default search action
NordSec 2014: Tromsø, Norway
- Karin Bernsmed, Simone Fischer-Hübner:
Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings. Lecture Notes in Computer Science 8788, Springer 2014, ISBN 978-3-319-11598-6
Keynote Paper
- Siani Pearson:
Accountability in Cloud Service Provision Ecosystems. 3-24
Information Management and Data Privacy
- Erik Bergström, Rose-Mharie Åhlfeldt:
Information Classification Issues. 27-41 - Kalpana Gondi, A. Prasad Sistla, V. N. Venkatakrishnan:
DEICS: Data Erasure in Concurrent Software. 42-58 - Dan Bogdanov, Sven Laur, Riivo Talviste:
A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation. 59-74
Cloud, Big Data and Virtualization Security
- Elena Reshetova, Janne Karhunen, Thomas Nyman, N. Asokan:
Security of OS-Level Virtualization Technologies. 77-93 - Alberto Trombetta, Giuseppe Persiano, Stefano Braghin:
Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption. 94-109 - Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy:
π-Cipher: Authenticated Encryption for Big Data. 110-128 - Julio Angulo, Erik Wästlund, Johan Högberg:
What Would It Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services. 129-145
Network Security and Logging
- Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards:
Efficient Record-Level Keyless Signatures for Audit Logs. 149-164 - Marco Giunti:
Static Semantics of Secret Channel Abstractions. 165-180 - Frédéric Besson, Nataliia Bielova, Thomas P. Jensen:
Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach. 181-196
Attacks and Defenses
- Aleksandr Lenin, Jan Willemson, Dyan Permata Sari:
Attacker Profiling in Quantitative Security Assessment Based on Attack Trees. 199-212 - Aapo Kalliola, Tuomas Aura, Sanja Scepanovic:
Denial-of-Service Mitigation for Internet Services. 213-228 - Markku Antikainen, Tuomas Aura, Mikko Särelä:
Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch. 229-244
Security in Healthcare and Biometrics
- Liangyu Xu, Armin B. Cremers:
Patients' Privacy Protection against Insurance Companies in eHealth Systems. 247-260 - Anika Pflug, Christoph Busch:
Segmentation and Normalization of Human Ears Using Cascaded Pose Regression. 261-272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.