Managing the Weakest Link. A Game-Theoretic Approach for the Mitigation of Insider Threats (Englisch)
- Neue Suche nach: Laszka, Aron
- Neue Suche nach: Johnson, Benjamin
- Neue Suche nach: Schöttle, Pascal
- Neue Suche nach: Grossklags, Jens
- Neue Suche nach: Böhme, Rainer
- Neue Suche nach: Laszka, Aron
- Neue Suche nach: Johnson, Benjamin
- Neue Suche nach: Schöttle, Pascal
- Neue Suche nach: Grossklags, Jens
- Neue Suche nach: Böhme, Rainer
In:
Computer Security, ESORICS, European Symposium on Research in Computer Security, 18
;
273-290
;
2013
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Managing the Weakest Link. A Game-Theoretic Approach for the Mitigation of Insider Threats
-
Beteiligte:Laszka, Aron ( Autor:in ) / Johnson, Benjamin ( Autor:in ) / Schöttle, Pascal ( Autor:in ) / Grossklags, Jens ( Autor:in ) / Böhme, Rainer ( Autor:in )
-
Erschienen in:Lecture Notes in Computer Science ; 8134 ; 273-290
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:2013
-
Format / Umfang:18 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ LimitsDamgard, I. / Keller, M. / Larraia, E. / Pastro, V. / Scholl, P. / Smart, N.P. et al. | 2013
- 19
-
Practical and Employable Protocols for UC-Secure Circuit Evaluation over Z~nCamenisch, J. / Enderlein, R.R. / Shoup, V. et al. | 2013
- 38
-
Privacy-Preserving Accountable ComputationBackes, M. / Fiore, D. / Mohammadi, E. et al. | 2013
- 57
-
Verifying Web Browser Extensions' Compliance with Private-Browsing ModeLerner, B.S. / Elberty, L. / Poole, N. / Krishnamurthi, S. et al. | 2013
- 75
-
A Quantitative Evaluation of Privilege Separation in Web Browser DesignsDong, X. / Hu, H. / Saxena, P. / Liang, Z. et al. | 2013
- 94
-
Estimating Asset Sensitivity by Profiling UsersPark, Y. / Gates, C. / Gates, S.C. et al. | 2013
- 111
-
Practical Secure Logging: Seekable Sequential Key GeneratorsMarson, G.A. / Poettering, B. et al. | 2013
- 129
-
Request-Based Comparable EncryptionFurukawa, J. et al. | 2013
- 147
-
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the CloudWei, L. / Reiter, M.K. et al. | 2013
- 164
-
HI-CFG: Construction by Binary Analysis and Application to Attack PolymorphismCaselden, D. / Bazhanyuk, A. / Payer, M. / McCamant, S. / Song, D. et al. | 2013
- 182
-
AnDarwin: Scalable Detection of Semantically Similar Android ApplicationsCrussell, J. / Gibler, C. / Chen, H. et al. | 2013
- 200
-
BISTRO: Binary Component Extraction and Embedding for Software Security ApplicationsDeng, Z. / Zhang, X. / Xu, D. et al. | 2013
- 219
-
Vulnerable Delegation of DNS ResolutionHerzberg, A. / Shulman, H. et al. | 2013
- 237
-
Formal Approach for Route Agility against Persistent AttackersJafarian, J.H. / Al-Shaer, E. / Duan, Q. et al. | 2013
- 255
-
Plug-and-Play IP Security: Anonymity Infrastructure instead of PKIGilad, Y. / Herzberg, A. et al. | 2013
- 273
-
Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider ThreatsLaszka, A. / Johnson, B. / Schottle, P. / Grossklags, J. / Bohme, R. et al. | 2013
- 291
-
Automated Security Proofs for Almost-Universal Hash for MAC VerificationGagne, M. / Lafourcade, P. / Lakhnech, Y. et al. | 2013
- 309
-
Bounded Memory Protocols and Progressing Collaborative SystemsKanovich, M. / Kirigin, T.B. / Nigam, V. / Scedrov, A. et al. | 2013
- 327
-
Universally Composable Key-ManagementKremer, S. / Kunnemann, R. / Steel, G. et al. | 2013
