Search dblp for Publications

export results for "toc:db/conf/sec/sec2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sec/AhnKS08,
  author       = {Gail{-}Joon Ahn and
                  Moonam Ko and
                  Mohamed Shehab},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Portable User-Centric Identity Management},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {573--587},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_37},
  doi          = {10.1007/978-0-387-09699-5\_37},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AhnKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AlawnehA08,
  author       = {Muntaha Alawneh and
                  Imad M. Abbadi},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Software Licence Protection and Management for Organisations},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {509--523},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_33},
  doi          = {10.1007/978-0-387-09699-5\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AlawnehA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AlthebyanP08,
  author       = {Qutaibah Althebyan and
                  Brajendra Panda},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A Knowledge-Based Bayesian Model for Analyzing a System after an Insider
                  Attack},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {557--571},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_36},
  doi          = {10.1007/978-0-387-09699-5\_36},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AlthebyanP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BaekTZW08,
  author       = {Joonsang Baek and
                  Han Chiang Tan and
                  Jianying Zhou and
                  Jun Wen Wong},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Realizing Stateful Public Key Encryption in Wireless Sensor Network},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {95--107},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_7},
  doi          = {10.1007/978-0-387-09699-5\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BaekTZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BattistoniBPFM08,
  author       = {Roberto Battistoni and
                  Alessandro Di Biagio and
                  Roberto Di Pietro and
                  Matteo Formica and
                  Luigi V. Mancini},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A Live Digital Forensic system for Windows networks},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {653--667},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_42},
  doi          = {10.1007/978-0-387-09699-5\_42},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BattistoniBPFM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BellettiniR08,
  author       = {Carlo Bellettini and
                  Julian L. Rrushi},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A Product Machine Model for Anomaly Detection of Interposition Attacks
                  on Cyber-Physical Systems},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {285--300},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_19},
  doi          = {10.1007/978-0-387-09699-5\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BellettiniR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BenferhatT08,
  author       = {Salem Benferhat and
                  Karim Tabia},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Classification features for detecting Server-side and Client-side
                  Web attacks},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {729--733},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_53},
  doi          = {10.1007/978-0-387-09699-5\_53},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BenferhatT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ColajanniGM08,
  author       = {Michele Colajanni and
                  Daniele Gozzi and
                  Mirco Marchetti},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Collaborative architecture for malware detection and analysis},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {79--93},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_6},
  doi          = {10.1007/978-0-387-09699-5\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ColajanniGM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ColantonioPO08,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Leveraging Lattices to Improve Role Mining},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {333--347},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_22},
  doi          = {10.1007/978-0-387-09699-5\_22},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ColantonioPO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CramptonL08,
  author       = {Jason Crampton and
                  Hoon Wei Lim},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Role Signatures for Access Control in Open Distributed Systems},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {205--220},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_14},
  doi          = {10.1007/978-0-387-09699-5\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/CramptonL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Cuppens-BoulahiaCHD08,
  author       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Diala Abi Haidar and
                  Herv{\'{e}} Debar},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Negotiation of Prohibition: An Approach Based on Policy Rewriting},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_12},
  doi          = {10.1007/978-0-387-09699-5\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/Cuppens-BoulahiaCHD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DadeauPT08,
  author       = {Fr{\'{e}}d{\'{e}}ric Dadeau and
                  Marie{-}Laure Potet and
                  R{\'{e}}gis Tissot},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A {B} Formal Framework for Security Developments in the Domain of
                  Smart Card Applications},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_10},
  doi          = {10.1007/978-0-387-09699-5\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DadeauPT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DavanzoMB08,
  author       = {Giorgio Davanzo and
                  Eric Medvet and
                  Alberto Bartoli},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A Comparative Study of Anomaly Detection Techniques in Web Site Defacement
                  Detection},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {711--716},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_50},
  doi          = {10.1007/978-0-387-09699-5\_50},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/DavanzoMB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DessiFB08,
  author       = {Nicoletta Dess{\`{\i}} and
                  Maria Grazia Fugini and
