↓ Skip to main content

Proceedings of The Ifip Tc 11 23 rd International Information Security Conference

Overview of attention for book
Cover of 'Proceedings of The Ifip Tc 11 23 rd International Information Security Conference'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Hiding in Groups: On the Expressiveness of Privacy Distributions
  3. Altmetric Badge
    Chapter 2 Practical Privacy-Preserving Benchmarking
  4. Altmetric Badge
    Chapter 3 Enhancing Privacy in Remote Data Classification
  5. Altmetric Badge
    Chapter 4 Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators
  6. Altmetric Badge
    Chapter 5 Robbing Banks with Their Own Software—an Exploit Against Norwegian Online Banks
  7. Altmetric Badge
    Chapter 6 Collaborative architecture for malware detection and analysis
  8. Altmetric Badge
    Chapter 7 Realizing Stateful Public Key Encryption in Wireless Sensor Network
  9. Altmetric Badge
    Chapter 8 Establishing secure links in low-rate wireless personal area networks
  10. Altmetric Badge
    Chapter 9 An Asynchronous Node Replication Attack in Wireless Sensor Networks
  11. Altmetric Badge
    Chapter 10 A B Formal Framework for Security Developments in the Domain of Smart Card Applications
  12. Altmetric Badge
    Chapter 11 An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies
  13. Altmetric Badge
    Chapter 12 Negotiation of Prohibition: An Approach Based on Policy Rewriting
  14. Altmetric Badge
    Chapter 13 An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations
  15. Altmetric Badge
    Chapter 14 Role Signatures for Access Control in Open Distributed Systems
  16. Altmetric Badge
    Chapter 15 Policies and Security Aspects For Distributed Scientific Laboratories
  17. Altmetric Badge
    Chapter 16 A Fuzzy Model for the Composition of Intrusion Detectors
  18. Altmetric Badge
    Chapter 17 Investigating the problem of IDS false alarms: An experimental study using Snort
  19. Altmetric Badge
    Chapter 18 User Session Modeling for Effective Application Intrusion Detection
  20. Altmetric Badge
    Chapter 19 A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems
  21. Altmetric Badge
    Chapter 20 Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs
  22. Altmetric Badge
    Chapter 21 Behavioral Intrusion Detection Indicators
  23. Altmetric Badge
    Chapter 22 Leveraging Lattices to Improve Role Mining
  24. Altmetric Badge
    Chapter 23 A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases
  25. Altmetric Badge
    Chapter 24 Efficient Coalition Detection in Traitor Tracing
  26. Altmetric Badge
    Chapter 25 SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned
  27. Altmetric Badge
    Chapter 26 Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models
  28. Altmetric Badge
    Chapter 27 A Decentralized Bayesian Attack Detection Algorithm for Network Security
  29. Altmetric Badge
    Chapter 28 An Operation-Based Metric for CPA Resistance
  30. Altmetric Badge
    Chapter 29 YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems
  31. Altmetric Badge
    Chapter 30 Adversary Modeling and Simulation in Cyber Warfare
  32. Altmetric Badge
    Chapter 31 Interactive Selection of ISO 27001 Controls under Multiple Objectives
  33. Altmetric Badge
    Chapter 32 Feasibility of Automated Information Security Compliance Auditing
  34. Altmetric Badge
    Chapter 33 Software Licence Protection and Management for Organisations
  35. Altmetric Badge
    Chapter 34 A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach
  36. Altmetric Badge
    Chapter 35 ASTRA : A Security Analysis Method Based on Asset Tracking
  37. Altmetric Badge
    Chapter 36 A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack
  38. Altmetric Badge
    Chapter 37 Portable User-Centric Identity Management
  39. Altmetric Badge
    Chapter 38 Ubiquitous Privacy-Preserving Identity Managment
  40. Altmetric Badge
    Chapter 39 Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data
  41. Altmetric Badge
    Chapter 40 Using Virtualization to Create and Deploy Computer Security Lab Exercises
  42. Altmetric Badge
    Chapter 41 DigForNet: Digital Forensic in Networking
  43. Altmetric Badge
    Chapter 42 A Live Digital Forensic system for Windows networks
  44. Altmetric Badge
    Chapter 43 HoneyID : Unveiling Hidden Spywares by Generating Bogus Events
  45. Altmetric Badge
    Chapter 44 A Security Protocol for Self-Organizing Data Storage
  46. Altmetric Badge
    Chapter 45 Protecting Financial Institutions from Brute-Force Attacks
  47. Altmetric Badge
    Chapter 46 Agency Theory: Can it be Used to Strengthen IT Governance?
  48. Altmetric Badge
    Chapter 47 A new Accounting Mechanism for Modern and Future AAA Services
  49. Altmetric Badge
    Chapter 48 A user survey on the sense of security, Anshin
  50. Altmetric Badge
    Chapter 49 Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks
  51. Altmetric Badge
    Chapter 50 A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection
  52. Altmetric Badge
    Chapter 51 Managing the lifecycle of XACML delegation policies in federated environments
  53. Altmetric Badge
    Chapter 52 Assessing the Likelihood of Privacy Policy Compliance
  54. Altmetric Badge
    Chapter 53 Classification features for detecting Server-side and Client-side Web attacks
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user
patent
4 patents

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
17 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Proceedings of The Ifip Tc 11 23 rd International Information Security Conference
Published by
Springer, Boston, MA, January 2008
DOI 10.1007/978-0-387-09699-5
ISBNs
978-0-387-09698-8, 978-0-387-09699-5
Editors

Sushil Jajodia, Pierangela Samarati, Stelvio Cimato

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 17 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 17 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 4 24%
Student > Master 4 24%
Student > Bachelor 2 12%
Other 1 6%
Lecturer 1 6%
Other 2 12%
Unknown 3 18%
Readers by discipline Count As %
Computer Science 11 65%
Engineering 2 12%
Business, Management and Accounting 1 6%
Unknown 3 18%