


default search action
SEC 2007: Sandton, South Africa
- Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms:

New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. IFIP 232, Springer 2007, ISBN 978-0-387-72366-2
Digital Forensics
- John Haggerty, Mark John Taylor:

FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. 1-12 - Talania Grobler, Buks Louwrens:

Digital Forensic Readiness as a Component of Information Security Best Practice. 13-24
Human-Computer Interaction I
- Christer Magnusson, Josef Molvidsson, Sven Zetterqvist:

Value creation and Return On Security Investments (ROSI). 25-35 - Almut Herzog, Nahid Shahmehri:

Usability and Security of Personal Firewalls. 37-48
Computer-Based Trust
- Nicolai Kuntze, Andreas U. Schmidt:

Trusted Ticket Systems and Applications. 49-60 - Luiz Fernando Rust C. Carmo, Breno G. de Oliveira, Augusto C. Braga:

Trust Evaluation for Web Applications based on Behavioral Analysis. 61-72
Information Security Management I
- Rose-Mharie Åhlfeldt, Paolo Spagnoletti

, Guttorm Sindre
:
Improving the Information Security Model by using TFI. 73-84 - Andreas Ekelhart

, Stefan Fenz, Gernot Goluch, Edgar R. Weippl:
Ontological Mapping of Common Criteria's Security Assurance Requirements. 85-95
Network Security I
- Joaquín García-Alfaro

, Frédéric Cuppens, Nora Cuppens-Boulahia:
Management of Exceptions on Access Control Policies. 97-108 - Tieyan Li, Guilin Wang:

Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. 109-120
Information Security Management II
- Natsuko Hikage, Yuko Murayama, Carl Hauser:

Exploratory survey on an Evaluation Model for a Sense of Security. 121-132 - Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood:

Employees' Adherence to Information Security Policies: An Empirical Study. 133-144
Network Security II
- Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, Jens B. Schmitt:

Phishing in the Wireless: Implementation and Analysis. 145-156 - Tyler Moore

, Jolyon Clulow:
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. 157-168
Access Control I
- Liesje Demuynck, Bart De Decker, Wouter Joosen:

A Credential-Based System for the Anonymous Delegation of Rights. 169-180 - Christian J. Eibl, Basie von Solms, Sigrid E. Schubert:

Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content. 181-192
Human-Computer Interaction II
- Tjaart Steyn, Hennie A. Kruger, Lynette Drevin

:
Identity Theft - Empirical evidence from a Phishing Exercise. 193-203 - Steven Furnell

, Dimitris Katsabas, Paul Dowland
, Fraser Reid:
A Practical Usability Evaluation of Security Features in End-User Applications. 205-216
Intrusion Detection Systems
- A. Maciej Rossudowski, Hein S. Venter

, Jan H. P. Eloff:
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. 217-228 - Vrizlynn L. L. Thing, Morris Sloman

, Naranker Dulay:
A Survey of Bots Used for Distributed Denial of Service Attacks. 229-240
Access Control II
- Srijith Krishnan Nair, Muhammad Torabi Dashti

, Bruno Crispo, Andrew S. Tanenbaum
:
A Hybrid PKI-IBC Based Ephemerizer System. 241-252 - Sevasti Karatzouni, Nathan L. Clarke

:
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. 253-263
Information Privacy I
- Guilin Wang, Feng Bao:

Security Remarks on a Convertible Nominative Signature Scheme. 265-275 - Alapan Arnab, Andrew Hutchison:

Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions. 277-288
Access Control III
- Evangelos Kotsovinos, Ingo Friese, Martin Kurze, Jörg Heuer:

A Role-Based Architecture for Seamless Identity Management and Effective Task Separation. 289-300 - Yuri Demchenko

, Leon Gommans, Cees de Laat:
Extending Role Based Access Control Model for Distributed Multidomain Applications. 301-312
Information Privacy II
- Claudio Agostino Ardagna

, Marco Cremonini, Ernesto Damiani
, Sabrina De Capitani di Vimercati
, Pierangela Samarati
:
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy. 313-324 - Jan Zibuschka, Lothar Fritsch, Mike Radmacher, Tobias Scherner, Kai Rannenberg:

Enabling Privacy of Real-Life LBS. 325-336
Access Control IV
- Xiapu Luo

, Edmond W. W. Chan, Rocky K. C. Chang:
Crafting Web Counters into Covert Channels. 337-348 - Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia:

OPA: Onion Policy Administration Model - Another approach to manage rights in DRM. 349-360
Security Services
- Nicolai Kuntze, Andreas U. Schmidt, Christian Hett:

Non-Repudiation in Internet Telephony. 361-372 - Håvard D. Johansen, Dag Johansen, Robbert van Renesse:

FirePatch: Secure and Time-Critical Dissemination of Software Patches. 373-384
Access Control V
- Ernesto Damiani

, Sabrina De Capitani di Vimercati, Sara Foresti
, Sushil Jajodia, Stefano Paraboschi
, Pierangela Samarati
:
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. 385-396 - Jan Paul Kolter, Rolf Schillinger, Günther Pernul:

Building a Distributed Semantic-aware Security Architecture. 397-408
Trust and Intrusion Detection Systems
- Andriy Panchenko, Lexi Pimenidis:

Using Trust to Resist Censorship in the Presence of Collusion. 409-420 - Zhuowei Li, Amitabha Das, Jianying Zhou

:
Evaluating the Effects of Model Generalization on Intrusion Detection Performance. 421-432
Keynote Paper
- William J. Caelli:

Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. 433-442
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society
- Carsten Rudolph

:
Covert Identity Information in Direct Anonymous Attestation (DAA). 443-448 - Adolf Hohl, Alf Zugenmaier:

Safeguarding Personal Data using Rights Management in Distributed Applications. 449-456 - Stephen Flowerday

, Gideon Ranga:
Identification Now and in the Future: Social Grant Distribution Process in South Africa. 457-459 - Paula Thomas, Theodore Tryfonas

:
Hard-drive Disposal and Identity Fraud. 461-466 - Eleni Kosta, Martin Meints, Marit Hansen, Mark Gasson:

An analysis of security and privacy issues relating to RFID enabled ePassports. 467-472
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and SkUls for Manageable Information Security
- Nicholas Tate, Sharman Lichtenstein, Matthew J. Warren

:
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework. 473-478 - Tatjana Welzer, Marko Hölbl, Ana Habjanic, Bostjan Brumen

, Marjan Druzovec:
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program. 479-484 - Ronald C. Dodge, Corey Bertram, Daniel Ragsdale:

Remote Virtual Information Assurance Network. 485-490 - Kara L. Nance, Brian Hay:

Certifying the Computer Security Professional Using the Project Management Institute's PMP Model. 491-496

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














