LEADER 07361nam 22008175 450 001 996213650703316 005 20200702220440.0 010 $a3-319-11698-3 024 7 $a10.1007/978-3-319-11698-3 035 $a(CKB)3710000000269665 035 $a(SSID)ssj0001372712 035 $a(PQKBManifestationID)11734870 035 $a(PQKBTitleCode)TC0001372712 035 $a(PQKBWorkID)11310802 035 $a(PQKB)10985074 035 $a(DE-He213)978-3-319-11698-3 035 $a(MiAaPQ)EBC6304189 035 $a(MiAaPQ)EBC5590769 035 $a(Au-PeEL)EBL5590769 035 $a(OCoLC)893670214 035 $a(PPN)182097587 035 $a(EXLCZ)993710000000269665 100 $a20141009d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aNetwork and System Security$b[electronic resource] $e8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings /$fedited by Man Ho Au, Barbara Carminati, C.-C. Jay Kuo 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XVIII, 576 p. 117 illus.) 225 1 $aSecurity and Cryptology ;$v8792 300 $aIncludes index. 311 $a3-319-11697-5 327 $aCloud Computing -- An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures -- Adopting Provenance-Based Access Control in OpenStack Cloud IaaS -- Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage -- A Formal Model for Isolation Management in Cloud Infrastructure-asa- Service -- Access Control -- Extending OpenStack Access Control with Domain Trust -- Hierarchical Solution for Access Control and Authentication in Software Defined Networks -- A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing -- Network Security.-psOBJ: Defending against Traffic Analysis with pseudo-Objects -- Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS -- Revisiting Node Injection of P2P Botnet -- On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification -- Security Analysis -- Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack -- A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique -- Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock -- Cryptanalysis on the Authenticated Cipher Sablier -- A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique -- Security Analysis and Improvement of Femtocell Access Control -- Public Key Cryptography -- Identity Based Threshold Ring Signature from Lattices -- Identity-Based Transitive Signcryptio -- GO-ABE: Group-Oriented Attribute-Based Encryption -- Jhanwar-Barua?s Identity-Based Encryption Revisited -- Lightweight Universally Composable Adaptive Oblivious Transfer -- Certificate-Based Conditional Proxy Re-Encryption -- A Secure Obfuscator for Encrypted Blind Signature Functionality -- Attribute-Based Signing Right Delegation -- System Security -- Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios -- iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications -- Formal Verification of Finite State Transactional Security Policy -- Privacy-Preserving Systems and Bio-metrics -- Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features -- Privacy Preserving Biometrics-Based and User Centric Authentication Protocol -- A Dynamic Matching Secret Handshake Scheme without Random Oracles -- Formal Analysis of DAA-Related APIs in TPM 2.0 -- Key Management and Distribution -- eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy -- Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks -- A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks -- Short Papers -- Rational Secure Two-party Computation in Social Cloud -- How to Evaluate Trust Using MMT -- A Proposed Approach to Compound File Fragment Identification -- Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework -- A New Approach to Executable File Fragment Detection in Network Forensics -- Tighter Security Bound of MIBS Block Cipher against Differential Attack -- A New Multivariate Based Threshold Ring Signature Scheme -- Capturing Android Malware Behaviour Using System Flow Graph -- Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD -- A New Public Key Encryption with Equality Test -- A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers -- Multi-domain Direct Anonymous Attestation Scheme from Pairings. 330 $aThis book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014. The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution. 410 0$aSecurity and Cryptology ;$v8792 606 $aComputer security 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aE-commerce 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aE-commerce. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$ae-Commerce/e-business. 676 $a005.8 702 $aAu$b Man Ho$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCarminati$b Barbara$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKuo$b C.-C. Jay$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996213650703316 996 $aNetwork and system security$92088039 997 $aUNISA