Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, ProceedingsAudun Jøsang, Torleiv Maseng, Svein J. Knapskog The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic countries – thereby establishing a forum for discussions and co-operation between universities, industry and computer societies. Since then, the workshop has developed into a fully fledged inter- tional information security conference, held in the Nordic countries on a round robin basis. The 14th Nordic Conference on Secure IT Systems was held in Oslo on 14-16 October 2009. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile n- works under an increasingly serious threat picture. Among the contemporary security issues discussed were security services modeling, Petri nets, attack graphs, electronic voting schemes, anonymous payment schemes, mobile ID-protocols, SIM cards, n- work embedded systems, trust, wireless sensor networks, privacy, privacy disclosure regulations, financial cryptography, PIN verification, temporal access control, random number generators, and some more. As a pre-cursor to the conference proper, the Nordic Security Day on Wednesday 14 October hosted talks by leading representatives from industry, academia and the g- ernment sector, and a press conference was given. |
Other editions - View all
Common terms and phrases
abnormal returns access control accounting instance adversary algorithm AN.ON analysis anonymous networks attack authentication block cipher bytes CAPTCHA cascade change point client Computer Computer Security Contiki control code correlation cost confirmation cryptographic decimalisation detection device DHCP DigiDocService digits encrypted enforcement mechanism execution exit node extractor function graph Heidelberg identified IEEE implemented information security input interface Internet iterative keystream LNCS malicious min-entropy mobile real-time services monitoring operator output P2Priv packets paper payment instance Petname Model Petname Systems Petname Tool Petri nets phishing Policy automaton primary parameter privacy breach protocol public key Rabin automaton random randomness extractor requirements scenario secondary parameters security policy security property sequence server smart card Technology TKIP token Trojan trust user’s valid verify voter voting scheme widget widget engine wireless wireless sensor networks xor xor xor XTEA