IFIP TC6 Open Digital Library

SEC 2010: Brisbane, Australia

Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

Kai Rannenberg, Vijay Varadharajan, Christian Weber

Springer, IFIP Advances in Information and Communication Technology 330, ISBN: 978-3-642-15256-6



Contents

Kristian Beckman Award Awardee Keynote

The 5 Waves of Information Security - From Kristian Beckman to the Present.

S. H. (Basie) von Solms

 1-8

Security Management

A Business Continuity Management Simulator.

William J. Caelli, Lam-for Kwok, Dennis Longley

 9-18

Mining Business-Relevant RBAC States through Decomposition.

Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde

 19-30

Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study.

Rostyslav Barabanov, Stewart Kowalski

 31-42

Security Management & Governance

Using Actor Network Theory to Understand Information Security Management.

Karin Hedström, Gurpreet Dhillon, Fredrik Karlsson

 43-54

Information Security Governance: When Compliance Becomes More Important than Security.

C. C. Terence Tan, Anthonie B. Ruighaver, Atif Ahmad

 55-67

Network Security & Authentication

Understanding Domain Registration Abuses.

Scott E. Coull, Andrew M. White 0002, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter

 68-79

Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites.

Markus Huber, Martin Mulazzani, Edgar Weippl

 80-89

Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems.

Julian Schütte, Nicolai Kuntze, Andreas Fuchs, Atta Badii

 90-102

Qualified Mobile Server Signature.

Clemens Orthacker, Martin Centner, Christian Kittl

 103-111

Intrusion Detection, Trust Management, and Models

Fraud Detection in ERP Systems Using Scenario Matching.

Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel

 112-123

Use of IP Addresses for High Rate Flooding Attack Detection.

Ejaz Ahmed, George M. Mohay, Alan Tickle, Sajal Bhatia

 124-135

Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information.

Sascha Hauke, Martin Pyka, Markus Borschbach, Dominik Heider

 136-147

Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment.

Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar

 148-160

Software Security and Assurance

A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism.

Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes

 161-172

On-the-fly Inlining of Dynamic Security Monitors.

Jonas Magazinius, Alejandro Russo, Andrei Sabelfeld

 173-186

A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems.

Gideon Myles, Hongxia Jin

 187-202

Evaluation of the Offensive Approach in Information Security Education.

Martin Mink, Rainer Greifeneder

 203-214

Panel

Research Methodologies in Information Security Research: The Road Ahead.

Johan Van Niekerk, Rossouw von Solms

 215-216

Access Control and Privacy

Purpose-Based Access Control Policies and Conflicting Analysis.

Hua Wang, Lili Sun, Vijay Varadharajan

 217-228

Delegation in Predicate Encryption Supporting Disjunctive Queries.

Dongdong Sun, Colin Boyd, Juan Manuel González Nieto

 229-240

Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy.

Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller

 241-252

k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments.

Omar Hasan, Lionel Brunie, Elisa Bertino

 253-264

Privacy

Towards Fair Indictment for Data Collection with Self-Enforcing Privacy.

Mark Stegelmann

 265-276

How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project.

Christian Kahl, Katja Böttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg

 277-288

Performance Analysis of Accumulator-Based Revocation Mechanisms.

Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens

 289-301

Appendix

IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems.

Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous

 302-310