About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2007
SMPE 2007SECOVAL 2007GRID-STP 2007
Other Years
Ethics and Malpractice Statement

    SECOVAL

    3rd International ICST Workshop on the Value of Security through Collaboration

    Security is usually centrally managed, for example in the form of policies duly executed by individual nodes. The SECOVAL workshop covers the alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (bot…

    Security is usually centrally managed, for example in the form of policies duly executed by individual nodes. The SECOVAL workshop covers the alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both local and acquired from other nodes) to make security-related decisions. For example, in reputation-based schemes, the reputation of a given node (and hence its security access rights) can be determined based on the recommendations of peer nodes. As systems are being deployed on ever-greater scale without direct connection to their distant home base, the need for self-management is rapidly increasing. Interaction after interaction, as the nodes collaborate, there is the emergence of a digital ecosystem. By guiding the local decisions of the nodes, for example, with whom the nodes collaborate, global properties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organizing mechanisms. Depending on which local collaboration is preferred, a more trustworthy ecosystem may emerge. This year SECOVAL is focusing upon a special research subtopic within the scope of collaborative security, namely, Privacy and Data Sanitization. Any useful collaboration is at some point sharing data. Unfortunately, data sharing is one of the greatest hurdles getting in the way of otherwise beneficial collaborations. Data regarding one's security stance is particularly sensitive, often indicating ones own security weaknesses. This data could include computer or network logs of security incidents, architecture documents, or sensitive organizational information. Even when the data may not compromise the data owner's security stance, sharing may violate a customer's privacy. Data sanitization techniques such as anonymization and other mechanisms such as privacy-preserving data mining and statistical data mining try to address this tension between the need to share information and protect sensitive information and user privacy.

    more »
    Editor(s): Bruno Crispo (University of Trento, Italy), Dieter Gollman (Technische University Hamburg-Harburg ) and Refik Molva (Eurecom )
    Publisher
    IEEE
    ISBN
    1-4244-0975-6
    Conference dates
    17th Sep 2007
    Location
    Nice, France
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 1–10 of 10 results
    Page size: 102550
    • 1
    • An Efficient and Scalable Security Protocol for Protecting Fixed-Content Objects in Content Addressable Storage Architectures

      Research Article in 3rd International ICST Workshop on the Value of Security through Collaboration

      Wassim Itani, Ayman Kayssi, Ali Chehab
    • An Entropy based method for Measuring Anonymity

      Research Article in 3rd International ICST Workshop on the Value of Security through Collaboration

      Michele Bezzi
    • Flexible and high-performance anonymization of NetFlow records using anontool

      Research Article in 3rd International ICST Workshop on the Value of Security through Collaboration

      Michalis Foukarakis, Demetres Antoniades, Spiros Antonatos, Evangelos Markatos
    • NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography

      Research Article in 3rd International ICST Workshop on the Value of Security through Collaboration

      Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah
    • Practical Anonymous Communication on the Mobile Internet using Tor

      Research Article in 3rd International ICST Workshop on the Value of Security through Collaboration

      Christer Andersson, Andriy Panchenko
    • SCRUB-tcpdump: A Multi-Level Packet AnonymizerDemonstrating Privacy/Analysis Tradeoffs

      Research Article in 3rd International ICST Workshop on the Value of Security through Collaboration

      William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham
    • Scalable discovery of private resources

      Research Article in 3rd International ICST Workshop on the Value of Security through Collaboration

      Spyros Kotoulas, Ronny Siebes
    • Secure Computation for Data Privacy

      Research Article in 3rd International ICST Workshop on the Value of Security through Collaboration

      Meena Singh, Ashutosh Saxena
    • Temporal Factors to evaluate trustworthiness of virtual identities

      Research Article in 3rd International ICST Workshop on the Value of Security through Collaboration

      Luca Longo, Pierpaolo Dondio, Stephen Barrett
    • Trustworthiness of Collaborative Open Source Software Quality Assessment

      Research Article in 3rd International ICST Workshop on the Value of Security through Collaboration

      Jean-Marc Seigneur
    • 1
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL