Ebook: Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece
- Tags: Theory of Computation, Management of Computing and Information Systems, Data Structures Cryptology and Information Theory, Computer Communication Networks
- Series: IFIP — The International Federation for Information Processing 122
- Year: 2003
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including:
*Secure Networks and Distributed Systems;
*Secure Multicast Communication and Secure Mobile Networks;
*Intrusion Prevention and Detection;
*Access Control Policies and Models;
*Security Protocols;
*Security and Control of IT in Society.
Content:
Front Matter....Pages i-xviii
Trust Mediation for Distributed Information Systems....Pages 1-12
Concerning Enterprise Network Vulnerability to HTTP Tunnelling....Pages 13-24
Providing Voice Privacy over Public Switched Telephone Networks....Pages 25-36
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages....Pages 37-48
Establishing Chain of Evidence as a Base for Non-Repudiation Services....Pages 49-60
Securing XML-Based Multimedia Content....Pages 61-72
Secure Audit Logging with Tamper-Resistant Hardware....Pages 73-84
PCMHoDC....Pages 85-96
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets....Pages 97-108
Introducing PKI to Enhance Security in Future Mobile Networks....Pages 109-120
A Time Driven Methodology for Key Dimensioning in Multicast Communications....Pages 121-132
A Flexible Category-Based Collusion-Resistant Key Management Scheme for Multicast....Pages 133-144
Content, Context, Process Analysis of is Security Policy Formation....Pages 145-156
Integrating Security Into Systems Development....Pages 157-168
Integrating Information Security into Corporate Governance....Pages 169-180
Building an Enterprise it Security Management System....Pages 181-192
Information Security Management System: Processes and Products....Pages 193-204
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis....Pages 205-216
Intrusion Masking for Distributed Atomic Operations....Pages 217-228
Using Fuzzy System to Manage False Alarms in Intrusion Detection....Pages 229-240
An Experiment in Software Decoy Design....Pages 241-252
A User Friendly Guard with Mobile Post-Release Access Control Policy....Pages 253-264
Security Model for Health Care Computing and Communication Systems....Pages 265-276
Constrained Role-Based Delegation....Pages 277-288
CSAP — An Adaptable Security Module for the E-Government System Webocrat....Pages 289-300
Perceptions of Security Contributing to the Implementation of Secure IS....Pages 301-312
New Directions on is Security Methods....Pages 313-324
Secure Vickrey Auctions Without a Trusted Third Party....Pages 325-336
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis....Pages 337-348
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments....Pages 349-360
Cooperative Defense Firewall Protocol....Pages 361-372
How to turn a PIN into an Iron Beam....Pages 373-384
World Framework for Security Benchmark Changes....Pages 385-396
Information Security: Auditing the Behaviour of the Employee....Pages 397-400
Priorities in the Deployment of Network Intrusion Detection Systems....Pages 401-404
Bridging the Gap between Risk Analysis and Security Policies....Pages 405-408
Framework and Architecture for Secure Mobile Business Applications....Pages 409-412
ISO 17799 and Australian Healthcare Organisations....Pages 413-416
Statistical Disclosure Attacks....Pages 417-420
On the Anonymity of Timed Pool Mixes....Pages 421-426
Privacy in Content Distribution Networks....Pages 427-434
Security, Fault-Tolerance and Their Verification for Ambient Systems....Pages 435-440
Hidden Layer Authentication Using Smart Card for WEP Based WLANs....Pages 441-446
PINPAS: a Tool for Power Analysis of Smartcards....Pages 447-451
Assessing Security in Energy-Efficient Sensor Networks....Pages 453-457
From Finite State Machines to Provably Correct Java Card Applets....Pages 459-463
Security Characteristics of E-Collaboration Environments....Pages 465-470
Roadmap for Securing Handheld Devices....Pages 471-475
Lawful Cyber Decoy Policy....Pages 477-482
Electronic Signature as a Part of Information Society Infrastructure....Pages 483-488
....Pages 489-494
Download the book Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)