IFIP SEC 2015

International Conference on ICT Systems Security and Privacy Protection
May 26–28, 2015 in Hamburg, Germany

IFIP SEC 2015

International Conference on ICT Systems Security and Privacy Protection, May 26–28, 2015 in Hamburg, Germany

Accepted Papers

The following papers and/or presentations have been accepted for publication and/or will be presented at IFIP SEC 2015 and its co-located conferences. This list is in no particular order.

  1. Aydin Abadi, Sotirios Terzis and Changyu Dong: O-PSI: Delegated Private Set Intersection on Outsourced Datasets
  2. Josep Domingo-Ferrer, Qianhong Wu and Alberto Blanco-Justicia: Flexible and Robust Privacy-Preserving Implicit Authentication
  3. Dang Vinh Pham and Dogan Kesdogan: Towards Relations between the Hitting-Set Attack and the Statistical Disclosure Attack
  4. Chetan Bansal, Sören Preibusch and Natasa Milic-Frayling: Cache Timing Attacks revisited: efficient and repeatable browser history, OS and network sniffing
  5. Jinwei Hu, Heiko Mantel and Sebastian Ruhleder: Enforcing Usage Constraints on Credentials for Web Applications
  6. Amrit Kumar and Cedric Lauradoux: A Survey of Alerting Websites: Risks and Solutions
  7. Esra Erdin, Eric Klukovich, Mehmet Gunes and Gurhan Gunduz: POSN: A Personal Online Social Network
  8. Wojciech Jamroga and Masoud Tabatabaei: Strategic Noninterference
  9. Jaber Karimpour, Ayaz Isazadeh and Ali A. Noroozi: Verifying Observational Determinism
  10. Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein and Yves Le Traon: ApkCombiner: Combining Multiple Android Apps to Support Inter-AppAnalysis
  11. Francisco Vigário, Miguel Neto, Diogo Fonseca, Mário M. Freire and Pedro R. M. Inácio: Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases
  12. Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li and Kehuan Zhang: An Empirical Study on Android for Saving Non-shared Data on Public Storage
  13. Teodor Sommestad: Social groupings and information security obedience within organizations
  14. Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic and Rolando Trujillo-Rasua: Attack Trees with Sequential Conjunction
  15. David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural and Vijay Atluri: Enhancing the Security of Image CAPTCHAs through Noise Addition
  16. Mohamed Sabt, Mohammed Achemlal and Abdelmadjid Bouabdallah: The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation
  17. Konstantin Knorr, David Aspinall and Maria Wolters: On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps
  18. Alevtina Dubovitskaya, Visara Urovi, Matteo Vasirani, Karl Aberer and Michael I. Schumacher: A Cloud-based eHealth Architecture for Privacy Preserving Data Integration
  19. Wouter Lueks, Gergely Alpar, Jaap-Henk Hoepman and Pim Vullers: Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
  20. Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong and Isao Echizen: Chaotic Chebyshev polynomials based remote user authentication scheme in client-server environment
  21. Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini and P. Y. A. Ryan: A Secure Exam Protocol Without Trusted Parties
  22. Enrico Lovat, Alexander Fromm, Martin Mohr and Alexander Pretschner: SHRIFT System-wide HybRid Information Flow Tracking
  23. Liang Deng, Qingkai Zeng and Yao Liu: ISboxing: an Instruction Substitution based Data Sandboxing for x86 Untrusted Libraries
  24. Quoc Huy Do, Richard Bubel and Reiner Hähnle: Exploit Generation for Information Flow Leaks in Object-Oriented Programs
  25. Asahiko Yamada: A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant
  26. Mohammed Almeshekah, Mikhail Atallah and Eugene Spafford: Enhancing Passwords Security using Deceptive Covert Communication
  27. Anna Vapen, Niklas Carlsson, Anirban Mahanti and Nahid Shahmehri: Information Sharing and User Privacy in the Third-party Identity Management Landscape
  28. Jiang Ming, Dongpeng Xu and Dinghao Wu: Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference
  29. Zhijiao Zhang, Yashuai Lü, Yu Chen, Yongqiang Lü and Yuanchun Shi: Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach
  30. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati: Integrity for Approximate Joins on Untrusted Computational Servers
  31. Mohsen Rezvani, Mohammad Allahbakhsh, Lorenzo Vigentini, Aleksandar Ignjatovic and Sanjay Jha: An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems
  32. Timothy Carbino, Michael Temple and Juan Lopez Jr.: A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control
  33. Salvador Martínez, Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia and Jordi Cabot: Model-driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems
  34. Simão Reis, André Zúquete, Carlos Faneca and José Vieira: Authenticated File Broadcast Protocol
  35. Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro and Dingqi Yang: Automated Classification of C&C Connections through Malware URL Clustering
  36. Christoph Pohl, Alf Zugenmaier, Michael Meier and Hans-Joachim Hof: B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications
  37. Lena Connolly, Michael Lang and Doug J. Tygar: Investigation of Employee Security Behaviour: A Grounded Theory Approach
  38. Fredrik Karlsson, Goran Goldkuhl and Karin Hedström: Practice-Based Discourse Analysis of InfoSec Policies
  39. Maria B. Line and Nils Brede Moe: Understanding Collaborative Challenges in IT Security Preparedness Exercises
  40. Konstantinos Maraslis, Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas and Mo Haghighi: Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems
