Home // SECURWARE

SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Notes: IARIA Conference.

Editors:
George Yee, Carleton University, Canada
Stefan Rass, Universitaet Klagenfurt, Austria
Stefan Schauer, Austrian Institute of Technology, Center of Digital
Safety and Security, Vienna, Austria
Martin Latzenhofer, Austrian Institute of Technology, Center of Digital
Safety and Security, Vienna, Austria

ISSN: 2162-2116

ISBN: 978-1-61208-661-3

Location: Venice, Italy

Dates: from September 16, 2018 to September 20, 2018

Articles: there are 24 articles

Analysing Trends and Success Factors of International Cybersecurity Capacity-Building Initiatives
Faisal Hameed, Ioannis Agrafiotis, Carolin Weisser, Michael Goldsmith, and Sadie Creese
keywords: Capacity Building Initiatives; Capacity Maturity Model

Towards a Quantitative Approach for Security Assurance Metrics
Goitom Weldehawaryat and Basel Katt
keywords: Quantitative security assurance metrics; Security testing; Goal question metric (GQM); Common vulnerability scoring system (CVSS); Security metrics.

Sensitive Data Anonymization Using Genetic Algorithms for SOM-based Clustering
Fatemeh Amiri, Gerald Quirchmayr, and Peter Kieseberg
keywords: Privacy-preserving; Big Data; Clustering; Kohonen's map; SOM; Genetic Algorithms

New Covert Channels in Internet of Things
Aleksandra Mileva, Aleksandar Velinov, and Done Stojanov
keywords: network steganography; covert channels; data hiding

Towards a Protection Profile for User-Centric and Self-Determined Privacy Management in Biometrics
Salatiel Ezennaya Gomez, Jana Dittmann, and Claus Vielhauer
keywords: GDPR; privacy; biometric data; sensible data; in- formed consent; transparency.

Exploiting User Privacy in IoT Devices Using Deep Learning and its Mitigation
Rana AlAmeedee and Wonjun Lee
keywords: Internet of Thing; Smart Home; Privacy; Deep Learning

Secure Collaborative Development of Cloud Application Deployment Models
Vladimir Yussupov, Michael Falkenthal, Oliver Kopp, Frank Leymann, and Michael Zimmermann
keywords: Collaboration; Security Policy; Confidentiality; Integrity; Deployment Automation; TOSCA

Pro-SRCC: Proxy-based Scalable Revocation for Constant Ciphertext Length
Zeya Umayya and Divyashikha Sethia
keywords: PIRATTE; CP-ABE; ProSRCC

A Logic-Based Network Security Zone Modelling Methodology
Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, Francois Barrère, and Abdelmalek Benzekri
keywords: Network Security requirements; Security zoning

Towards a Blockchain-based Identity Provider
Andreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, and Christoph Meinel
keywords: Blockchain; distributed ledger technology; digital identity; self-sovereign identity; Ethereum

Enhancement of Usability of Information Security Systems
Gwangil Ju and HarkSoo Park
keywords: Usability; Compliance; Information Security System;

Information Security Resilience for Public Sector
HarkSoo Park and Gwangil Ju
keywords: Information Security System; Resilience; Compliance

Cyber Security Threats Targeting CPS Systems: A Novel Approach Using Honeypot
Sameera Almulla, Elias Bou-Harb, and Claude Fachkha
keywords: SCADA System; CPS Security; CPS honeypots; Threat characterization.

Metrics for Continuous Active Defence
George O. M. Yee
keywords: sensitive data, vulnerability, security measure, security level, metrics, continuous defence

The Probable Cyber Attack Concept Exploiting Interrupt Vulnerability in Nuclear Power Plants
Taehee Kim, Soomin Lim, and Sangwoo Kim
keywords: nuclear power plant; cyber threat; cyber attack; I&C system; preemptive OS; interrupt

Secure Cooperation of Untrusted Components
Roland Wismüller and Damian Ludwig
keywords: Software-components, security, typesystems

Implementation of Eavesdropping Protection Method over MPTCP Using Data Scrambling and Path Dispersion
Toshihiko Kato, Shihan Cheng, Ryo Yamamoto, Satoshi Ohzahata, and Nobuo Suzuki
keywords: Multipath TCP; Eavesdropping; Data Dispersion; Data Scrambling.

Deployment Enforcement Rules for TOSCA-based Applications
Michael Zimmermann, Uwe Breitenbücher, Christoph Krieger, and Frank Leymann
keywords: Cloud Computing; Application Provisioning; Automation; TOSCA; Security

A Botnet Detection System Based on Machine-Learning Using Flow-Based Features
Chien-Hau Hung and Hung-Min Sun
keywords: botnet; machine learning; feature selection; J48

Enhanced Software Implementation of a Chaos-Based Stream Cipher
Guillaume Gautier, Safwan El Assad, Olivier Deforges, Sylvain Guilley, Adrien Facon, and Wassim Hamidouche
keywords: Chaos-based stream ciphers, Constant time, Statistical analysis, Computational performance.

Adopting an ISMS Based Model for Better ITSM in Financial Institutions
Zidiegha Seiyaboh and Mohammed Bahja
keywords: Information Security Management System; Information Technology Service Management; ISO Standards; IT services; Service Operation.

Authentic Quantum Nonces
Stefan Rass, Peter Schartner, and Jasmin Wachter
keywords: Quantum Cryptography; Randomness Substitution Attack; Random number generation; Security; Authentication

Cyber-Security Aspects for Smart Grid Maritime Infrastructures
Monica Canepa, Giampaolo Frugone, Stefan Schauer, and Riccardo Bozzo
keywords: Smart grid, ports, energy security, cyber-attacks

Practical Risk Analysis in Interdependent Critical Infrastructures - a How-To
Sandra König, Thomas Grafenauer, Stefan Rass, and Stefan Schauer
keywords: critical infrastructure; dependencies; stochastic model; risk propagation; water supply