                  R. A. Balachandar},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Policies and Security Aspects For Distributed Scientific Laboratories},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {221--235},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_15},
  doi          = {10.1007/978-0-387-09699-5\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DessiFB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Dondo08,
  author       = {Maxwell G. Dondo},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A Vulnerability Prioritization System Using {A} Fuzzy Risk Analysis
                  Approach},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {525--540},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_34},
  doi          = {10.1007/978-0-387-09699-5\_34},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Dondo08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DritsasSTMG08,
  author       = {Stelios Dritsas and
                  Yannis Soupionis and
                  Marianthi Theoharidou and
                  Yannis Mallios and
                  Dimitris Gritzalis},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {{SPIT} Identification Criteria Implementation: Effectiveness and Lessons
                  Learned},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {381--395},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_25},
  doi          = {10.1007/978-0-387-09699-5\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DritsasSTMG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/EspelidNKH08,
  author       = {Yngve Espelid and
                  Lars{-}Helge Netland and
                  Andr{\'{e}} N. Klingsheim and
                  Kjell J{\o}rgen Hole},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Robbing Banks with Their Own Software-an Exploit Against Norwegian
                  Online Banks},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_5},
  doi          = {10.1007/978-0-387-09699-5\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/EspelidNKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/FujiharaMY08,
  author       = {Yasuhiro Fujihara and
                  Yuko Murayama and
                  Kentarou Yamaguchi},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A user survey on the sense of security, Anshin},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {699--703},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_48},
  doi          = {10.1007/978-0-387-09699-5\_48},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/FujiharaMY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Gkoulalas-DivanisV08,
  author       = {Aris Gkoulalas{-}Divanis and
                  Vassilios S. Verykios},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A Parallelization Framework for Exact Knowledge Hiding in Transactional
                  Databases},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {349--363},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_23},
  doi          = {10.1007/978-0-387-09699-5\_23},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Gkoulalas-DivanisV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/GuptaNR08,
  author       = {Kapil Kumar Gupta and
                  Baikunth Nath and
                  Kotagiri Ramamohanarao},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {User Session Modeling for Effective Application Intrusion Detection},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {269--284},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_18},
  doi          = {10.1007/978-0-387-09699-5\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/GuptaNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/HamiltonH08,
  author       = {Samuel N. Hamilton and
                  Wendy L. Hamilton},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Adversary Modeling and Simulation in Cyber Warfare},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {461--475},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_30},
  doi          = {10.1007/978-0-387-09699-5\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/HamiltonH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/HanKL08,
  author       = {Jeheon Han and
                  Jonghoon Kwon and
                  Heejo Lee},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {HoneyID : Unveiling Hidden Spywares by Generating Bogus Events},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {669--673},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_43},
  doi          = {10.1007/978-0-387-09699-5\_43},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/HanKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/HayDN08,
  author       = {Brian Hay and
                  Ronald Dodge and
                  Kara L. Nance},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Using Virtualization to Create and Deploy Computer Security Lab Exercises},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {621--635},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_40},
  doi          = {10.1007/978-0-387-09699-5\_40},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/HayDN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/HerleyF08,
  author       = {Cormac Herley and
                  Dinei A. F. Flor{\^{e}}ncio},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Protecting Financial Institutions from Brute-Force Attacks},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {681--685},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_45},
  doi          = {10.1007/978-0-387-09699-5\_45},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/HerleyF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/JinLM08,
  author       = {Hongxia Jin and
                  Jeffery Lotspiech and
                  Nimrod Megiddo},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Efficient Coalition Detection in Traitor Tracing},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {365--380},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_24},
  doi          = {10.1007/978-0-387-09699-5\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/JinLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Kerschbaum08,
  author       = {Florian Kerschbaum},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Practical Privacy-Preserving Benchmarking},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_2},
  doi          = {10.1007/978-0-387-09699-5\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Kerschbaum08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LiWZZ08,
  author       = {Wei Li and
                  Lingyu Wang and
                  Bo Zhu and
                  Lei Zhang},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {An Integrity Lock Architecture for Supporting Distributed Authorizations
                  in Database Federations},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {189--203},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_13},
