Skip to main content
  • Conference proceedings
  • © 2007

New Approaches for Security, Privacy and Trust in Complex Environments

Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa

  • Most up-to-date research on computer security and privacy
  • Covers a range of topics including digital forensics, access control, and human computer interaction
  • Includes supplementary material: sn.pub/extras

Conference proceedings info: SEC 2007.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (46 papers)

  1. Front Matter

    Pages I-XV
  2. Human-Computer Interaction I

    1. Value creation and Return On Security Investments (ROSI)

      • Christer Magnusson, Josef Molvidsson, Sven Zetterqvist
      Pages 25-35
    2. Usability and Security of Personal Firewalls

      • Almut Herzog, Nahid Shahmehri
      Pages 37-48
  3. Computer-Based Trust

    1. Trusted Ticket Systems and Applications

      • Nicolai Kuntze, Andreas U. Schmidt
      Pages 49-60
    2. Trust Evaluation for Web Applications based on Behavioral Analysis

      • Luiz Fernando Rust C. Carmo, Breno G. de Oliveira, Augusto C. Braga
      Pages 61-72
  4. Information Security Management I

    1. Improving the Information Security Model by using TFI

      • Rose-Mharie Ã…hlfeldt, Paolo Spagnoletti, Guttorm Sindre
      Pages 73-84
    2. Ontological Mapping of Common Criteria’s Security Assurance Requirements

      • Andreas Ekclhart, Stefan Fenz, Gernot Goluch, Edgar Weippl
      Pages 85-95
  5. Network Security I

    1. Management of Exceptions on Access Control Policies

      • J. G. Alfaro, F. Cuppens, N. Cuppens-Boulahia
      Pages 97-108
  6. Information Security Management II

    1. Exploratory survey on an Evaluation Model for a Sense of Security

      • Natsuko Hikage, Yuko Murayama, Carl Hauser
      Pages 121-132
    2. Employees’ Adherence to Information Security Policies: An Empirical Study

      • Mikko Siponen, Seppo Pahnila, Adam Mahmood
      Pages 133-144
  7. Network Security II

    1. Phishing in the Wireless: Implementation and Analysis

      • Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, Jens B. Schmitt
      Pages 145-156
  8. Access Control I

    1. A Credential-Based System for the Anonymous Delegation of Rights

      • Liesje Demuynck, Bart De Decker, Wouter Joosen
      Pages 169-180
    2. Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content

      • Christian J. Eibl, S H Basie von Solms, Sigrid Schubert
      Pages 181-192
  9. Human-Computer Interaction II

    1. Identity Theft — Empirical evidence from a Phishing Exercise

      • T Steyn, H A Kruger, L Drevin
      Pages 193-203
    2. A Practical Usability Evaluation of Security Features in End-User Applications

      • S. M. Furnell, D. Katsabas, P. S. Dowland, F. Reid
      Pages 205-216
  10. Intrusion Detection Systems

    1. Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis

      • A. M. Rossudowski, H. S. Venter, J. H. P. Eloff
      Pages 217-228

Other Volumes

  1. New Approaches for Security, Privacy and Trust in Complex Environments

About this book

This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Security, Privacy and Trust in Complex Environments" held in Sandton, South Africa from 14 to 16 May 2007. The IFIP/SEC conferences are the flagship events of TC-11. In May 1995 South Africa for the first time hosted an IFIP/SEC conference in Cape Town. Now, twelve years later, we are very pleased to have succeeded in our bid to once again present the IFIP/SEC conference in South Africa. The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This modem environment challenges the whole information security research community to focus on interdisciplinary and holistic approaches, whilst retaining the benefit of previous research efforts. Papers offering research contributions that focus both on access control in complex environments and on other aspects of computer security and privacy were solicited for submission to IFIP/SEC 2007. A total of 107 submissions were received, which were all reviewed by at least three members of the international programme committee.

Editors and Affiliations

  • University of Pretoria, South Africa

    Hein Venter, Jan Eloff

  • University of South Africa, South Africa

    Mariki Eloff

  • University of Johannesburg, South Africa

    Les Labuschagne

  • Nelson Mandela Metropolitan University, South Africa

    Rossouw Solms

Bibliographic Information

  • Book Title: New Approaches for Security, Privacy and Trust in Complex Environments

  • Book Subtitle: Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa

  • Editors: Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw Solms

  • Series Title: IFIP Advances in Information and Communication Technology

  • DOI: https://doi.org/10.1007/978-0-387-72367-9

  • Publisher: Springer New York, NY

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: IFIP International Federation for Information Processing 2007

  • Hardcover ISBN: 978-0-387-72366-2Published: 11 May 2007

  • Softcover ISBN: 978-1-4419-4433-7Published: 23 November 2010

  • eBook ISBN: 978-0-387-72367-9Published: 10 November 2007

  • Series ISSN: 1868-4238

  • Series E-ISSN: 1868-422X

  • Edition Number: 1

  • Number of Pages: XV, 498

  • Topics: Cryptology, Systems and Data Security

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access