Acceder a contenido central

REBIUN - ODA

Detalle del título

Descripción del título

cover Security and privacy in dyn...
Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
Springer 2006

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org

Congress proceedings (reports) Conference papers and proceedings Conference papers and proceedings Actes de congrès

Monografía

Más detalles del título

Cambiar el formato de visualización

Más detalles

Título:
Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden / edited by Simone Fischer-Hübner [and others]
Editorial:
New York, N.Y. : Springer, 2006
Descripción física:
1 online resource (xvi, 494 pages) : illustrations
Mención de serie:
International Federation for Information Processing (Series), 1571-5736
Bibliografía:
Includes bibliographical references and index
Contenido:
Improving availability of emergency health information without sacrificing patient privacy / Inger Anne Tondel -- Ensuring privacy for buyer-seller e-commerce / George Yee, Larry Korba, Ronggong Song -- A general certification framework with applications to privacy-enhancing certificate infrastructures / Jan Camenisch, Dieter Sommer, Roger Zimmermann -- Authenticated query flooding in sensor networks / Zinaida Benenson [and others] -- Identity based message authentication for dynamic networks / Pietro Michiardi and Refik Molva -- Providing authentication and access control in vehicular network environment / Hasnaa Moustafa, Gilles Bourdon and Yvon Gourhant -- A framework for Web services trust / Marijke Coetzee, Jan Eloff -- Trust: an element of security / Stephen Flowerday and Rossouw von Solms -- Security-by-ontology: a knowledge-centric approach / Bill Tsoumas [and others] -- A methodology for designing controlled anonymous applications / Vincent Naessens and Bart De Decker -- Design options for privacy-respecting reputation systems within centralised Internet communities / Sandra Steinbrecher -- Protecting (anonymous) credentials with the trusted computing group's trusted platform modules V1.2 / Jan Camenisch -- Analysis and improvement of anti-phishing schemes / Dinei Florêncio and Cormac Herley -- CAT -- a practical graph & SDL based toolkit for vulnerability assessment of 3G networks / Kameswari Kotapati, Peng Liu and Thomas F. LaPorta -- Protecting Web services from DOS attacks by SOAP message validation / Nils Gruschka and Norbert Luttenberger -- A flexible and distributed architecture to enforce dynamic access control -- Thierry Sans, Frédéric Cuppens and Nora Cuppens-Boulahia -- A paradigm for dynamic and decentralized administration of access control in workflow applications / Andreas Mattas, Ioannins Mavridis and Iason Pagkalos -- CAS++: an open source single sign-on solution for secure E-services / Claudio Agostino Ardagna [and others] -- A synchronous multi-party contract signing protocol improving lower bound of steps / Jianying Zhou, Jose A. Onieva and Javier Lopez -- On the cryptographic key secrecy of the strengthened Yahalom protocol / Michael Backes and Birgit Pfuzmann -- Sealed-bid micro auctions / Kun Peng, Colin Boyd and Ed Dawson -- Detecting known and network intrusions / Yacine Bouzida and Frédéric Cuppens -- Evaluating classifiers for mobile-masquerader detection / Oleksiy Mazhelis, Seppo Puuronen and Mika Raento -- VisFlowCluster-IP: connectivity-based visual clustering of network hosts / Xiaoxin Yin, William Yurcik and Adam Slagell-- A usability study of security policy management / Almut Herzog and Nahid Shahmehri -- Considering the usability of end-user security software / Steven Furnell [and others] -- Utilizing the common criteria for advanced student research projects / Thuy D. Nguyen and Cynthia E. Irvine -- On the relationship of privacy and secure remote logging in dynamic systems / Rafael Accorsi -- Privacy-preserving shared-additive-inverse protocols and their applications / Huafei Zhu, Tieyan Li and Feng Bao -- Click passwords / Darko Kirovski, Nebojsa Jojic and Paul Roberts -- Cryptographically enforced personalized role-based access control / Milan Petkovic, Claudine Conrado and Malik Hammoutène -- Using VO concept for managing dynamic security associations / Yuri Demchenko, Leon Gommans and Cees de Laat -- Secure fast handover in an open broadband access network using Kerberos-style tickets / Martin Gilji Jaatun [and others] -- Network forensics on packet fingerprints / Chia Yuan Cho [and others] -- Oscar -- file type identification of binary data in disk clusters and RAM pages / Martin Karresand and Nahid Shahmehri -- Organizational security culture: more than just an end-user phenomenon / Anthonie B. Ruighaver and Sean B. Maynard -- Cyber security training and awareness through game play / Benjamin D. Cone [and others] -- Internalisation of information security culture amongst employees through basic security knowledge / Omar Zakaria -- Bridging the gap between general management and technicians -- a case study in ICT security / Jabiri Kuwe Bakari [and others] -- Value-focused assessment of information communication and technology security awareness in an academic environment / Lynette Drevin, Hennie Kruger and Tjaart Steyn -- Using phishing for user email security awareness / Ronald C. Dodge and Aaron J. Ferguson -- Invited talk: anonymous credentials: opportunities and challenges / Jan Camenisch -- Practical private regular expression matching / Florian Kerschbaum -- A system for privacy-aware resource allocation and data processing in dynamic environments / Siani Pearson and Marco Casassa-Mont -- The APROB-channel: adaptive semi-real-time anonymous communication / Gergely Tóth, Zoltán Hornák
Restricciones de acceso:
Use copy. Restrictions unspecified star. MiAaHDL
Detalles del sistema:
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
Nota de acción:
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Copyright/Depósito Legal:
75183116 228381982 320970223 607810541 613456266 636934553 636934564 647594594 690014424 698451485 880110806 985037815 988779192 1005830315 1035662929 1040685966 1044124384 1044293316 1050967486 1056324667 1056437035 1056495769 1066630260 1077239176 1078837992 1087308462 1162794956 1195031392
ISBN:
9780387334066
0387334068
038733405X ( Cloth)
9780387334059 ( Cloth)
661062402X
9786610624027
Materia:
Autores:
Enlace a formato físico adicional:
Print version: IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden). Security and privacy in dynamic environments., New York, N.Y. : Springer, 2006 038733405X 9780387334059 (DLC) 2006923022 (OCoLC)70532744
Punto acceso adicional serie-Título:
International Federation for Information Processing (Series) 1571-5736

Préstamo interbibliotecario

Seleccione el centro al que pertenece para solicitar la petición de préstamo de este documento.

Filtrar listado de centros

No hay coincidencias

Relacionados

Mismo Género

Misma Editorial y Colección