  doi          = {10.1007/978-0-387-09699-5\_13},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LiWZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LongleyBCK08,
  author       = {Dennis Longley and
                  Mark Branagan and
                  William J. Caelli and
                  Lam{-}for Kwok},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Feasibility of Automated Information Security Compliance Auditing},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {493--508},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_32},
  doi          = {10.1007/978-0-387-09699-5\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LongleyBCK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MajorczykTMS08,
  author       = {Fr{\'{e}}d{\'{e}}ric Majorczyk and
                  Eric Totel and
                  Ludovic M{\'{e}} and
                  Ayda Sa{\"{\i}}dane},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Anomaly Detection with Diagnosis in Diversified Systems using Information
                  Flow Graphs},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {301--315},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_20},
  doi          = {10.1007/978-0-387-09699-5\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/MajorczykTMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MetayerL08,
  author       = {Daniel Le M{\'{e}}tayer and
                  Claire Loiseaux},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {{ASTRA} : {A} Security Analysis Method Based on Asset Tracking},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {541--555},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_35},
  doi          = {10.1007/978-0-387-09699-5\_35},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/MetayerL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NeubauerEF08,
  author       = {Thomas Neubauer and
                  Andreas Ekelhart and
                  Stefan Fenz},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Interactive Selection of {ISO} 27001 Controls under Multiple Objectives},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {477--492},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_31},
  doi          = {10.1007/978-0-387-09699-5\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NeubauerEF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NguyenAB08,
  author       = {Kien C. Nguyen and
                  Tansu Alpcan and
                  Tamer Basar},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A Decentralized Bayesian Attack Detection Algorithm for Network Security},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {413--428},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_27},
  doi          = {10.1007/978-0-387-09699-5\_27},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NguyenAB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NohlE08,
  author       = {Karsten Nohl and
                  David Evans},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Hiding in Groups: On the Expressiveness of Privacy Distributions},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_1},
  doi          = {10.1007/978-0-387-09699-5\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NohlE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/OualhaOR08,
  author       = {Nouha Oualha and
                  Melek {\"{O}}nen and
                  Yves Roudier},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A Security Protocol for Self-Organizing Data Storage},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {675--679},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_44},
  doi          = {10.1007/978-0-387-09699-5\_44},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/OualhaOR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PanHV08,
  author       = {Jing Pan and
                  J. I. den Hartog and
                  Erik P. de Vink},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {An Operation-Based Metric for {CPA} Resistance},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {429--443},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_28},
  doi          = {10.1007/978-0-387-09699-5\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PanHV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PivaOCBB08,
  author       = {Alessandro Piva and
                  Claudio Orlandi and
                  Michele Caini and
                  Tiziano Bianchi and
                  Mauro Barni},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Enhancing Privacy in Remote Data Classification},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {33--46},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_3},
  doi          = {10.1007/978-0-387-09699-5\_3},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/PivaOCBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PosthumusS08,
  author       = {Shaun Posthumus and
                  Rossouw von Solms},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Agency Theory: Can it be Used to Strengthen {IT} Governance?},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {687--691},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_46},
  doi          = {10.1007/978-0-387-09699-5\_46},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PosthumusS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/RaguenetM08,
  author       = {Inez Raguenet and
                  Carlos Maziero},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A Fuzzy Model for the Composition of Intrusion Detectors},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_16},
  doi          = {10.1007/978-0-387-09699-5\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/RaguenetM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/RayC08,
  author       = {Indrajit Ray and
                  Sudip Chakraborty},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Facilitating Privacy Related Decisions in Different Privacy Contexts
                  on the Internet by Evaluating Trust in Recipients of Private Data},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {605--620},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_39},
  doi          = {10.1007/978-0-387-09699-5\_39},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/RayC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/RekhisKB08,
  author       = {Slim Rekhis and
                  Jih{\`{e}}ne Krich{\`{e}}ne and
                  Noureddine Boudriga},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {DigForNet: Digital Forensic in Networking},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {637--651},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_41},
  doi          = {10.1007/978-0-387-09699-5\_41},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/RekhisKB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SanchezCLG08,
  author       = {Manuel S{\'{a}}nchez and
                  {\'{O}}scar C{\'{a}}novas Reverte and