  41. Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel and Michael Meier: Securing BACnet’s Pitfalls
  42. Nicolai Kuntze and Carsten Rudolph: On the secure distribution of vendor-specific keys in deployment scenarios
  43. Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza, Benjamin Reinheimer, Simon Stockhardt and Ralf Tenberg: Learn To Spot Phishing URLs with the Android NoPhish App
  44. Primoz Cigoj and Borka Jerman-Blazic: An Innovative Approach in Digital Forensic Education and Training: the EduFors Tool
  45. Sergey Zapechnikov, Natalia Miloslavskaya and Vladimir Budzko: On Experience of Using Distance Learning Technologies for Teaching Cryptology
  46. Audun Jøsang, Marte Ødegaard and Erlend Oftedal: Cybersecurity through Secure Software Development
  47. Sagar Raina, Blair Taylor and Siddharth Kaza: Security Injections 2.0: Increasing Engagement and Faculty Adoption using Enhanced Secure Coding Modules for Lower-level Programming Courses
  48. Johan van Niekerk and Lynn Futcher: The Use of Software Design Patterns to Teach Secure Software Design: an Integrated approach
  49. Melissa Dark, Matt Bishop and Rick Linger: Realism in Teaching Cybersecurity Research: The Agile Research Process
  50. Roberto Gallo and Ricardo Dahab: Assurance Cases as a Didactic Tool for Information Security
  51. Zequn Huang, Chien-Chung Shen, Sheetal Doshi, Nimmi Thomas and Ha Duong: Cognitive Task Analysis Based Training for Cyber Situation Awareness
  52. Erik Moore and Daniel Likarish: A Cyber Security Multi Agency Collaboration for Rapid Response That Uses AGILE Methods on an Education Infrastructure
  53. Lynette Drevin and Gunther Drevin: Reflections on the Ethical Content of the IT honours Program Project Module
  54. Natalia Miloslavskaya and Alexander Tolstoy: Professional Competencies Level Assessment for Training of Masters in Information Security
  55. Sergey Zapechnikov, Alexander Tolstoy and Sergey Nagibin: History of Cryptography in Syllabus on Information Security Training
  56. Md. Sadek Ferdous, Gethin Norman, Audun Jøsang and Ron Poet: Mathematical Modeling of Trust Issues in Federated Idenity Management
  57. Yongzheng Wu and Roland H.C. Yap: Simple and Practical Integrity Models for Binaries and Files
  58. Nikos Fotiou and George C. Polyzos: Enabling NAME-based security and trust
  59. Thibaud Antignac and Daniel Le Métayer: Trust Driven Strategies for Privacy by Design
  60. Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcrog, Shinsaku Kiyomoto, Stephen Marsh, Yung Shin Van Der Sype and Toru Nakamura: Lightweight practical private one-way anonymous messaging
  61. Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Gueje, Thomas Sirvent and Valérie Viet Triem Tong: Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings
  62. Jamal Hussein, Luc Moreau and Vladimiro Sassone: Obscuring Provenance Confidential Information via Graph Transformation
  63. Natasha Dwyer and Stephen Marsh: Social Network Culture Needs the Lens of Critical Trust Research
  64. Archana Nojamkandath, Jasper Oosterman, Davide Ceolin, Gerben Klaas Dirk de Vries and Wan Fokkink: Predicting Quality of Crowdsourced Annotations using Graph Kernels
  65. Andrew Wong, Vivky Liu, William Caelli and Tony Sahama: An Architecture for Trustworthy Open Data Services
  66. Ijlal Loumi and Audun Jøsang: 1,2, pause: Lets start by meaningfully navigating the current online authentication solutions space
  67. Alexandru Butoi, Mircea Moca and Nicolae Tomai: Data Confidentiality in Cloud Storage Protocol based on Secret Sharing Scheme: A brute force ajack evaluation
  68. Natasha Dwyer and Stephen Marsh: The Detail of Trusted Messages: Retweets in a Context of Health and Fitness
  69. Johannes Sänger, Christian Richthammer, Artur Räsch and Günther Pernul: Reusable Defense Components for Online Reputation Systems
  70. Jingjing Guo, Christian Damsgaard Jensen and Jianfeng Ma: Continuous Context-Aware Device Comfort Evaluation Method
  71. Panagiotis Gouvas, Konstantinos Kalaboukas, Giannis Ledakis, Theo Dimitrakos, Joshua Daniel, Géry Ducatel and Nuria Rodriguez Dominguez: A Cloud Orchestrator for deploying public services on the cloud — the case of STRATEGIC project
  72. Joshua Daniel, Fadi El-Moussa, Géry Ducatel, Pramod Pawar, Ali Sajjad, Robert Rowlingson and Theo Dimitrakos: Integrating Security Services in Cloud Service Stores
  73. Michele Vescovi, Corrado Moiso, Mapa Pasolli, Lorenzo Cordin and Fabrizio Antonelli: Building an Eco-System of Trusted Services via user Control and Transparency on Personal Data
  74. Pramod S. Pawar, Ali Sajjad, Theo Dimitrakos and David W. Chadwick: Security-as-a-Service in Multi-cloud and Federated Cloud Environments
  75. Ana Juan Ferrer and Enric Pages i Montanera: The role of SLAs in building a Trusted Cloud for Europe
  76. Jingjing Guo, Christian Damsgaard Jensen and Jianfeng Ma: Continuous Context-Aware Device Comfort Evaluation Method
  77. Farashazillah Yahya, Robert Walters and Gary Wills: Investigating Cloud Storage Security Requirements and Critical Controls
  78. Vinh Pham, Hartmut Richthammer and Dogan Kesdogan: Secure and Privacy Focused Customer Device Management in a Smart Household Environment
  79. Ronald Paans: Information assurance
  80. Stef Schinagl and Keith Schoon: Security Operations Center
  81. Andre Sanders: IT audit and financial statement review
  82. Fredrik Karlsson and Karin Hedström: End user development and information security culture

Proceedings

The conference proceedings of IFIP SEC 2015 have been published on the Springer website.

Proceedings

The conference proceedings of IFIP SEC 2015 have been published on the Springer website.