index - Security and Privacy Protection in Information Processing Systems Access content directly
   


Full Text Documents

31

Search


Table of Contents
Security and Privacy Protection in Information Processing Systems
Lech J. Janczewski, Henry B.Wolfe, Sujeet Shenoi (Eds.)
Front Matter

Malware


Exploring Timeline-Based Malware Classification
Rafiqul Islam, Irfan Altas, Md. Islam
1-13
Screening Smartphone Applications Using Behavioral Signatures
Suyeon Lee, Jehyun Lee, Heejo Lee
14-27
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention
Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mengmeng Ge
28-41

Authentication and Authorization


Evolving a Secure Internet
William Caelli, Lam-For Kwok, Dennis Longley
42-54
Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones
Yuxin Meng, Wenjuan Li, Lam-For Kwok
55-68
Applying DAC Principles to the RDF Graph Data Model
Sabrina Kirrane, Alessandra Mileo, Stefan Decker
69-82
A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error
Thang Hoang, Deokjai Choi, Viet Vo, Anh Nguyen, Thuc Nguyen
83-101
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes
102-110

Network Security/ Cryptography


Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation
Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig
111-124
Key Derivation Function: The SCKDF Scheme
Chai Chuah, Edward Dawson, Leonie Simpson
125-138
Sustainable Pseudo-random Number Generator
Huafei Zhu, Wee-Siong Ng, See-Kiong Ng
139-147

Software Security


Improving Mobile Device Security with Operating System-Level Virtualization
Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert
148-161
Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation
Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath
162-175
An Empirical Evaluation of the Android Security Framework
Alessandro Armando, Alessio Merlo, Luca Verderame
176-189
A Security Engineering Process Approach for the Future Development of Complex Aircraft Cabin Systems
Hartmut Hintze, Benjamin Wiegraefe, Ralf God
190-202
Mobile Device Encryption Systems
Peter Teufl, Thomas Zefferer, Christof Stromberger
203-216
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation
Vrizlynn Thing, Zheng-Leong Chua
217-230
Program Transformation for Non-interference Verification on Programs with Pointers
Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel
231-244

Policy Compliance and Obligations


A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System
Ezzat Alqurashi, Gary Wills, Lester Gilbert
245-256
A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance
Teodor Sommestad, Jonas Hallberg
257-271

Privacy Protection


Enforcement of Privacy Requirements
Padmanabhan Krishnan, Kostyantyn Vorobyov
272-285
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions
Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar Weippl
286-299
On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud
Bernd Zwattendorfer, Daniel Slamanig
300-314

Risk Analysis and Security Metrics


Using the Conflicting Incentives Risk Analysis Method
Lisa Rajbhandari, Einar Snekkenes
315-329
Performance Analysis of Scalable Attack Representation Models
Jin Hong, Dong Kim
330-343
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy
Chris Simmons, Sajjan Shiva, Harkeerat Bedi, Vivek Shandilya
344-365

Social Engineering


Phishing for the Truth: A Scenario-Based Experiment of Users’ Behavioural Response to Emails
Kathryn Parsons, Agata Mccormac, Malcolm Pattinson, Marcus Butavicius, Cate Jerram
366-378
Phishing and Organisational Learning
Wayne Kearney, Hennie Kruger
379-390
A Case for Societal Digital Security Culture
Lotfi Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat Bhargava, Mohd Mohamad
391-404

Security Management/Forensic


Secure Outsourcing: An Investigation of the Fit between Clients and Providers
Gurpreet Dhillon, Romilla Chowdhuri, Filipe Sá-Soares
405-418
Performance Analysis of File Carving Tools
Thomas Laurenson
419-433

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/