Skip to main content
  • Conference proceedings
  • © 2013

Foundations and Practice of Security

5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7743)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FPS: International Symposium on Foundations and Practice of Security

Conference proceedings info: FPS 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Cryptography and Information Theory

    1. Proofs of Retrievability via Fountain Code

      • Sumanta Sarkar, Reihaneh Safavi-Naini
      Pages 18-32
    2. MARC: Modified ARC4

      • Jianliang Zheng, Jie Li
      Pages 33-44
    3. Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements

      • Pawel Chwalinski, Roman Belavkin, Xiaochun Cheng
      Pages 45-61
  3. Key Management and Cryptographic Protocols

    1. COMPASS: Authenticated Group Key Agreement from Signcryption

      • Nick Mailloux, Ali Miri, Monica Nevins
      Pages 95-114
  4. Privacy and Trust

    1. Classifying Online Social Network Users through the Social Graph

      • Cristina Pérez-Solà, Jordi Herrera-Joancomartí
      Pages 115-131
    2. A Formal Derivation of Composite Trust

      • Tim Muller, Patrick Schweitzer
      Pages 132-148
    3. IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability

      • Ahmad AlSa’deh, Hosnieh Rafiee, Christoph Meinel
      Pages 149-161
  5. Policies and Applications Security

    1. Policy Administration in Tag-Based Authorization

      • Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone
      Pages 162-179
    2. Enabling Dynamic Security Policy in the Java Security Manager

      • Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens
      Pages 180-193
    3. A Novel Obfuscation: Class Hierarchy Flattening

      • Christophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere
      Pages 194-210
    4. RESource: A Framework for Online Matching of Assembly with Open Source Code

      • Ashkan Rahimian, Philippe Charland, Stere Preda, Mourad Debbabi
      Pages 211-226
    5. Touchjacking Attacks on Web in Android, iOS, and Windows Phone

      • Tongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du
      Pages 227-243
  6. Network and Adaptive Security

    1. Short-Term Linkable Group Signatures with Categorized Batch Verification

      • Lukas Malina, Jordi Castellà-Roca, Arnau Vives-Guasch, Jan Hajny
      Pages 244-260
    2. GHUMVEE: Efficient, Effective, and Flexible Replication

      • Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere
      Pages 261-277
    3. Extracting Attack Scenarios Using Intrusion Semantics

      • Sherif Saad, Issa Traore
      Pages 278-292
    4. On Securely Manipulating XML Data

      • Houari Mahfoud, Abdessamad Imine
      Pages 293-307

Other Volumes

  1. Foundations and Practice of Security

About this book

This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 21 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.

Editors and Affiliations

  • TELECOM SudParis, Evry, France

    Joaquin Garcia-Alfaro

  • TELECOM Bretagne, Cesson Sévigné, France

    Frédéric Cuppens, Nora Cuppens-Boulahia

  • Ryerson University, Toronto, Canada

    Ali Miri

  • Université Laval, Quebec, Canada

    Nadia Tawbi

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access