- 345
-
A Cryptographic Analysis of OPACITY (Extended Abstract)Dagdelen, O. / Fischlin, M. / Gagliardoni, T. / Marson, G.A. / Mittelbach, A. / Onete, C. et al. | 2013
- 363
-
Symbolic Probabilistic Analysis of Off-Line GuessingConchinha, B. / Basin, D. / Caleiro, C. et al. | 2013
- 381
-
ASICS: Authenticated Key Exchange Security Incorporating Certification SystemsBoyd, C. / Cremers, C. / Feltz, M. / Paterson, K.G. / Poettering, B. / Stebila, D. et al. | 2013
- 400
-
Efficient Privacy-Enhanced Familiarity-Based Recommender SystemJeckmans, A. / Peter, A. / Hartel, P. et al. | 2013
- 418
-
Privacy-Preserving User Data Oriented Services for Groups with Dynamic ParticipationKononchuk, D. / Erkin, Z. / van der Lubbe, J.C.A. / Lagendijk, R.L. et al. | 2013
- 443
-
Privacy-Preserving Matching of Community-Contributed ContentAlmishari, M. / Gasti, P. / Tsudik, G. / Oguz, E. et al. | 2013
- 463
-
Ballot Secrecy and Ballot Independence CoincideSmyth, B. / Bernhard, D. et al. | 2013
- 481
-
Election Verifiability or Ballot Privacy: Do We Need to Choose?Cuvelier, E. / Pereira, O. / Peters, T. et al. | 2013
- 499
-
Enforcing Privacy in the Presence of Others: Notions, Formalisations and RelationsDong, N. / Jonker, H. / Pang, J. et al. | 2013
- 517
-
Mining Malware Specifications through Static Reachability AnalysisMacedo, H.D. / Touili, T. et al. | 2013
- 536
-
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object DependenciesDai, J. / Sun, X. / Liu, P. et al. | 2013
- 556
-
Measuring and Detecting Malware Downloads in Live Network TrafficVadrevu, P. / Rahbarinia, B. / Perdisci, R. / Li, K. / Antonakakis, M. et al. | 2013
- 574
-
Automated Certification of Authorisation Policy ResistanceGriesmayer, A. / Morisset, C. et al. | 2013
- 592
-
Fine-Grained Access Control System Based on Outsourced Attribute-Based EncryptionLi, J. / Chen, X. / Jia, C. / Ma, J. / Lou, W. et al. | 2013
- 610
-
Purpose Restrictions on Information UseTschantz, M.C. / Datta, A. / Wing, J.M. et al. | 2013
- 628
-
Distributed Shuffling for Preserving Access ConfidentialityDe Capitani di Vimercati, S. / Foresti, S. / Paraboschi, S. / Pelosi, G. / Samarati, P. et al. | 2013
- 646
-
Range Extension Attacks on Contactless Smart CardsOren, Y. / Schirman, D. / Wool, A. et al. | 2013
- 664
-
CellFlood: Attacking Tor Onion Routers on the CheapBarbera, M.V. / Kemerlis, V.P. / Pappas, V. / Keromytis, A.D. et al. | 2013
- 682
-
Nowhere to Hide: Navigating around Privacy in Online Social NetworksHumbert, M. / Studer, T. / Grossglauser, M. / Hubaux, J.-P. et al. | 2013
- 700
-
Current Events: Identifying Webpages by Tapping the Electrical OutletClark, S.S. / Mustafa, H. / Ransford, B. / Sorber, J. / Fu, K. / Xu, W. et al. | 2013
- 718
-
Eliminating Cache-Based Timing Attacks with Instruction-Based SchedulingStefan, D. / Buiras, P. / Yang, E.Z. / Levy, A. / Terei, D. / Russo, A. / Mazieres, D. et al. | 2013
- 736
-
Data-Confined HTML5 ApplicationsAkhawe, D. / Li, F. / He, W. / Saxena, P. / Song, D. et al. | 2013
- 755
-
KQguard: Binary-Centric Defense against Kernel Queue Injection AttacksWei, J. / Zhu, F. / Pu, C. et al. | 2013
- 775
-
Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract)Jia, L. / Aljuraidan, J. / Fragkaki, E. / Bauer, L. / Stroucken, M. / Fukushima, K. / Kiyomoto, S. / Miyake, Y. et al. | 2013