Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings
Audun Jøsang, Torleiv Maseng, Svein J. Knapskog
Springer Science & Business Media, Sep 29, 2009 - Computers - 303 pages
The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic countries – thereby establishing a forum for discussions and co-operation between universities, industry and computer societies. Since then, the workshop has developed into a fully fledged inter- tional information security conference, held in the Nordic countries on a round robin basis. The 14th Nordic Conference on Secure IT Systems was held in Oslo on 14-16 October 2009. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile n- works under an increasingly serious threat picture. Among the contemporary security issues discussed were security services modeling, Petri nets, attack graphs, electronic voting schemes, anonymous payment schemes, mobile ID-protocols, SIM cards, n- work embedded systems, trust, wireless sensor networks, privacy, privacy disclosure regulations, financial cryptography, PIN verification, temporal access control, random number generators, and some more. As a pre-cursor to the conference proper, the Nordic Security Day on Wednesday 14 October hosted talks by leading representatives from industry, academia and the g- ernment sector, and a press conference was given.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
abnormal returns access control accounting instance adversary algorithm AN.ON analysis attack authentication block cipher bytes CAPTCHA certiﬁcate change point client Computer Computer Security Contiki control code correlation cost conﬁrmation cryptographic decimalisation deﬁned Deﬁnition detection device DHCP diﬀerent DigiDocService digits eﬀective encrypted execution exit node extractor ﬁnite ﬁrst function graph Heidelberg identiﬁed IEEE implemented inﬁnite information security input interface Internet iterative keystream LNCS malicious min-entropy mobile real-time services monitoring operator output P2Priv packets PAN PAN PAN payment instance Petname Petname Model Petname Systems Petname Tool Petri nets Policy automaton primary parameter privacy breach protocol Rabin automaton random randomness extractor requirements scenario secondary parameters Section security policy sequence server SIM card speciﬁc Technology TKIP token traﬃc Trojan trust user’s valid veriﬁcation voter voting scheme widget widget engine wireless wireless sensor networks XTEA