|
The Eighth International Conference on Emerging Security Information, Systems and Technologies
SECURWARE 2014
November 16 - 20, 2014 - Lisbon, Portugal |
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.
Awarded Papers
The Policy-Based AS_PATH Verification to Monitor AS Path Hijacking
Je-Kuk Yun, Beomseok Hong, Yanggon Kim
N-Gram-Based User Behavioral Model for Continuous User Authentication
Leslie Milton, Bryan Robbins, Atif Memon
Saving Privacy in Trust-Based User-Centric Distributed Systems
Alessandro Aldini
Performance Impacts in Database Privacy-Preserving Biometric Authentication
Jana Dittmann, Veit Köppen, Christian Krätzer, Martin Leuckert, Gunter Saake, Claus Vielhauer
A Backtracking Symbolic Execution Engine with Sound Path Merging
Andreas Ibing
Ghost Map: Proving Software Correctness using Games
Ronald Watro, Kerry Moffitt, Talib Hussain, Daniel Wyschogrod, John Ostwald, Derrick Kong, Clint Bowers, Eric Church, Joshua Guttman, Qinsi Wang
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.
Papers Invited for IARIA Journals
Security of Vehicular Networks: Static and Dynamic Control of Cyber-Physical Objects
Vladimir Muliukha, Vladimir Zaborovsky, Sergey Popov
Enhancing Privacy on Identity Providers
Rafael Weingärtner, Carla Merkle Westphall
Adding Secure Deletion to an Encrypted File System on Android Smartphones
Alexandre Braga, Alfredo Colito
Linearity Measures for Multivariate Public Key Cryptography
Simona Samardjiska, Danilo Gligoroski
Managed Certificate Whitelisting - A Basis for Internet of Things Security in Industrial Automation Applications
Rainer Falk, Steffen Fries
Challenges for Evolving Large-Scale Security Architectures
Geir Køien
Attack Surface Reduction for Web Services based on Authorization Patterns
Roland Steinegger, Johannes Schäfer, Max Vogler, Sebastian Abeck
Evaluation of Vehicle Diagnostics Security – Implementation of a Reproducible Security Access
Martin Ring, Tobias Rensen, Reiner Kriesten
The following papers have been selected on the basis of their contents and topic fitness to sensor networks. Authors of these papers are receiving invitationd tosubmit extended article versions to IFSA.
Papers Invited to IFSA
Data Quality and Security Evaluation Tool for Nanoscale Sensors
Leon Reznik, Sergey Edward Lyshevski