000 04261nam a22005295i 4500
001 978-3-319-11599-3
003 DE-He213
005 20200421112040.0
007 cr nn 008mamaa
008 141006s2014 gw | s |||| 0|eng d
020 _a9783319115993
_9978-3-319-11599-3
024 7 _a10.1007/978-3-319-11599-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
245 1 0 _aSecure IT Systems
_h[electronic resource] :
_b19th Nordic Conference, NordSec 2014, Troms�, Norway, October 15-17, 2014, Proceedings /
_cedited by Karin Bernsmed, Simone Fischer-H�ubner.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2014.
300 _aXII, 296 p. 81 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8788
505 0 _aAccountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- (Ss(B-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients' Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied (Ss(B-Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798-2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication.
520 _aThis book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Troms�, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.
650 0 _aComputer science.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 0 _aBiometrics (Biology).
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aData Encryption.
650 2 4 _aBiometrics.
700 1 _aBernsmed, Karin.
_eeditor.
700 1 _aFischer-H�ubner, Simone.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319115986
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8788
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-11599-3
912 _aZDB-2-SCS
912 _aZDB-2-LNC
942 _cEBK
999 _c56596
_d56596