Descripción del título

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org
Monografía
monografia Rebiun36395462 https://catalogo.rebiun.org/rebiun/record/Rebiun36395462 m o d cr cn||||||||| 080226s2006 nyua ob 101 0 eng d 75183116 228381982 320970223 607810541 613456266 636934553 636934564 647594594 690014424 698451485 880110806 985037815 988779192 1005830315 1035662929 1040685966 1044124384 1044293316 1050967486 1056324667 1056437035 1056495769 1066630260 1077239176 1078837992 1087308462 1162794956 1195031392 9780387334066 0387334068 038733405X Cloth) 9780387334059 Cloth) 661062402X 9786610624027 10.1007/0-387-33406-8 doi AU@ 000048698236 NLGGC 384390196 978-0-387-33405-9 Springer http://www.springerlink.com GW5XE eng pn GW5XE N$T YDXCP W2U UAB CNTRU OCLCE E7B OCLCQ MNU IDEBK YNG OCLCQ OCLCF BEDGE OCLCO NUI SLY OCLCO OCL OCLCO OCLCQ OCLCO OCLCQ VT2 Z5A OCLCQ OCLCA BUF STF OCLCQ CEF U3W OCLCQ ICG YOU CANPU OCLCQ WYU INARC OCLCQ COM OCLCO OCLCQ OCLCO OCLCL OCLCQ dlr QA lcco TK lcco COM 060040 bisacsh COM 043050 bisacsh COM 053000 bisacsh UY bicssc IFIP TC11 International Information Security Conference 21st :. 2006 :. Karlstad, Sweden) Security and privacy in dynamic environments proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden edited by Simone Fischer-Hübner [and others] New York, N.Y. Springer 2006 New York, N.Y. New York, N.Y. Springer 1 online resource (xvi, 494 pages) illustrations 1 online resource (xvi, 494 pages) Text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF International Federation for Information Processing (Series) 1571-5736 Includes bibliographical references and index Improving availability of emergency health information without sacrificing patient privacy / Inger Anne Tondel -- Ensuring privacy for buyer-seller e-commerce / George Yee, Larry Korba, Ronggong Song -- A general certification framework with applications to privacy-enhancing certificate infrastructures / Jan Camenisch, Dieter Sommer, Roger Zimmermann -- Authenticated query flooding in sensor networks / Zinaida Benenson [and others] -- Identity based message authentication for dynamic networks / Pietro Michiardi and Refik Molva -- Providing authentication and access control in vehicular network environment / Hasnaa Moustafa, Gilles Bourdon and Yvon Gourhant -- A framework for Web services trust / Marijke Coetzee, Jan Eloff -- Trust: an element of security / Stephen Flowerday and Rossouw von Solms -- Security-by-ontology: a knowledge-centric approach / Bill Tsoumas [and others] -- A methodology for designing controlled anonymous applications / Vincent Naessens and Bart De Decker -- Design options for privacy-respecting reputation systems within centralised Internet communities / Sandra Steinbrecher -- Protecting (anonymous) credentials with the trusted computing group's trusted platform modules V1.2 / Jan Camenisch -- Analysis and improvement of anti-phishing schemes / Dinei Florêncio and Cormac Herley -- CAT -- a practical graph & SDL based toolkit for vulnerability assessment of 3G networks / Kameswari Kotapati, Peng Liu and Thomas F. LaPorta -- Protecting Web services from DOS attacks by SOAP message validation / Nils Gruschka and Norbert Luttenberger -- A flexible and distributed architecture to enforce dynamic access control -- Thierry Sans, Frédéric Cuppens and Nora Cuppens-Boulahia -- A paradigm for dynamic and decentralized administration of access control in workflow applications / Andreas Mattas, Ioannins Mavridis and Iason Pagkalos -- CAS++: an open source single sign-on solution for secure E-services / Claudio Agostino Ardagna [and others] -- A synchronous multi-party contract signing protocol improving lower bound of steps / Jianying Zhou, Jose A. Onieva and Javier Lopez -- On the cryptographic key secrecy of the strengthened Yahalom protocol / Michael Backes and Birgit Pfuzmann -- Sealed-bid micro auctions / Kun Peng, Colin Boyd and Ed Dawson -- Detecting known and network intrusions / Yacine Bouzida and Frédéric Cuppens -- Evaluating classifiers for mobile-masquerader detection / Oleksiy Mazhelis, Seppo Puuronen and Mika Raento -- VisFlowCluster-IP: connectivity-based visual clustering of network hosts / Xiaoxin Yin, William Yurcik and Adam Slagell-- A usability study of security policy management / Almut Herzog and Nahid Shahmehri -- Considering the usability of end-user security software / Steven Furnell [and others] -- Utilizing the common criteria for advanced student research projects / Thuy D. Nguyen and Cynthia E. Irvine -- On the relationship of privacy and secure remote logging in dynamic systems / Rafael Accorsi -- Privacy-preserving shared-additive-inverse protocols and their applications / Huafei Zhu, Tieyan Li and Feng Bao -- Click passwords / Darko Kirovski, Nebojsa Jojic and Paul Roberts -- Cryptographically enforced personalized role-based access control / Milan Petkovic, Claudine Conrado and Malik Hammoutène -- Using VO concept for managing dynamic security associations / Yuri Demchenko, Leon Gommans and Cees de Laat -- Secure fast handover in an open broadband access network using Kerberos-style tickets / Martin Gilji Jaatun [and others] -- Network forensics on packet fingerprints / Chia Yuan Cho [and others] -- Oscar -- file type identification of binary data in disk clusters and RAM pages / Martin Karresand and Nahid Shahmehri -- Organizational security culture: more than just an end-user phenomenon / Anthonie B. Ruighaver and Sean B. Maynard -- Cyber security training and awareness through game play / Benjamin D. Cone [and others] -- Internalisation of information security culture amongst employees through basic security knowledge / Omar Zakaria -- Bridging the gap between general management and technicians -- a case study in ICT security / Jabiri Kuwe Bakari [and others] -- Value-focused assessment of information communication and technology security awareness in an academic environment / Lynette Drevin, Hennie Kruger and Tjaart Steyn -- Using phishing for user email security awareness / Ronald C. Dodge and Aaron J. Ferguson -- Invited talk: anonymous credentials: opportunities and challenges / Jan Camenisch -- Practical private regular expression matching / Florian Kerschbaum -- A system for privacy-aware resource allocation and data processing in dynamic environments / Siani Pearson and Marco Casassa-Mont -- The APROB-channel: adaptive semi-real-time anonymous communication / Gergely Tóth, Zoltán Hornák Use copy. Restrictions unspecified star. MiAaHDL International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org Electronic reproduction. [Place of publication not identified] HathiTrust Digital Library 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL Computer security- Congresses Computer networks- Access control- Congresses Computers- Access control- Congresses Sécurité informatique- Congrès Ordinateurs- Accès- Contrôle- Congrès COMPUTERS- Internet- Security COMPUTERS- Networking- Security COMPUTERS- Security- General Computer networks- Access control Computers- Access control Computer security Informatique Computer networks- Access control Computer security Computers- Access control Congress proceedings (reports) Conference papers and proceedings Conference papers and proceedings Actes de congrès Fischer-Hübner, Simone Print version IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden). Security and privacy in dynamic environments. New York, N.Y. : Springer, 2006 038733405X 9780387334059 (DLC) 2006923022 (OCoLC)70532744 International Federation for Information Processing (Series) 1571-5736