Online Library TheLib.net » Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece
cover of the book Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece

Ebook: Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece

00
27.01.2024
0
0

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including:
*Secure Networks and Distributed Systems;
*Secure Multicast Communication and Secure Mobile Networks;
*Intrusion Prevention and Detection;
*Access Control Policies and Models;
*Security Protocols;
*Security and Control of IT in Society.

This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.








Content:
Front Matter....Pages i-xviii
Trust Mediation for Distributed Information Systems....Pages 1-12
Concerning Enterprise Network Vulnerability to HTTP Tunnelling....Pages 13-24
Providing Voice Privacy over Public Switched Telephone Networks....Pages 25-36
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages....Pages 37-48
Establishing Chain of Evidence as a Base for Non-Repudiation Services....Pages 49-60
Securing XML-Based Multimedia Content....Pages 61-72
Secure Audit Logging with Tamper-Resistant Hardware....Pages 73-84
PCMHoDC....Pages 85-96
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets....Pages 97-108
Introducing PKI to Enhance Security in Future Mobile Networks....Pages 109-120
A Time Driven Methodology for Key Dimensioning in Multicast Communications....Pages 121-132
A Flexible Category-Based Collusion-Resistant Key Management Scheme for Multicast....Pages 133-144
Content, Context, Process Analysis of is Security Policy Formation....Pages 145-156
Integrating Security Into Systems Development....Pages 157-168
Integrating Information Security into Corporate Governance....Pages 169-180
Building an Enterprise it Security Management System....Pages 181-192
Information Security Management System: Processes and Products....Pages 193-204
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis....Pages 205-216
Intrusion Masking for Distributed Atomic Operations....Pages 217-228
Using Fuzzy System to Manage False Alarms in Intrusion Detection....Pages 229-240
An Experiment in Software Decoy Design....Pages 241-252
A User Friendly Guard with Mobile Post-Release Access Control Policy....Pages 253-264
Security Model for Health Care Computing and Communication Systems....Pages 265-276
Constrained Role-Based Delegation....Pages 277-288
CSAP — An Adaptable Security Module for the E-Government System Webocrat....Pages 289-300
Perceptions of Security Contributing to the Implementation of Secure IS....Pages 301-312
New Directions on is Security Methods....Pages 313-324
Secure Vickrey Auctions Without a Trusted Third Party....Pages 325-336
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis....Pages 337-348
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments....Pages 349-360
Cooperative Defense Firewall Protocol....Pages 361-372
How to turn a PIN into an Iron Beam....Pages 373-384
World Framework for Security Benchmark Changes....Pages 385-396
Information Security: Auditing the Behaviour of the Employee....Pages 397-400
Priorities in the Deployment of Network Intrusion Detection Systems....Pages 401-404
Bridging the Gap between Risk Analysis and Security Policies....Pages 405-408
Framework and Architecture for Secure Mobile Business Applications....Pages 409-412
ISO 17799 and Australian Healthcare Organisations....Pages 413-416
Statistical Disclosure Attacks....Pages 417-420
On the Anonymity of Timed Pool Mixes....Pages 421-426
Privacy in Content Distribution Networks....Pages 427-434
Security, Fault-Tolerance and Their Verification for Ambient Systems....Pages 435-440
Hidden Layer Authentication Using Smart Card for WEP Based WLANs....Pages 441-446
PINPAS: a Tool for Power Analysis of Smartcards....Pages 447-451
Assessing Security in Energy-Efficient Sensor Networks....Pages 453-457
From Finite State Machines to Provably Correct Java Card Applets....Pages 459-463
Security Characteristics of E-Collaboration Environments....Pages 465-470
Roadmap for Securing Handheld Devices....Pages 471-475
Lawful Cyber Decoy Policy....Pages 477-482
Electronic Signature as a Part of Information Society Infrastructure....Pages 483-488
....Pages 489-494
Download the book Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen