Limit search to available items
Book Cover
E-book
Author WISTP (Conference) (11th : 2017 : Ērakleion, Greece)

Title Information security theory and practice : 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings / Gerhard P. Hancke, Ernesto Damiani (eds.)
Published Cham : Springer, 2018

Copies

Description 1 online resource (xii, 189 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 10741
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 10741. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro -- Preface -- Organization -- Contents -- Security in Emerging Systems -- A Secure and Trusted Channel Protocol for UAVs Fleets -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure of the Paper -- 2 UAVs Fleet and Rationale for a STCP -- 2.1 Assets to Protect, Adversary Model and SE -- 2.2 SE Usage and Its Security Features -- 2.3 Rationale for a STCP -- 3 Related Work -- 3.1 Related Work on Security Concerns of UAVs Fleets -- 3.2 Related Work on Secure Channel Protocols -- 4 Secure and Trusted Channel Protocol -- 4.1 Security Comparison Criteria -- 4.2 Protocol Notation
4.3 Pre-protocol Setup -- 4.4 Proposed Protocol -- 4.5 Post-protocol Process -- 4.6 Protocol Resumption -- 5 Protocol Evaluation -- 5.1 Brief Informal Analysis -- 5.2 Revisiting the Requirements and Goals -- 5.3 Protocol Verification by CasperFDR and AVISPA -- 6 Conclusion and Future Research Directions -- Appendix A CasperFDR Script -- Appendix B AVISPA Script -- References -- Philanthropy on the Blockchain -- 1 Introduction -- 2 Benefits of Blockchain Solutions for Charities/Donors -- 3 The Blockchain Philanthropic Model -- 3.1 Bitcoin Transaction Methods
4 The Philanthropic Model in an Offline Environment -- 4.1 SMS Payments and Bitcoin -- 4.2 Security Requirements and Adversarial Model -- 4.3 Proposed SMS-Based Bitcoin Payment Scheme -- 4.4 Processing a Bitcoin Payment Request -- 5 Analysis -- 6 Conclusion and Future Work -- References -- Security of Data -- Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database -- 1 Introduction -- 2 Related Work -- 3 Overview of LWC -- 3.1 System Model -- 3.2 Threat Model -- 3.3 System Interactions -- 4 Key Management and Data Representation -- 4.1 Key Management
4.2 Data Structure for the CS -- 4.3 Data Structure for the OPS -- 5 Query Execution -- 5.1 Encryption on the DBU -- 5.2 Index Search on the OPS -- 5.3 Oblivious Access -- 5.4 Data Decryption -- 6 Security Analysis -- 7 Experimental Evaluation -- 8 Conclusion and Future Work -- References -- JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language -- 1 Introduction -- 2 Problem Statement -- 3 JACPoL Detailed Design -- 3.1 Fundamental Design Choices -- 3.2 Policy Structure -- 3.3 Syntax and Conventions -- 3.4 Policy Sets, Policies and Rules -- 3.5 Targets and Conditions
3.6 Combining Algorithms -- 3.7 Obligations -- 3.8 Implementation -- 4 Comparative Analysis -- 5 Application of JACPoL to Security Models -- 5.1 RBAC vs ABAC -- 5.2 Attribute-Centric RBAC Application -- 5.3 Role-Centric ABAC Application -- 6 Conclusion -- References -- Trusted Execution -- EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs -- 1 Introduction -- 2 Related Work -- 2.1 Secure Untrusted System Logging -- 2.2 Secure Logging with Trusted Hardware -- 2.3 Discussion -- 3 Trusted Execution Environments (TEEs) -- 4 System Requirements -- 5 EmLog Architecture Design
Summary This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed June 27, 2018)
Subject Computer security -- Congresses
Ubiquitous computing -- Congresses
Information retrieval.
Expert systems -- knowledge-based systems.
Network hardware.
Coding theory & cryptology.
Computer security.
Computers -- Information Technology.
Computers -- Expert Systems.
Computers -- Hardware -- Network Hardware.
Computers -- Security -- General.
Computer security
Ubiquitous computing
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Hancke, Gerhard P., editor
Damiani, Ernesto, 1960- editor.
ISBN 9783319935249
3319935240
Other Titles WISTP 2017