Exposing Security Risks for Commercial Mobile Devices Zhaohui Wang, Ryan Johnson, Rahul Murmuria, and Angelos Stavrou
From Qualitative to Quantitative Enforcement of Security Policy Fabio Martinelli, Ilaria Matteucci, and Charles Morisset
Design and Implementation of a Cloud-based Assured Information Sharing System Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar, and Bhavani Thuraisingham
Sections
1. Applied Cryptography and Security Protocols
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries Victor Yakovlev, Valery Korzhik, Mihail Bakaev, and Guillermo Morales-Luna
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols Joe-Kai Tsay and Stig F. Mjolsnes
Blind 384-bit Digital Signature Scheme Alexandr Moldovyan, Nikolay Moldovyan, and Evgenia Novikova
2. Access Control and Information Protection
RABAC: Role-Centric Attribute-Based Access Control Xin Jin, Ravi Sandhu, and Ram Krishnan
Trust-aware RBACies Vladimir Oleshchuk
Alternative Mechanisms for Information Security Alexander Grusho, Nick Grusho, and Elena Timonina
3. Security Policies
Enforcing information flow policies by a three-valued analysis Josee Desharnais, Erwamme P. Kanyabwero, and Nadia Tawbi
Towards the orchestration of secured services under non-disclosure policies Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, and Mathieu Turuani
A Combined Approach for Network Information Flow Analysis for Systems of Embedded Components Andrey Chechulin, Igor Kotenko, and Vasily Desnitsky
4. Security Event and Information Management
Individual Countermeasure Selection based on the Return On Response Investment Index Gustavo Gonzalez Granadillo, Herve Debar, Gregoire Jacob, Chrystel Gaber, and Mohammed Achemlal
Security and Reliability Requirements for Advanced Security Event Management Roland Rieke, Luigi Coppolino, Andrew Hutchison, Elsa Prieto, and Chrystel Gaber
Model-based Security Event Management Julian Schutte, Roland Rieke, and Timo Winkelvos
5. Intrusion Prevention, Detection, and Response
Using Behavioral Modeling And Customized Normalcy Profiles As Protection Against Targeted Cyber-Attacks Andrey Dolgikh, Tomas Nykodym, Victor Skormin, and Zachary Birnbaum
Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation Yosra Ben Mustapha, Herve Debar, and Gregoire Jacob
Stochastic model of interaction between botnets and distributed computer defense systems Dmitry P. Zegzhda and Tatiana V. Stepanova
6. Anti-malware Techniques
Malware Characterization using Behavioral Components Chaitanya Yavvari, Arnur Tokhtabayev, Huzefa Rangwala, and Angelos Stavrou
MADAM: a Multi-Level Anomaly Detector for Android Malware Gianluca Dini, Fabio Martinelli, Andrea Saracino, and Daniele Sgandurra
Using Low-Level Dynamic Attributes for Malware Detection based on Data Mining Methods Dmitry Komashinskiy and Igor Kotenko
7. Security Modeling and Cloud Security
Configuration-based approach to embedded device security Vasily Desnitsky, Igor Kotenko, and Andrey Chechulin
A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts Brendan Kerrigan and Yu Chen
Security Modeling of Grid Systems Using Petri Nets Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, and Artem S. Konoplev
Using graph theory for cloud system security modeling Peter D. Zegzhda, Dmitry P. Zegzhda, and Alexey V. Nikolskiy