                  Gabriel L{\'{o}}pez and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Managing the lifecycle of {XACML} delegation policies in federated
                  environments},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {717--721},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_51},
  doi          = {10.1007/978-0-387-09699-5\_51},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/SanchezCLG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SaraydaryanPLU08,
  author       = {Jacques Saraydaryan and
                  Luc Paffumi and
                  V{\'{e}}ronique Legrand and
                  St{\'{e}}phane Ub{\'{e}}da},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Behavioral Intrusion Detection Indicators},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {317--331},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_21},
  doi          = {10.1007/978-0-387-09699-5\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SaraydaryanPLU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SchefflerGS08,
  author       = {Thomas Scheffler and
                  Stefan Gei{\ss} and
                  Bettina Schnor},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {An Implementation of a Privacy Enforcement Scheme based on the Java
                  Security Framework using {XACML} Policies},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {157--171},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_11},
  doi          = {10.1007/978-0-387-09699-5\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SchefflerGS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SeoLN08,
  author       = {Dongwon Seo and
                  Heejo Lee and
                  Ejovi Nuwere},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Detecting More {SIP} Attacks on VoIP Services by Combining Rule Matching
                  and State Transition Models},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {397--411},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_26},
  doi          = {10.1007/978-0-387-09699-5\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SeoLN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Strangio08,
  author       = {Maurizio Adriano Strangio},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Establishing secure links in low-rate wireless personal area networks},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {109--123},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_8},
  doi          = {10.1007/978-0-387-09699-5\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Strangio08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TengHP08,
  author       = {Po{-}Yuan Teng and
                  Shih{-}I Huang and
                  Adrian Perrig},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Multi-Layer Encryption for Multi-Level Access Control in Wireless
                  Sensor Networks},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {705--709},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_49},
  doi          = {10.1007/978-0-387-09699-5\_49},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/TengHP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TjhaiPFC08,
  author       = {Gina C. Tjhai and
                  Maria Papadaki and
                  Steven Furnell and
                  Nathan L. Clarke},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Investigating the problem of {IDS} false alarms: An experimental study
                  using Snort},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {253--267},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_17},
  doi          = {10.1007/978-0-387-09699-5\_17},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/TjhaiPFC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TsakountakisKG08,
  author       = {Alexandros Tsakountakis and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A new Accounting Mechanism for Modern and Future {AAA} Services},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {693--697},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_47},
  doi          = {10.1007/978-0-387-09699-5\_47},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/TsakountakisKG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TsangS08,
  author       = {Patrick P. Tsang and
                  Sean W. Smith},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {{YASIR:} {A} Low-Latency, High-Integrity Security Retrofit for Legacy
                  {SCADA} Systems},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {445--459},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_29},
  doi          = {10.1007/978-0-387-09699-5\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/TsangS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VerslypeD08,
  author       = {Kristof Verslype and
                  Bart De Decker},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Ubiquitous Privacy-Preserving Identity Managment},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {589--603},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_38},
  doi          = {10.1007/978-0-387-09699-5\_38},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/VerslypeD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WuYB08,
  author       = {Yongdong Wu and
                  Haixia Yao and
                  Feng Bao},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Minimizing {SSO} Effort in Verifying {SSL} Anti-phishing Indicators},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {47--61},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_4},
  doi          = {10.1007/978-0-387-09699-5\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/WuYB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YeeKS08,
  author       = {George O. M. Yee and
                  Larry Korba and
                  Ronggong Song},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Assessing the Likelihood of Privacy Policy Compliance},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {723--727},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_52},
  doi          = {10.1007/978-0-387-09699-5\_52},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/YeeKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ZhouDL08,
  author       = {Jianying Zhou and
                  Tanmoy Kanti Das and
                  Javier L{\'{o}}pez},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {An Asynchronous Node Replication Attack in Wireless Sensor Networks},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {125--139},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_9},
  doi          = {10.1007/978-0-387-09699-5\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ZhouDL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2008,
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  publisher    = {Springer},
  year         = {2008},
  isbn         = {978-0-387-09698-8},
  timestamp    = {Wed, 17 Sep 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics