Ebook: Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom
- Tags: Data Structures Cryptology and Information Theory, Data Encryption, Computer Communication Networks
- Series: IFIP — The International Federation for Information Processing 175
- Year: 2005
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit springeronline.com.
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit springeronline.com.
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit springeronline.com.
Content:
Front Matter....Pages i-xiii
Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols....Pages 1-15
Personal Attributes and Privacy....Pages 17-29
Local Management of Credits and Debits in Mobile Ad Hoc Networks....Pages 31-45
How Secure are Current Mobile Operating Systems?....Pages 47-58
An Overview of Security Issues and Techniques in Mobile Agents....Pages 59-78
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography....Pages 79-95
Mobile Trust Negotiation....Pages 97-109
Weak Context Establishment Procedure for Mobility and Multi-Homing Management....Pages 111-123
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components....Pages 125-130
Threat Modelling for Web Services Based Web Applications....Pages 131-144
Threat Modelling for ASP.NET....Pages 145-158
Threat Modelling for SQL Servers....Pages 159-171
Threat Modelling for Active Directory....Pages 173-182
Threat Modelling for Security Tokens in Web Applications....Pages 183-193
Analysis of the DVB Common Scrambling Algorithm....Pages 195-207
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder....Pages 209-221
Robust Visual Hashing Using JPEG 2000....Pages 223-235
A System for End-to-End Authentication of Adaptive Multimedia Content....Pages 237-249
Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure....Pages 251-261
Secure Role Based Messaging....Pages 263-275
Back Matter....Pages 289-289
Five Non-Technical Pillars of Network Information Security Management....Pages 277-287
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit springeronline.com.
Content:
Front Matter....Pages i-xiii
Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols....Pages 1-15
Personal Attributes and Privacy....Pages 17-29
Local Management of Credits and Debits in Mobile Ad Hoc Networks....Pages 31-45
How Secure are Current Mobile Operating Systems?....Pages 47-58
An Overview of Security Issues and Techniques in Mobile Agents....Pages 59-78
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography....Pages 79-95
Mobile Trust Negotiation....Pages 97-109
Weak Context Establishment Procedure for Mobility and Multi-Homing Management....Pages 111-123
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components....Pages 125-130
Threat Modelling for Web Services Based Web Applications....Pages 131-144
Threat Modelling for ASP.NET....Pages 145-158
Threat Modelling for SQL Servers....Pages 159-171
Threat Modelling for Active Directory....Pages 173-182
Threat Modelling for Security Tokens in Web Applications....Pages 183-193
Analysis of the DVB Common Scrambling Algorithm....Pages 195-207
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder....Pages 209-221
Robust Visual Hashing Using JPEG 2000....Pages 223-235
A System for End-to-End Authentication of Adaptive Multimedia Content....Pages 237-249
Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure....Pages 251-261
Secure Role Based Messaging....Pages 263-275
Back Matter....Pages 289-289
Five Non-Technical Pillars of Network Information Security Management....Pages 277-287
....