Full Text Documents

Search


Table of Contents
Security and Privacy Protection in Information Processing Systems
Lech J. Janczewski, Henry B.Wolfe, Sujeet Shenoi (Eds.)
Front Matter

Malware


Exploring Timeline-Based Malware Classification
Rafiqul Islam, Irfan Altas, Md. Islam
1-13
Screening Smartphone Applications Using Behavioral Signatures
Suyeon Lee, Jehyun Lee, Heejo Lee
14-27
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention
Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mengmeng Ge
28-41

Authentication and Authorization


Evolving a Secure Internet
William Caelli, Lam-For Kwok, Dennis Longley
42-54
Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones
Yuxin Meng, Wenjuan Li, Lam-For Kwok
55-68
Applying DAC Principles to the RDF Graph Data Model
Sabrina Kirrane, Alessandra Mileo, Stefan Decker
69-82
A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error
Thang Hoang, Deokjai Choi, Viet Vo, Anh Nguyen, Thuc Nguyen
83-101
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes
102-110

Network Security/ Cryptography


Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation
Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig
111-124
Key Derivation Function: The SCKDF Scheme
Chai Chuah, Edward Dawson, Leonie Simpson
125-138
Sustainable Pseudo-random Number Generator
Huafei Zhu, Wee-Siong Ng, See-Kiong Ng
139-147

Software Security


Improving Mobile Device Security with Operating System-Level Virtualization
Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert
148-161
Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation
Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath
162-175
An Empirical Evaluation of the Android Security Framework
Alessandro Armando, Alessio Merlo, Luca Verderame
176-189
A Security Engineering Process Approach for the Future Development of Complex Aircraft Cabin Systems
Hartmut Hintze, Benjamin Wiegraefe, Ralf God
190-202
Mobile Device Encryption Systems
Peter Teufl, Thomas Zefferer, Christof Stromberger
203-216
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation
Vrizlynn Thing, Zheng-Leong Chua
217-230
Program Transformation for Non-interference Verification on Programs with Pointers
Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel
231-244

Policy Compliance and Obligations


A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System
Ezzat Alqurashi, Gary Wills, Lester Gilbert
245-256
A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance
Teodor Sommestad, Jonas Hallberg
257-271

Privacy Protection


Enforcement of Privacy Requirements
Padmanabhan Krishnan, Kostyantyn Vorobyov
272-285
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions
Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar Weippl
286-299
On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud
Bernd Zwattendorfer, Daniel Slamanig
300-314

Risk Analysis and Security Metrics


Using the Conflicting Incentives Risk Analysis Method
Lisa Rajbhandari, Einar Snekkenes
315-329
Performance Analysis of Scalable Attack Representation Models
Jin Hong, Dong Kim
330-343
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy
Chris Simmons, Sajjan Shiva, Harkeerat Bedi, Vivek Shandilya
344-365

Social Engineering


Phishing for the Truth: A Scenario-Based Experiment of Users’ Behavioural Response to Emails
Kathryn Parsons, Agata Mccormac, Malcolm Pattinson, Marcus Butavicius, Cate Jerram
366-378
Phishing and Organisational Learning
Wayne Kearney, Hennie Kruger
379-390
A Case for Societal Digital Security Culture
Lotfi Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat Bhargava, Mohd Mohamad
391-404

Security Management/Forensic


Secure Outsourcing: An Investigation of the Fit between Clients and Providers
Gurpreet Dhillon, Romilla Chowdhuri, Filipe Sá-Soares
405-418
Performance Analysis of File Carving Tools
Thomas Laurenson
419-433

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/