SEC 2008:
Milano,
Italy
 Sushil Jajodia, Pierangela Samarati, Stelvio Cimato (Eds.):
Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy.
IFIP 278 Springer 2008, ISBN 978-0-387-09698-8  
  
  
  
  
 
Privacy Protection
 
Web Applications Security and Malware
 
Sensor and Wireless Security
 
Security Policies
 
Access Control in Distributed Systems
 
Intrusion Detection
 
Anomaly Detection
 
Role Mining and Content Protection
 
VOIP and Network Security
 
Network Devices Security and Cyber Warfare
 
Security Compliance
 
Risk and Security Analysis
 
Identity and Trust Management
 
Virtualization and Digital Forensics
 
Short Papers
 
- Jeheon Han, Jonghoon Kwon, Heejo Lee:
 HoneyID : Unveiling Hidden Spywares by Generating Bogus Events.
669-673
             
- Nouha Oualha, Melek Önen, Yves Roudier:
 A Security Protocol for Self-Organizing Data Storage.
675-679
             
- Cormac Herley, Dinei A. F. Florêncio:
 Protecting Financial Institutions from Brute-Force Attacks.
681-685
             
- Shaun Posthumus, Rossouw von Solms:
 Agency Theory: Can it be Used to Strengthen IT Governance?.
687-691
             
- Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
 A new Accounting Mechanism for Modern and Future AAA Services.
693-697
             
- Yasuhiro Fujihara, Yuko Murayama, Kentarou Yamaguchi:
 A user survey on the sense of security, Anshin.
699-703
             
- Po-Yuan Teng, Shih-I Huang, Adrian Perrig:
 Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks.
705-709
             
- Giorgio Davanzo, Eric Medvet, Alberto Bartoli:
 A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection.
711-716
             
- Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López, Antonio F. Gómez-Skarmeta:
 Managing the lifecycle of XACML delegation policies in federated environments.
717-721
             
- George O. M. Yee, Larry Korba, Ronggong Song:
 Assessing the Likelihood of Privacy Policy Compliance.
723-727
             
- Salem Benferhat, Karim Tabia:
 Classification features for detecting Server-side and Client-side Web attacks.
729-733
             
Copyright © Sun Mar 14 23:24:00 2010
 by Michael Ley (ley@uni-trier.de)