TY - BOOK AU - Bernsmed,Karin AU - Fischer-Hübner,Simone TI - Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings SN - 9783319115993 PY - 2014/// CY - Cham PB - Springer International Publishing KW - Computer science KW - Computer security KW - Data encryption (Computer science) KW - Biometrics (Biology) N1 - Accountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- π-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients' Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied π-Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798-2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication UR - http://dx.doi.org/10.1007/978-3-319-11599-3 ER -