Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$101.58
Used and New from Other Sellers
Used and New from Other Sellers
from $77.59
Usually ships in 1-2 business days
(Save 47%)
Other sellers (Paperback)
  • All (10) from $77.59   
  • New (8) from $77.59   
  • Used (2) from $176.33   

More About This Textbook

Overview

This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 2010. The 28 revised full papers were carefully reviewed and selected from 112 submissions. They are organized in topical sections on malware and email security, anonymity and privacy, wireless security, systems security, network security, and security prools.

Read More Show Less

Product Details

Table of Contents

Malware and Email Security

SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection Deguang Kong Yoon-Chan Jhi Tao Gong Sencun Zhu Peng Liu Hongsheng Xi 1

Analyzing and Exploiting Network Behaviors of Malware Jose Andre Morales Areej Al-Bataineh Shouhuai Xu Ravi Sandhu 20

Inexpensive Email Addresses An Email Spam-Combating System Aram Yegenian Tassos Dimitriou 35

Anonymity and Privacy

Privacy Administration in Distributed Service Infrastructure Nabil Ajam Nora Cuppens-Boulahia Frederic Cuppens 53

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS Rinku Dewri Indrakshi Ray Indrajit Ray Darrell Whitley 71

Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings Ming Li Shucheng Yu Kui Ren Wenjing Lou 89

Wireless Security

A Study on False Channel Condition Reporting Attacks in Wireless Networks Dongho Kim Yih-Chun Hu 107

Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services Patrick Traynor 125

Saving Energy on WiFi with Required IPsec Youngsang Shin Steven Myers Minaxi Gupta 144

Systems Security - I

Transparent Protection of Commodity OS Kernels Using Hardware Virtualization Michael Grace Zhi Wang Deepa Srinivasan Jinku Li Xuxian Jiang Zhenkai Liang Siarhei Liakh 162

A Generic Construction of Dynamic Single Sign-on with Strong Security Jinguang Han Yi Mu Willy Susilo Jun Yan 181

DeCore: Detecting Content Repurposing Attacks on Client' Systems Smitha Sundareswaran Anna C. Squicciarini 199

Network Security - I

Realizing a Source Authentic Internet Toby Ehrenkranz Jun Li Patrick McDaniel 217

Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks Jihyuk Choi Jerry T. Chiang Dongho Kim Yih-Chun Hu 235

Attacking Beacon-Enabled 802.15.4 Networks Sang Shin Jung Marco Valero Anu Bourgeois Raheem Beyah 253

Supporting Publication and Subscription Confidentiality in Pub/Sub Networks Mihaela Ion Giovanni Russello Bruno Crispo 272

Security Protocols - I

CED2: Communication Efficient Disjointness Decision Luciana Marconi Mauro Conti Roberto Di Pietro 290

Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes Jingqiang Lin Peng Liu Jiwu Jing Qiongxiao Wang 307

Context-Aware Usage Control for Android Guangdong Bai Liang Gu Tao Feng Yao Guo Xiangqun Chen 326

System Security - II

Efficient Isolation of Trusted Subsystems in Embedded Systems Raoul Strackx Frank Piessens Bart Preneel 344

Enhancing Host Security Using External Environment Sensors Ee-Chien Chang Liming Lu Yongzheng Wu Roland H.C. Yap Jie Yu 362

FADE: Secure Overlay Cloud Storage with File Assured Deletion Yang Tang Patrick P.C. Lee John C.S. Lui Radia Perlman 380

Security Protocols - II

A New Information Leakage Measure for Anonymity Protocols Sami Zhioua 398

Hidden Markov Models for Automated Protocol Learning Sean Whalen Matt Bishop James P. Crutchfield 415

Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast Omar I. Al-Bataineh Ronr van der Meyden 429

Network Security - II

Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly Andrew Kalafut Minaxi Gupta Pairoj Rattadilok Pragneshkumar Patel 448

The Hitchhiker's Guide to DNS Cache Poisoning Sooel Son Vitaly Shmatikou 466

A Formal Definition of Online Abuse-Freeness Ralf Küsters Henning Schnoor Tomasz Truderung 484

Author Index 499

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)