Home // SECURWARE
SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies
Type: conference
Notes: IARIA Conference.
Editors:
George Yee, Carleton University, Canada
Stefan Rass, Universitaet Klagenfurt, Austria
Stefan Schauer, Austrian Institute of Technology, Center of Digital
Safety and Security, Vienna, Austria
Martin Latzenhofer, Austrian Institute of Technology, Center of Digital
Safety and Security, Vienna, Austria
ISSN: 2162-2116
ISBN: 978-1-61208-661-3
Location: Venice, Italy
Dates: from September 16, 2018 to September 20, 2018
Articles: there are 24 articles
Analysing Trends and Success Factors of International Cybersecurity Capacity-Building Initiatives
Faisal Hameed, Ioannis Agrafiotis, Carolin Weisser, Michael Goldsmith, and Sadie Creese
keywords: Capacity Building Initiatives; Capacity Maturity Model
Towards a Quantitative Approach for Security Assurance Metrics
Goitom Weldehawaryat and Basel Katt
keywords: Quantitative security assurance metrics; Security testing; Goal question metric (GQM); Common vulnerability scoring system (CVSS); Security metrics.
Sensitive Data Anonymization Using Genetic Algorithms for SOM-based Clustering
Fatemeh Amiri, Gerald Quirchmayr, and Peter Kieseberg
keywords: Privacy-preserving; Big Data; Clustering; Kohonen's map; SOM; Genetic Algorithms
New Covert Channels in Internet of Things
Aleksandra Mileva, Aleksandar Velinov, and Done Stojanov
keywords: network steganography; covert channels; data hiding
Towards a Protection Profile for User-Centric and Self-Determined Privacy Management in Biometrics
Salatiel Ezennaya Gomez, Jana Dittmann, and Claus Vielhauer
keywords: GDPR; privacy; biometric data; sensible data; in- formed consent; transparency.
Exploiting User Privacy in IoT Devices Using Deep Learning and its Mitigation
Rana AlAmeedee and Wonjun Lee
keywords: Internet of Thing; Smart Home; Privacy; Deep Learning
Secure Collaborative Development of Cloud Application Deployment Models
Vladimir Yussupov, Michael Falkenthal, Oliver Kopp, Frank Leymann, and Michael Zimmermann
keywords: Collaboration; Security Policy; Confidentiality; Integrity; Deployment Automation; TOSCA
Pro-SRCC: Proxy-based Scalable Revocation for Constant Ciphertext Length
Zeya Umayya and Divyashikha Sethia
keywords: PIRATTE; CP-ABE; ProSRCC
A Logic-Based Network Security Zone Modelling Methodology
Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, Francois Barrère, and Abdelmalek Benzekri
keywords: Network Security requirements; Security zoning
Towards a Blockchain-based Identity Provider
Andreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, and Christoph Meinel
keywords: Blockchain; distributed ledger technology; digital identity; self-sovereign identity; Ethereum
Enhancement of Usability of Information Security Systems
Gwangil Ju and HarkSoo Park
keywords: Usability; Compliance; Information Security System;
Information Security Resilience for Public Sector
HarkSoo Park and Gwangil Ju
keywords: Information Security System; Resilience; Compliance
Cyber Security Threats Targeting CPS Systems: A Novel Approach Using Honeypot
Sameera Almulla, Elias Bou-Harb, and Claude Fachkha
keywords: SCADA System; CPS Security; CPS honeypots; Threat characterization.
Metrics for Continuous Active Defence
George O. M. Yee
keywords: sensitive data, vulnerability, security measure, security level, metrics, continuous defence
The Probable Cyber Attack Concept Exploiting Interrupt Vulnerability in Nuclear Power Plants
Taehee Kim, Soomin Lim, and Sangwoo Kim
keywords: nuclear power plant; cyber threat; cyber attack; I&C system; preemptive OS; interrupt
Secure Cooperation of Untrusted Components
Roland Wismüller and Damian Ludwig
keywords: Software-components, security, typesystems
Implementation of Eavesdropping Protection Method over MPTCP Using Data Scrambling and Path Dispersion
Toshihiko Kato, Shihan Cheng, Ryo Yamamoto, Satoshi Ohzahata, and Nobuo Suzuki
keywords: Multipath TCP; Eavesdropping; Data Dispersion; Data Scrambling.
Deployment Enforcement Rules for TOSCA-based Applications
Michael Zimmermann, Uwe Breitenbücher, Christoph Krieger, and Frank Leymann
keywords: Cloud Computing; Application Provisioning; Automation; TOSCA; Security
A Botnet Detection System Based on Machine-Learning Using Flow-Based Features
Chien-Hau Hung and Hung-Min Sun
keywords: botnet; machine learning; feature selection; J48
Enhanced Software Implementation of a Chaos-Based Stream Cipher
Guillaume Gautier, Safwan El Assad, Olivier Deforges, Sylvain Guilley, Adrien Facon, and Wassim Hamidouche
keywords: Chaos-based stream ciphers, Constant time, Statistical analysis, Computational performance.
Adopting an ISMS Based Model for Better ITSM in Financial Institutions
Zidiegha Seiyaboh and Mohammed Bahja
keywords: Information Security Management System; Information Technology Service Management; ISO Standards; IT services; Service Operation.
Authentic Quantum Nonces
Stefan Rass, Peter Schartner, and Jasmin Wachter
keywords: Quantum Cryptography; Randomness Substitution Attack; Random number generation; Security; Authentication
Cyber-Security Aspects for Smart Grid Maritime Infrastructures
Monica Canepa, Giampaolo Frugone, Stefan Schauer, and Riccardo Bozzo
keywords: Smart grid, ports, energy security, cyber-attacks
Practical Risk Analysis in Interdependent Critical Infrastructures - a How-To
Sandra König, Thomas Grafenauer, Stefan Rass, and Stefan Schauer
keywords: critical infrastructure; dependencies; stochastic model; risk propagation; water supply