IFIP TC6 Open Digital Library

SEC 2009: Pafos, Cyprus

Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings

Dimitris Gritzalis, Javier Lopez

Springer, IFIP Advances in Information and Communication Technology 297, ISBN: 978-3-642-01243-3



Contents

Identification and Authentication I

Flexible and Transparent User Authentication for Mobile Devices.

Nathan L. Clarke, Sevasti Karatzouni, Steven Furnell

 1-12

Combining Authentication, Reputation and Classification to Make Phishing Unprofitable.

Amir Herzberg

 13-24

Audio CAPTCHA for SIP-Based VoIP.

Yannis Soupionis, George Tountas, Dimitris Gritzalis

 25-38

Threats and Attacks

Roving Bugnet: Distributed Surveillance Threat and Mitigation.

Ryan Farley, Xinyuan Wang

 39-50

On Robust Covert Channels Inside DNS.

Lucas Nussbaum, Pierre Neyron, Olivier Richard

 51-62

Discovering Application-Level Insider Attacks Using Symbolic Execution.

Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer

 63-75

Identification and Authentication II

Custom JPEG Quantization for Improved Iris Recognition Accuracy.

Gerald Stefan Kostmajer, Herbert Stögner, Andreas Uhl

 76-86

On the IPP Properties of Reed-Solomon Codes.

Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo

 87-97

A Generic Authentication LoA Derivation Model.

Li Yao, Ning Zhang

 98-108

Applications of Cryptography and Information Hiding

Media-Break Resistant eSignatures in eGovernment: An Austrian Experience.

Herbert Leitold, Reinhard Posch, Thomas Rössler

 109-118

How to Bootstrap Security for Ad-Hoc Network: Revisited.

Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka

 119-131

Steganalysis of Hydan.

Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros

 132-142

Trusted Computing

On the Impossibility of Detecting Virtual Machine Monitors.

Shay Gueron, Jean-Pierre Seifert

 143-151

Implementation of a Trusted Ticket System.

Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt

 152-163

Security Policies

A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor.

Guillermo Navarro-Arribas, Joaquín García-Alfaro

 164-175

A Policy Language for Modelling Recommendations.

Anas Abou El Kalam, Philippe Balbiani

 176-189

Validation, Verification, Evaluation

On the Security Validation of Integrated Security Solutions.

Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph

 190-201

Verification of Security Policy Enforcement in Enterprise Systems.

Puneet Gupta, Scott D. Stoller

 202-213

Optimization of the Controlled Evaluation of Closed Relational Queries.

Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag

 214-225

Privacy Protection - Security Assessment

Collaborative Privacy - A Community-Based Privacy Infrastructure.

Jan Kolter, Thomas Kernchen, Günther Pernul

 226-236

Security and Privacy Improvements for the Belgian eID Technology.

Pieter Verhaeghe, Jorn Lapon, Bart De Decker, Vincent Naessens, Kristof Verslype

 237-247

A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components.

Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum

 248-258

Role Mining and Content Protection

Mining Stable Roles in RBAC.

Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde

 259-269

Privacy-Preserving Content-Based Publish/Subscribe Networks.

Abdullatif Shikfa, Melek Önen, Refik Molva

 270-282

Broadcast Encryption for Differently Privileged.

Hongxia Jin, Jeffery Lotspiech

 283-293

Ontology-Based Secure XML Content Distribution.

Mohammad Ashiqur Rahaman, Yves Roudier, Philip Miseldine, Andreas Schaad

 294-306

Security Protocols

NGBPA Next Generation BotNet Protocol Analysis.

Felix Leder, Peter Martini

 307-317

Non-repudiation Analysis with LySa.

Mayla Brusò, Agostino Cortesi

 318-329

A Provably Secure Secret Handshake with Dynamic Controlled Matching.

Alessandro Sorniotti, Refik Molva

 330-341

Towards a Theory of White-Box Security.

Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo

 342-352

Access Control

On a Taxonomy of Delegation.

Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson

 353-363

Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.

Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati

 364-375

A Probabilistic Bound on the Basic Role Mining Problem and Its Applications.

Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde

 376-386

Automating Access Control Logics in Simple Type Theory with LEO-II.

Christoph Benzmüller

 387-398

Internet and Web Applications Security

In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security.

Yianna Danidou, Burkhard Schafer

 399-409

Persona: Network Layer Anonymity and Accountability for Next Generation Internet.

Yannis Mallios, Sudeep Modi, Aditya Agarwala, Christina Johns

 410-420

Jason: A Scalable Reputation System for the Semantic Web.

Sandra Steinbrecher, Stephan Groß, Markus Meichau

 421-431

Which Web Browsers Process SSL Certificates in a Standardized Way?

Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri

 432-442