LEADER 04846nam 22006855 450 001 9910483195603321 005 20200702221923.0 010 $a3-319-11599-5 024 7 $a10.1007/978-3-319-11599-3 035 $a(CKB)3710000000269661 035 $a(SSID)ssj0001372778 035 $a(PQKBManifestationID)11780038 035 $a(PQKBTitleCode)TC0001372778 035 $a(PQKBWorkID)11311623 035 $a(PQKB)11540826 035 $a(DE-He213)978-3-319-11599-3 035 $a(MiAaPQ)EBC6301809 035 $a(MiAaPQ)EBC5591708 035 $a(Au-PeEL)EBL5591708 035 $a(OCoLC)893669671 035 $a(PPN)182097552 035 $a(EXLCZ)993710000000269661 100 $a20141006d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecure IT Systems $e19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings /$fedited by Karin Bernsmed, Simone Fischer-Hübner 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 296 p. 81 illus.) 225 1 $aSecurity and Cryptology ;$v8788 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-11598-7 327 $aAccountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- ?-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients? Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied ??Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798?2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication. 330 $aThis book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromsø, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk. 410 0$aSecurity and Cryptology ;$v8788 606 $aComputer security 606 $aData encryption (Computer science) 606 $aBiometrics (Biology) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aBiometrics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22040 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aBiometrics (Biology). 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aBiometrics. 676 $a004 702 $aBernsmed$b Karin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFischer-Hübner$b Simone$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483195603321 996 $aSecure IT Systems$92483819 997 $aUNINA