Advertisement

Foundations and Practice of Security

7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers

  • Frédéric Cuppens
  • Joaquin Garcia-Alfaro
  • Nur Zincir Heywood
  • Philip W. L. Fong

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8930)

Also part of the Security and Cryptology book sub series (LNSC, volume 8930)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Attacks and Vulnerabilities

    1. Front Matter
      Pages 1-1
    2. Brent Carrara, Carlisle Adams
      Pages 3-16
  3. Privacy

    1. Front Matter
      Pages 33-33
    2. Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch
      Pages 49-64
  4. Software Security and Malware Analysis

    1. Front Matter
      Pages 83-83
    2. Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Hervé Chabanne, Maxime Puys
      Pages 92-111
    3. Guillaume Bonfante, Jean-Yves Marion, Thanh Dinh Ta
      Pages 112-128
  5. Network Security and Protocols

    1. Front Matter
      Pages 129-129
    2. Myria Bouhaddi, Mohammed Saïd Radjef, Kamel Adi
      Pages 131-146
    3. Diego A. Ortiz-Yepes
      Pages 147-167
    4. Serguei A. Mokhov, Michael J. Assels, Joey Paquet, Mourad Debbabi
      Pages 168-183
  6. Access Control Models and Policy Analysis

  7. Protocol Verification

    1. Front Matter
      Pages 237-237
    2. Fabio Martinelli, Francesco Santini
      Pages 239-246
    3. Ali Kassem, Pascal Lafourcade, Yassine Lakhnech
      Pages 247-261
    4. Raphaël Jamet, Pascal Lafourcade
      Pages 262-276
  8. Cryptographic Technologies

    1. Front Matter
      Pages 277-277
    2. Wen Wen, Binod Vaidya, Dimitrios Makrakis, Carlisle Adams
      Pages 279-293
    3. Peeter Laud, Jan Willemson
      Pages 294-310
  9. Short Papers

    1. Front Matter
      Pages 327-327
    2. Fariba Haddadi, A. Nur Zincir-Heywood
      Pages 329-336
    3. Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana Cavalli
      Pages 337-346
    4. Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray
      Pages 347-355
    5. Sachini Weerawardhana, Subhojeet Mukherjee, Indrajit Ray, Adele Howe
      Pages 356-366
    6. Mohamed H.E. Aouadi, Khalifa Toumi, Ana Cavalli
      Pages 367-374
  10. Back Matter
    Pages 375-375

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on privacy; software security and malware analysis; network security and protocols; access control models and policy analysis; protocol verification; and cryptographic technologies.

Keywords

Access control Attacks Computer security Cryptography Encryption Formal verification Malware Network security Privacy management Secret sharing Security and privacy Security protocols Security services Software security intrusion detection

Editors and affiliations

  • Frédéric Cuppens
    • 1
  • Joaquin Garcia-Alfaro
    • 2
  • Nur Zincir Heywood
    • 3
  • Philip W. L. Fong
    • 4
  1. 1.TELECOM BretagneCesson SévignéFrance
  2. 2.TELECOM SudParisEvryFrance
  3. 3.Dalhousie UniversityHalifaxCanada
  4. 4.University of CalgaryCalgaryCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-17040-4
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-17039-8
  • Online ISBN 978-3-319-17040-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace