Loading…

Information security theory and practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings /

This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selecte...

Full description

Saved in:
Bibliographic Details
Corporate Authors: WISTP (Conference) Ērakleion, Greece), SpringerLink (Online service)
Other Authors: Hancke, Gerhard P. (Editor), Damiani, Ernesto, 1960- (Editor)
Format: Conference Proceeding eBook
Language:English
Published: Cham : Springer, 2018.
Series:Lecture notes in computer science ; 10741.
LNCS sublibrary. Security and cryptology.
Physical Description:
1 online resource (xii, 189 pages) : illustrations.
Subjects:
Online Access:SpringerLink - Click here for access
Contents:
  • Intro
  • Preface
  • Organization
  • Contents
  • Security in Emerging Systems
  • A Secure and Trusted Channel Protocol for UAVs Fleets
  • 1 Introduction
  • 1.1 Contribution
  • 1.2 Structure of the Paper
  • 2 UAVs Fleet and Rationale for a STCP
  • 2.1 Assets to Protect, Adversary Model and SE
  • 2.2 SE Usage and Its Security Features
  • 2.3 Rationale for a STCP
  • 3 Related Work
  • 3.1 Related Work on Security Concerns of UAVs Fleets
  • 3.2 Related Work on Secure Channel Protocols
  • 4 Secure and Trusted Channel Protocol
  • 4.1 Security Comparison Criteria
  • 4.2 Protocol Notation.
  • 4.3 Pre-protocol Setup
  • 4.4 Proposed Protocol
  • 4.5 Post-protocol Process
  • 4.6 Protocol Resumption
  • 5 Protocol Evaluation
  • 5.1 Brief Informal Analysis
  • 5.2 Revisiting the Requirements and Goals
  • 5.3 Protocol Verification by CasperFDR and AVISPA
  • 6 Conclusion and Future Research Directions
  • Appendix A CasperFDR Script
  • Appendix B AVISPA Script
  • References
  • Philanthropy on the Blockchain
  • 1 Introduction
  • 2 Benefits of Blockchain Solutions for Charities/Donors
  • 3 The Blockchain Philanthropic Model
  • 3.1 Bitcoin Transaction Methods.
  • 4 The Philanthropic Model in an Offline Environment
  • 4.1 SMS Payments and Bitcoin
  • 4.2 Security Requirements and Adversarial Model
  • 4.3 Proposed SMS-Based Bitcoin Payment Scheme
  • 4.4 Processing a Bitcoin Payment Request
  • 5 Analysis
  • 6 Conclusion and Future Work
  • References
  • Security of Data
  • Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database
  • 1 Introduction
  • 2 Related Work
  • 3 Overview of LWC
  • 3.1 System Model
  • 3.2 Threat Model
  • 3.3 System Interactions
  • 4 Key Management and Data Representation
  • 4.1 Key Management.
  • 4.2 Data Structure for the CS
  • 4.3 Data Structure for the OPS
  • 5 Query Execution
  • 5.1 Encryption on the DBU
  • 5.2 Index Search on the OPS
  • 5.3 Oblivious Access
  • 5.4 Data Decryption
  • 6 Security Analysis
  • 7 Experimental Evaluation
  • 8 Conclusion and Future Work
  • References
  • JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language
  • 1 Introduction
  • 2 Problem Statement
  • 3 JACPoL Detailed Design
  • 3.1 Fundamental Design Choices
  • 3.2 Policy Structure
  • 3.3 Syntax and Conventions
  • 3.4 Policy Sets, Policies and Rules
  • 3.5 Targets and Conditions.
  • 3.6 Combining Algorithms
  • 3.7 Obligations
  • 3.8 Implementation
  • 4 Comparative Analysis
  • 5 Application of JACPoL to Security Models
  • 5.1 RBAC vs ABAC
  • 5.2 Attribute-Centric RBAC Application
  • 5.3 Role-Centric ABAC Application
  • 6 Conclusion
  • References
  • Trusted Execution
  • EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
  • 1 Introduction
  • 2 Related Work
  • 2.1 Secure Untrusted System Logging
  • 2.2 Secure Logging with Trusted Hardware
  • 2.3 Discussion
  • 3 Trusted Execution Environments (TEEs)
  • 4 System Requirements
  • 5 EmLog Architecture Design.