↓ Skip to main content

Emerging Challenges for Security, Privacy and Trust

Overview of attention for book
Cover of 'Emerging Challenges for Security, Privacy and Trust'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Flexible and Transparent User Authentication for Mobile Devices
  3. Altmetric Badge
    Chapter 2 Combining Authentication, Reputation and Classification to Make Phishing Unprofitable
  4. Altmetric Badge
    Chapter 3 Audio CAPTCHA for SIP-Based VoIP
  5. Altmetric Badge
    Chapter 4 Roving Bugnet: Distributed Surveillance Threat and Mitigation
  6. Altmetric Badge
    Chapter 5 On Robust Covert Channels Inside DNS
  7. Altmetric Badge
    Chapter 6 Discovering Application-Level Insider Attacks Using Symbolic Execution
  8. Altmetric Badge
    Chapter 7 Custom JPEG Quantization for Improved Iris Recognition Accuracy
  9. Altmetric Badge
    Chapter 8 On the IPP Properties of Reed-Solomon Codes
  10. Altmetric Badge
    Chapter 9 A Generic Authentication LoA Derivation Model
  11. Altmetric Badge
    Chapter 10 Media-Break Resistant eSignatures in eGovernment: An Austrian Experience
  12. Altmetric Badge
    Chapter 11 How to Bootstrap Security for Ad-Hoc Network: Revisited
  13. Altmetric Badge
    Chapter 12 Steganalysis of Hydan
  14. Altmetric Badge
    Chapter 13 On the Impossibility of Detecting Virtual Machine Monitors
  15. Altmetric Badge
    Chapter 14 Implementation of a Trusted Ticket System
  16. Altmetric Badge
    Chapter 15 A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor
  17. Altmetric Badge
    Chapter 16 A Policy Language for Modelling Recommendations
  18. Altmetric Badge
    Chapter 17 On the Security Validation of Integrated Security Solutions
  19. Altmetric Badge
    Chapter 18 Verification of Security Policy Enforcement in Enterprise Systems
  20. Altmetric Badge
    Chapter 19 Optimization of the Controlled Evaluation of Closed Relational Queries
  21. Altmetric Badge
    Chapter 20 Collaborative Privacy – A Community-Based Privacy Infrastructure
  22. Altmetric Badge
    Chapter 21 Security and Privacy Improvements for the Belgian eID Technology
  23. Altmetric Badge
    Chapter 22 A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components
  24. Altmetric Badge
    Chapter 23 Mining Stable Roles in RBAC
  25. Altmetric Badge
    Chapter 24 Privacy-Preserving Content-Based Publish/Subscribe Networks
  26. Altmetric Badge
    Chapter 25 Broadcast Encryption for Differently Privileged
  27. Altmetric Badge
    Chapter 26 Ontology-Based Secure XML Content Distribution
  28. Altmetric Badge
    Chapter 27 NGBPA Next Generation BotNet Protocol Analysis
  29. Altmetric Badge
    Chapter 28 Non-repudiation Analysis with LySa
  30. Altmetric Badge
    Chapter 29 A Provably Secure Secret Handshake with Dynamic Controlled Matching
  31. Altmetric Badge
    Chapter 30 Towards a Theory of White-Box Security
  32. Altmetric Badge
    Chapter 31 On a Taxonomy of Delegation
  33. Altmetric Badge
    Chapter 32 Efficient Key Management for Enforcing Access Control in Outsourced Scenarios
  34. Altmetric Badge
    Chapter 33 A Probabilistic Bound on the Basic Role Mining Problem and Its Applications
  35. Altmetric Badge
    Chapter 34 Automating Access Control Logics in Simple Type Theory with LEO-II
  36. Altmetric Badge
    Chapter 35 In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security
  37. Altmetric Badge
    Chapter 36 Persona: Network Layer Anonymity and Accountability for Next Generation Internet
  38. Altmetric Badge
    Chapter 37 Jason: A Scalable Reputation System for the Semantic Web
  39. Altmetric Badge
    Chapter 38 Which Web Browsers Process SSL Certificates in a Standardized Way?
Attention for Chapter 22: A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
9 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components
Chapter number 22
Book title
Emerging Challenges for Security, Privacy and Trust
Published in
ADS, May 2009
DOI 10.1007/978-3-642-01244-0_22
Book ISBNs
978-3-64-201243-3, 978-3-64-201244-0
Authors

Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 9 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 9 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 33%
Student > Master 2 22%
Professor 1 11%
Student > Doctoral Student 1 11%
Professor > Associate Professor 1 11%
Other 0 0%
Unknown 1 11%
Readers by discipline Count As %
Computer Science 7 78%
Unknown 2 22%