skip to content
Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers Preview this item
ClosePreview this item
Checking...

Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers

Author: Tuomas Aura; Kimmo Järvinen; Kaisa Nyberg
Publisher: Heidelberg : Springer, ©2012.
Series: Lecture notes in computer science, 7127.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
Annotation
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Print version:
Nordic Conference on Secure IT Systems (15th : 2009 : Espoo, Finland).
Information security technology for applications.
Heidelberg : Springer, ©2012
(DLC) 2011945062
(OCoLC)778269180
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Tuomas Aura; Kimmo Järvinen; Kaisa Nyberg
ISBN: 9783642279379 3642279376
OCLC Number: 793080458
Description: 1 online resource (x, 288 pages) : illustrations.
Contents: BloomCasting: Security in Bloom Filter Based Multicast / Mikko Särelä, Christian Esteve Rothenberg, András Zahemszky, Pekka Nikander and Jörg Ott --
Authentication Session Migration / Sanna Suoranta, Jani Heikkinen and Pekka Silvekoski --
Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles / Miika Komu, Sasu Tarkoma and Andrey Lukyanenko --
Experimental Analysis of the Femtocell Location Verification Techniques / Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert --
Why Wasn't I Notified?: Information Security Incident Reporting Demystified / Erka Koivunen --
Use of Ratings from Personalized Communities for Trustworthy Application Installation / Pern Hui Chia, Andreas P. Heiner and N. Asokan --
Practical Private Information Aggregation in Large Networks / Gunnar Kreitz, Mads Dam and Douglas Wikström --
Tracking Malicious Hosts on a 10Gbps Backbone Link / Magnus Almgren and Wolfgang John --
Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices / Elahe Kani-Zabihi and Lizzie Coles-Kemp. Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions / Dominik Herrmann, Christoph Gerber, Christian Banse and Hannes Federrath --
A Framework for the Modular Specification and Orchestration of Authorization Policies / Jason Crampton and Michael Huth --
Credential Disabling from Trusted Execution Environments / Kari Kostiainen, N. Asokan and Jan-Erik Ekberg --
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications / Olga Gadyatskaya, Fabio Massacci, Federica Paci and Sergey Stankevich --
Implementing Erasure Policies Using Taint Analysis / Filippo Del Tedesco, Alejandro Russo and David Sands --
A Taint Mode for Python via a Library / Juan José Conti and Alejandro Russo --
Security of Web Mashups: A Survey / Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens and Wouter Joosen --
Safe Wrappers and Sane Policies for Self Protecting JavaScript / Jonas Magazinius, Phu H. Phung and David Sands --
Protocol Implementation Generator / Jose Quaresma and Christian W. Probst --
Secure and Fast Implementations of Two Involution Ciphers / Billy Bob Brumley --
The PASSERINE Public Key Encryption and Authentication Mechanism / Markku-Juhani O. Saarinen.
Series Title: Lecture notes in computer science, 7127.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: NordSec 2010
Responsibility: Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg (eds.).

Abstract:

This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/793080458> # Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
   library:oclcnum "793080458" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1082283896#Place/heidelberg> ; # Heidelberg
   schema:about <http://experiment.worldcat.org/entity/work/data/1082283896#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1082283896#Topic/informatique> ; # Informatique
   schema:about <http://experiment.worldcat.org/entity/work/data/1082283896#Topic/data_protection> ; # Data protection
   schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
   schema:about <http://experiment.worldcat.org/entity/work/data/1082283896#Topic/computer_security> ; # Computer security
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:alternateName "NordSec 2010" ;
   schema:bookFormat schema:EBook ;
   schema:contributor <http://viaf.org/viaf/231692890> ; # Tuomas Aura
   schema:contributor <http://viaf.org/viaf/47004195> ; # Kaisa Nyberg
   schema:contributor <http://viaf.org/viaf/231796953> ; # Kimmo Järvinen
   schema:copyrightYear "2012" ;
   schema:creator <http://experiment.worldcat.org/entity/work/data/1082283896#Meeting/nordic_conference_on_secure_it_systems_15th_2009_espoo_finland> ; # Nordic Conference on Secure IT Systems (15th : 2009 : Espoo, Finland)
   schema:datePublished "2012" ;
   schema:description "Annotation"@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1082283896> ;
   schema:genre "Conference publication"@en ;
   schema:genre "Conference papers and proceedings"@en ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1082283896#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1082283896#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1082283896#Series/lncs_sublibrary> ; # LNCS sublibrary.
   schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science,
   schema:isSimilarTo <http://www.worldcat.org/oclc/778269180> ;
   schema:name "Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers"@en ;
   schema:productID "793080458" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/793080458#PublicationEvent/heidelberg_springer_2012> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1082283896#Agent/springer> ; # Springer
   schema:url <http://dx.doi.org/10.1007/978-3-642-27937-9> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=3069959> ;
   schema:url <https://grinnell.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-27937-9> ;
   schema:url <http://gate.lib.buffalo.edu/login?url=https://link.springer.com/book/10.1007/978-3-642-27937-9> ;
   schema:url <http://site.ebrary.com/id/10651297> ;
   schema:workExample <http://dx.doi.org/10.1007/978-3-642-27937-9> ;
   schema:workExample <http://worldcat.org/isbn/9783642279379> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/793080458> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1082283896#Meeting/nordic_conference_on_secure_it_systems_15th_2009_espoo_finland> # Nordic Conference on Secure IT Systems (15th : 2009 : Espoo, Finland)
    a bgn:Meeting, schema:Event ;
   schema:location <http://experiment.worldcat.org/entity/work/data/1082283896#Place/espoo_finland> ; # Espoo, Finland)
   schema:name "Nordic Conference on Secure IT Systems (15th : 2009 : Espoo, Finland)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1082283896#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/793080458> ; # Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers
   schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/1082283896#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/793080458> ; # Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers
   schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/1082283896#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/793080458> ; # Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers
   schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
   schema:name "Data protection"@en ;
    .

<http://viaf.org/viaf/231692890> # Tuomas Aura
    a schema:Person ;
   schema:familyName "Aura" ;
   schema:givenName "Tuomas" ;
   schema:name "Tuomas Aura" ;
    .

<http://viaf.org/viaf/231796953> # Kimmo Järvinen
    a schema:Person ;
   schema:familyName "Järvinen" ;
   schema:givenName "Kimmo" ;
   schema:name "Kimmo Järvinen" ;
    .

<http://viaf.org/viaf/47004195> # Kaisa Nyberg
    a schema:Person ;
   schema:birthDate "1948" ;
   schema:familyName "Nyberg" ;
   schema:givenName "Kaisa" ;
   schema:name "Kaisa Nyberg" ;
    .

<http://worldcat.org/isbn/9783642279379>
    a schema:ProductModel ;
   schema:isbn "3642279376" ;
   schema:isbn "9783642279379" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science,
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/793080458> ; # Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers
   schema:issn "0302-9743" ;
   schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/oclc/778269180>
    a schema:CreativeWork ;
   rdfs:label "Information security technology for applications." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/793080458> ; # Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers
    .

<http://www.worldcat.org/title/-/oclc/793080458>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/793080458> ; # Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers
   schema:dateModified "2018-03-11" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.