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings

  • Hanne Riis Nielson
  • Dieter Gollmann
Conference proceedings NordSec 2013

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8208)

Table of contents

  1. Front Matter
  2. Cyber-Physical Systems

    1. Alessio Di Mauro, Xenofon Fafoutis, Sebastian Mödersheim, Nicola Dragoni
      Pages 1-16
    2. Roberto Vigo, Alessandro Bruni, Ender Yüksel
      Pages 17-32
    3. Willem Burgers, Roel Verdult, Marko van Eekelen
      Pages 33-50
  3. Security Policies

    1. Tero Hasu, Anya Helene Bagge, Magne Haveraaen
      Pages 51-66
    2. Mike Ter Louw, Phu H. Phung, Rohini Krishnamurti, Venkat N. Venkatakrishnan
      Pages 67-83
  4. Information Flow

    1. Pablo Buiras, Alejandro Russo
      Pages 116-122
  5. Security Experiences

    1. Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson
      Pages 123-138
    2. Tigist Ayalew, Tigist Kidane, Bengt Carlsson
      Pages 139-153
  6. Cyber-Physical Systems

    1. Marina Krotofil, Alvaro A. Cárdenas
      Pages 166-182
    2. Fabian van den Broek, Ronny Wichers Schreur
      Pages 183-198
    3. Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi
      Pages 199-214
  7. Web Security

    1. Thierry Sans, Iliano Cervesato, Soha Hussein
      Pages 215-230
    2. Bastian Braun, Christian v. Pollak, Joachim Posegga
      Pages 231-246
  8. Security Policies

  9. Network Security

    1. Nicolae Paladi, Christian Gehrmann, Fredric Morenius
      Pages 279-296
    2. Nabil Hachem, Joaquin Garcia-Alfaro, Hervé Debar
      Pages 297-312
    3. Ahto Buldas, Andres Kroonmaa, Risto Laanoja
      Pages 313-320
  10. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013.
The 18 revised regular papers together with 3 short papers and one invited talk were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security policies, information flow, security experiences, Web security, and network security.


algorithms anonymity computer networks cryptography distributed systems

Editors and affiliations

  • Hanne Riis Nielson
    • 1
  • Dieter Gollmann
    • 2
  1. 1.Department of Applied Mathematics and Computer ScienceDTU Compute, Technical University of DenmarkLyngbyDenmark
  2. 2.Institut für Sicherheit in verteilten AnwendungenTechnische Universität Hamburg-HarburgHamburgGermany

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-41487-9
  • Online ISBN 978-3-642-41488-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment