Description |
1 online resource (xii, 189 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 10741 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 10741. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro -- Preface -- Organization -- Contents -- Security in Emerging Systems -- A Secure and Trusted Channel Protocol for UAVs Fleets -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure of the Paper -- 2 UAVs Fleet and Rationale for a STCP -- 2.1 Assets to Protect, Adversary Model and SE -- 2.2 SE Usage and Its Security Features -- 2.3 Rationale for a STCP -- 3 Related Work -- 3.1 Related Work on Security Concerns of UAVs Fleets -- 3.2 Related Work on Secure Channel Protocols -- 4 Secure and Trusted Channel Protocol -- 4.1 Security Comparison Criteria -- 4.2 Protocol Notation |
|
4.3 Pre-protocol Setup -- 4.4 Proposed Protocol -- 4.5 Post-protocol Process -- 4.6 Protocol Resumption -- 5 Protocol Evaluation -- 5.1 Brief Informal Analysis -- 5.2 Revisiting the Requirements and Goals -- 5.3 Protocol Verification by CasperFDR and AVISPA -- 6 Conclusion and Future Research Directions -- Appendix A CasperFDR Script -- Appendix B AVISPA Script -- References -- Philanthropy on the Blockchain -- 1 Introduction -- 2 Benefits of Blockchain Solutions for Charities/Donors -- 3 The Blockchain Philanthropic Model -- 3.1 Bitcoin Transaction Methods |
|
4 The Philanthropic Model in an Offline Environment -- 4.1 SMS Payments and Bitcoin -- 4.2 Security Requirements and Adversarial Model -- 4.3 Proposed SMS-Based Bitcoin Payment Scheme -- 4.4 Processing a Bitcoin Payment Request -- 5 Analysis -- 6 Conclusion and Future Work -- References -- Security of Data -- Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database -- 1 Introduction -- 2 Related Work -- 3 Overview of LWC -- 3.1 System Model -- 3.2 Threat Model -- 3.3 System Interactions -- 4 Key Management and Data Representation -- 4.1 Key Management |
|
4.2 Data Structure for the CS -- 4.3 Data Structure for the OPS -- 5 Query Execution -- 5.1 Encryption on the DBU -- 5.2 Index Search on the OPS -- 5.3 Oblivious Access -- 5.4 Data Decryption -- 6 Security Analysis -- 7 Experimental Evaluation -- 8 Conclusion and Future Work -- References -- JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language -- 1 Introduction -- 2 Problem Statement -- 3 JACPoL Detailed Design -- 3.1 Fundamental Design Choices -- 3.2 Policy Structure -- 3.3 Syntax and Conventions -- 3.4 Policy Sets, Policies and Rules -- 3.5 Targets and Conditions |
|
3.6 Combining Algorithms -- 3.7 Obligations -- 3.8 Implementation -- 4 Comparative Analysis -- 5 Application of JACPoL to Security Models -- 5.1 RBAC vs ABAC -- 5.2 Attribute-Centric RBAC Application -- 5.3 Role-Centric ABAC Application -- 6 Conclusion -- References -- Trusted Execution -- EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs -- 1 Introduction -- 2 Related Work -- 2.1 Secure Untrusted System Logging -- 2.2 Secure Logging with Trusted Hardware -- 2.3 Discussion -- 3 Trusted Execution Environments (TEEs) -- 4 System Requirements -- 5 EmLog Architecture Design |
Summary |
This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms |
Notes |
International conference proceedings |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed June 27, 2018) |
Subject |
Computer security -- Congresses
|
|
Ubiquitous computing -- Congresses
|
|
Information retrieval.
|
|
Expert systems -- knowledge-based systems.
|
|
Network hardware.
|
|
Coding theory & cryptology.
|
|
Computer security.
|
|
Computers -- Information Technology.
|
|
Computers -- Expert Systems.
|
|
Computers -- Hardware -- Network Hardware.
|
|
Computers -- Security -- General.
|
|
Computer security
|
|
Ubiquitous computing
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Hancke, Gerhard P., editor
|
|
Damiani, Ernesto, 1960- editor.
|
ISBN |
9783319935249 |
|
3319935240 |
|