Image from Google Jackets

Secure IT systems [electronic resource] : 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31-November 2, 2012 : proceedings / Audun J?sang, Bengt Carlsson (eds.).

By: Contributor(s): Material type: TextTextSeries: EBSCOhost Collections | Lecture notes in computer science ; 7617. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Heidelberg ; New York : Springer, c2012Description: 1 online resource (x, 246 p.) : ill. (some col.)ISBN:
  • 9783642342103 (electronic bk.)
  • 3642342108 (electronic bk.)
Subject(s): Genre/Form: Additional physical formats: Print version:: Secure IT systems.DDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 N67 2012
Online resources:
Contents:
Application security. Designed to fail: a USB-connected reader for online banking / Arjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, and Roel Verdult -- Security add-ons for mobile platforms / Benjamin Adolphi and Hanno Langweg -- THAPS: automated vulnerability scanning of PHP applications / Torben Jensen, Heine Pedersen, Mads Chr. Olesen, and Ren?e Rydhof Hansen -- Security management. Cyber security exercises and competitions as a platform for cyber security experiments / Teodor somestad and Jonas Hallberg -- The development of cyber security warning, advice and report points / Tony Proctor -- Towards an empirical examination of IT security infrastructures in SME / Ramona Groner and Philipp Brune -- How to select a security requirements method? A comparative study with students and practitioners / Fabio Massacci and Fedrica Paci -- System security. There is safety in numbers: preventing control-flow hijacking by duplication / Job Noorman, Nick Nikiforackis, and Frank Piessens -- coinductive unwinding of security-relevant hyperproperties / Dimiter Milshev and Dave Clarke -- Retooling and securing systematic debugging / Bj?orn St?ahl and Per Mellstrand -- Network security. Cracking associative passwords / Kirsi Helkala, Nils Kalstad Svendsen, Per Thorsheim, and Anders Wiehe / A hybrid approach for highly available and secure storage of pseudo-SSO credentials / Jan Zibuschka and Lothar Fritsch -- Assessing the quality of packet-level traces collected on Internet backbone links / Behrooz Sangchoolie, Mazdak Rajabi Nasab, Tomas Olobsson, and Wolfgang John -- Trust management. Everything but the kitchen sink: determining the effect of multiple attacks on privacy preservintg technology users / Jason W. Clark -- Can we identify manipulative behavior and the corresponding suspects on review websites using supervised learning? / Huiying Duan and C?acilia Zirn -- Privacy-friendly cloud storage for the data track: an educational transparency tool / Tobias Pulls.
Summary: This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Description based on print version record.

Includes bibliographical references and author index.

Application security. Designed to fail: a USB-connected reader for online banking / Arjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, and Roel Verdult -- Security add-ons for mobile platforms / Benjamin Adolphi and Hanno Langweg -- THAPS: automated vulnerability scanning of PHP applications / Torben Jensen, Heine Pedersen, Mads Chr. Olesen, and Ren?e Rydhof Hansen -- Security management. Cyber security exercises and competitions as a platform for cyber security experiments / Teodor somestad and Jonas Hallberg -- The development of cyber security warning, advice and report points / Tony Proctor -- Towards an empirical examination of IT security infrastructures in SME / Ramona Groner and Philipp Brune -- How to select a security requirements method? A comparative study with students and practitioners / Fabio Massacci and Fedrica Paci -- System security. There is safety in numbers: preventing control-flow hijacking by duplication / Job Noorman, Nick Nikiforackis, and Frank Piessens -- coinductive unwinding of security-relevant hyperproperties / Dimiter Milshev and Dave Clarke -- Retooling and securing systematic debugging / Bj?orn St?ahl and Per Mellstrand -- Network security. Cracking associative passwords / Kirsi Helkala, Nils Kalstad Svendsen, Per Thorsheim, and Anders Wiehe / A hybrid approach for highly available and secure storage of pseudo-SSO credentials / Jan Zibuschka and Lothar Fritsch -- Assessing the quality of packet-level traces collected on Internet backbone links / Behrooz Sangchoolie, Mazdak Rajabi Nasab, Tomas Olobsson, and Wolfgang John -- Trust management. Everything but the kitchen sink: determining the effect of multiple attacks on privacy preservintg technology users / Jason W. Clark -- Can we identify manipulative behavior and the corresponding suspects on review websites using supervised learning? / Huiying Duan and C?acilia Zirn -- Privacy-friendly cloud storage for the data track: an educational transparency tool / Tobias Pulls.

This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management.

Powered by Koha