000 04591nam a22005895i 4500
001 978-3-319-11599-3
003 DE-He213
005 20240730172333.0
007 cr nn 008mamaa
008 141006s2014 sz | s |||| 0|eng d
020 _a9783319115993
_9978-3-319-11599-3
024 7 _a10.1007/978-3-319-11599-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecure IT Systems
_h[electronic resource] :
_b19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings /
_cedited by Karin Bernsmed, Simone Fischer-Hübner.
250 _a1st ed. 2014.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2014.
300 _aXII, 296 p. 81 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v8788
505 0 _aAccountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- π-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients' Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied π-Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798-2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication.
520 _aThis book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromsø, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aBiometric identification.
_911407
650 1 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
650 2 4 _aBiometrics.
_932763
700 1 _aBernsmed, Karin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9103139
700 1 _aFischer-Hübner, Simone.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9103141
710 2 _aSpringerLink (Online service)
_9103145
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319115986
776 0 8 _iPrinted edition:
_z9783319116006
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v8788
_9103146
856 4 0 _uhttps://doi.org/10.1007/978-3-319-11599-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c88223
_d88223