SEC 2008:
Milano,
Italy
Sushil Jajodia, Pierangela Samarati, Stelvio Cimato (Eds.):
Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy.
IFIP 278 Springer 2008, ISBN 978-0-387-09698-8
Privacy Protection
Web Applications Security and Malware
Sensor and Wireless Security
Security Policies
Access Control in Distributed Systems
Intrusion Detection
Anomaly Detection
Role Mining and Content Protection
VOIP and Network Security
Network Devices Security and Cyber Warfare
Security Compliance
Risk and Security Analysis
Identity and Trust Management
Virtualization and Digital Forensics
Short Papers
- Jeheon Han, Jonghoon Kwon, Heejo Lee:
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events.
669-673
- Nouha Oualha, Melek Önen, Yves Roudier:
A Security Protocol for Self-Organizing Data Storage.
675-679
- Cormac Herley, Dinei A. F. Florêncio:
Protecting Financial Institutions from Brute-Force Attacks.
681-685
- Shaun Posthumus, Rossouw von Solms:
Agency Theory: Can it be Used to Strengthen IT Governance?.
687-691
- Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
A new Accounting Mechanism for Modern and Future AAA Services.
693-697
- Yasuhiro Fujihara, Yuko Murayama, Kentarou Yamaguchi:
A user survey on the sense of security, Anshin.
699-703
- Po-Yuan Teng, Shih-I Huang, Adrian Perrig:
Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks.
705-709
- Giorgio Davanzo, Eric Medvet, Alberto Bartoli:
A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection.
711-716
- Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López, Antonio F. Gómez-Skarmeta:
Managing the lifecycle of XACML delegation policies in federated environments.
717-721
- George O. M. Yee, Larry Korba, Ronggong Song:
Assessing the Likelihood of Privacy Policy Compliance.
723-727
- Salem Benferhat, Karim Tabia:
Classification features for detecting Server-side and Client-side Web attacks.
729-733
Copyright © Sun Mar 14 23:24:00 2010
by Michael Ley (ley@uni-trier.de)