Advertisement

ICT Systems Security and Privacy Protection

29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings

  • Nora Cuppens-Boulahia
  • Frédéric Cuppens
  • Sushil Jajodia
  • Anas Abou El Kalam
  • Thierry Sans

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 428)

Table of contents

  1. Front Matter
  2. Intrusion Detection

    1. Nizar Kheir, Frédéric Tran, Pierre Caron, Nicolas Deschamps
      Pages 1-14
    2. Andrew Fielder, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi
      Pages 15-29
    3. Marco Rocchetto, Martín Ochoa, Mohammad Torabi Dashti
      Pages 30-43
    4. Ibnu Mubarok, Kiryong Lee, Sihyung Lee, Heejo Lee
      Pages 44-51
  3. Data Security

    1. Mikhail Strizhov, Indrajit Ray
      Pages 52-65
    2. Mee Loong Yang, Adnan Al Anbuky, William Liu
      Pages 66-79
    3. Thomas Bourgeat, Julien Bringer, Hervé Chabanne, Robin Champenois, Jérémie Clément, Houda Ferradi et al.
      Pages 80-90
    4. Andrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann
      Pages 91-98
  4. Mobile Security

    1. Hataichanok Saevanee, Nathan Clarke, Steven Furnell, Valerio Biscione
      Pages 99-112
    2. Bastian Braun, Johannes Koestler, Joachim Posegga, Martin Johns
      Pages 127-141
    3. Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie
      Pages 142-155
  5. Privacy I

    1. Zacharias Tzermias, Vassilis Prevelakis, Sotiris Ioannidis
      Pages 156-168
    2. Qasim Mahmood Rajpoot, Christian Damsgaard Jensen
      Pages 169-184
    3. Guojun Qin, Constantinos Patsakis, Mélanie Bouroche
      Pages 185-196
    4. Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri
      Pages 197-204
  6. Metrics and Risk Assessment

  7. Information Flow Control

    1. Bastian Braun, Caspar Gries, Benedikt Petschkuhn, Joachim Posegga
      Pages 264-277
  8. Identity Management

    1. Kévin Atighehchi, Alexis Bonnecaze, Traian Muntean
      Pages 293-306
    2. Miaomiao Tian, Liusheng Huang
      Pages 321-329
    3. Yair H. Diaz-Tellez, Eliane L. Bodanese, Theo Dimitrakos, Michael Turner
      Pages 330-338
  9. Identifiability and Decision Making

    1. Nor Athiyah Abdullah, Dai Nishioka, Yuko Tanaka, Yuko Murayama
      Pages 359-365
  10. Malicious Behavior and Fraud

    1. Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula
      Pages 366-379
    2. Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero
      Pages 380-394
    3. Şerif Bahtiyar, Gürkan Gür, Levent Altay
      Pages 395-402
  11. Organizational Security

    1. Andreas Put, Italo Dacosta, Milica Milutinovic, Bart De Decker
      Pages 403-416
    2. Gurpreet Dhillon, Romilla Chowdhuri, Cristiane Pedron
      Pages 431-437
    3. Theodoros Spyridopoulos, Ioanna-Aikaterini Topa, Theo Tryfonas, Maria Karyda
      Pages 438-445
  12. Privacy II

    1. Jaap-Henk Hoepman
      Pages 446-459
    2. Alberto Blanco, Josep Domingo-Ferrer, Oriol Farràs, David Sánchez
      Pages 460-470
    3. Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak F. Shahandashti
      Pages 471-484
    4. Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens
      Pages 485-492
  13. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised full papers and 14 short papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on intrusion detection, data security, mobile security, privacy, metrics and risk assessment, information flow control, identity management, identifiability and decision making, malicious behavior and fraud and organizational security.

Keywords

data security database security identity management information flow control information security intrusion detection mobile security network security organizational security privacy risk assessment security services

Editors and affiliations

  • Nora Cuppens-Boulahia
    • 1
  • Frédéric Cuppens
    • 1
  • Sushil Jajodia
    • 2
  • Anas Abou El Kalam
    • 3
  • Thierry Sans
    • 4
  1. 1.Télécom Bretagne (Campus Rennes)Cesson SévignéFrance
  2. 2.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  3. 3.École Nationale des Sciences AppliquéesUniversité Cadi AyyadMarrakechMorocco
  4. 4.Carnegie Mellon UniversityDohaQatar

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-55415-5
  • Copyright Information IFIP International Federation for Information Processing 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-55414-8
  • Online ISBN 978-3-642-55415-5
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering