Online Library TheLib.net » Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France
cover of the book Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France

Ebook: Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France

00
27.01.2024
2
0

Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful.

Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.




Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful.

Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.




Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful.

Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.


Content:
Front Matter....Pages i-xiv
An Abstract Reduction Model for Computer Security Risk....Pages 1-16
Remediation Graphs for Security Patch Management....Pages 17-28
Security Modelling for Risk Analysis....Pages 29-45
Contrasting Malicious Applets by Modifying the Java Virtual Machine....Pages 46-64
Analyzing Network Management Effects with Spin and cTLA....Pages 65-81
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics....Pages 82-99
Meeting the Global Challenges of Security Incident Response....Pages 100-117
Security in Globally Distributed Industrial Information Systems....Pages 118-134
A Case for Information Ownership in ERP Systems....Pages 135-149
Interactive Access Control for Web Services....Pages 150-166
Identity-Based Key Infrastructures (IKI)....Pages 167-176
Modint: A Compact Modular Arithmetic Java Class Library for Cellular Phones, and its Application to Secure Electronic Voting....Pages 177-192
Dependable Security by Twisted Secret Sharing....Pages 193-207
A Language Driven Intrusion Detection System for Event and Alert Correlation....Pages 208-224
Install-Time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks....Pages 225-240
Eigenconnections to Intrusion Detection....Pages 241-258
Visualising Intrusions: Watching the Webserver....Pages 259-274
A Long-Term Trial of Keystroke Profiling Using Digraph, Trigraph and Keyword Latencies....Pages 275-289
Trusted Computing, Trusted Third Parties, and Verified Communications....Pages 290-308
Maille Authentication....Pages 309-322
Supporting end-to-end Security Across Proxies with Multiple-Channel SSL....Pages 323-337
A Content-Protection Scheme for Multi-Layered Reselling Structures....Pages 338-349
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards....Pages 350-365
IPsec Clustering....Pages 366-379
Improving Secure Device Insertion in Home Ad Hoc Networks....Pages 380-394
Spam Filter Analysis....Pages 395-410
Collective Signature for Efficient Authentication of XML Documents....Pages 411-424
Updating Encrypted XML Documents on Untrusted Machines....Pages 425-439
Efficient Simultaneous Contract Signing....Pages 440-455
DHCP Authentication Using Certificates....Pages 456-472
Recursive Sandboxes: Extending Systrace to Empower Applications....Pages 473-487
Fast Digital Certificate Revocation....Pages 488-500
Masks: Managing Anonymity while Sharing Knowledge to Servers....Pages 501-515
Security and Differentiated Hotspot Services Through Policy-based Management Architecture....Pages 516-532
Key Management for Secure Multicast in Hybrid Satellite Networks....Pages 533-548


Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful.

Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.


Content:
Front Matter....Pages i-xiv
An Abstract Reduction Model for Computer Security Risk....Pages 1-16
Remediation Graphs for Security Patch Management....Pages 17-28
Security Modelling for Risk Analysis....Pages 29-45
Contrasting Malicious Applets by Modifying the Java Virtual Machine....Pages 46-64
Analyzing Network Management Effects with Spin and cTLA....Pages 65-81
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics....Pages 82-99
Meeting the Global Challenges of Security Incident Response....Pages 100-117
Security in Globally Distributed Industrial Information Systems....Pages 118-134
A Case for Information Ownership in ERP Systems....Pages 135-149
Interactive Access Control for Web Services....Pages 150-166
Identity-Based Key Infrastructures (IKI)....Pages 167-176
Modint: A Compact Modular Arithmetic Java Class Library for Cellular Phones, and its Application to Secure Electronic Voting....Pages 177-192
Dependable Security by Twisted Secret Sharing....Pages 193-207
A Language Driven Intrusion Detection System for Event and Alert Correlation....Pages 208-224
Install-Time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks....Pages 225-240
Eigenconnections to Intrusion Detection....Pages 241-258
Visualising Intrusions: Watching the Webserver....Pages 259-274
A Long-Term Trial of Keystroke Profiling Using Digraph, Trigraph and Keyword Latencies....Pages 275-289
Trusted Computing, Trusted Third Parties, and Verified Communications....Pages 290-308
Maille Authentication....Pages 309-322
Supporting end-to-end Security Across Proxies with Multiple-Channel SSL....Pages 323-337
A Content-Protection Scheme for Multi-Layered Reselling Structures....Pages 338-349
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards....Pages 350-365
IPsec Clustering....Pages 366-379
Improving Secure Device Insertion in Home Ad Hoc Networks....Pages 380-394
Spam Filter Analysis....Pages 395-410
Collective Signature for Efficient Authentication of XML Documents....Pages 411-424
Updating Encrypted XML Documents on Untrusted Machines....Pages 425-439
Efficient Simultaneous Contract Signing....Pages 440-455
DHCP Authentication Using Certificates....Pages 456-472
Recursive Sandboxes: Extending Systrace to Empower Applications....Pages 473-487
Fast Digital Certificate Revocation....Pages 488-500
Masks: Managing Anonymity while Sharing Knowledge to Servers....Pages 501-515
Security and Differentiated Hotspot Services Through Policy-based Management Architecture....Pages 516-532
Key Management for Secure Multicast in Hybrid Satellite Networks....Pages 533-548
....
Download the book Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen