Decision and Game Theory for Security First International Conference
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel res
- PDF / 4,966,338 Bytes
- 276 Pages / 429.725 x 659.895 pts Page_size
- 36 Downloads / 201 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany
6442
Tansu Alpcan Levente Buttyán John S. Baras (Eds.)
Decision and Game Theory for Security First International Conference, GameSec 2010 Berlin, Germany, November 22-23, 2010 Proceedings
13
Volume Editors Tansu Alpcan Technical University Berlin, Germany E-mail: [email protected] Levente Buttyán Budapest University of Technology and Economics Budapest, Hungary E-mail: [email protected] John S. Baras University of Maryland College Park, MD, USA E-mail: [email protected]
Library of Congress Control Number: Applied for CR Subject Classification (1998): E.3, C.2.0, D.4.6, K.4.4, K.6.5, H.2.0 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN ISBN-10 ISBN-13
0302-9743 3-642-17196-6 Springer Berlin Heidelberg New York 978-3-642-17196-3 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com © Springer-Verlag Berlin Heidelberg 2010 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper 06/3180
Preface
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the information age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network interdependencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. Decision and g
Data Loading...