Ebook: Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22–24 May 2006, Karlstad, Sweden
- Tags: Computer Science general
- Series: IFIP International Federation for Information Processing 201
- Year: 2006
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.
For more information about IFIP, please visit www.ifip.org.
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.
For more information about IFIP, please visit www.ifip.org.
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.
For more information about IFIP, please visit www.ifip.org.
Content:
Front Matter....Pages I-XVI
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy....Pages 1-12
Ensuring Privacy for Buyer-Seller E-Commerce....Pages 13-24
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures....Pages 25-37
Authenticated Query Flooding in Sensor Networks....Pages 38-49
Identity Based Message Authentication for Dynamic Networks....Pages 50-61
Providing Authentication and Access Control in Vehicular Network Environment....Pages 62-73
A Framework for Web Services Trust....Pages 74-86
Trust: An Element of Information Security....Pages 87-98
Security-by-Ontology: A Knowledge-Centric Approach....Pages 99-110
A Methodology for Designing Controlled Anonymous Applications....Pages 111-122
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities....Pages 123-134
Protecting (Anonymous) Credentials with the Trusted Computing Group’s TPM V1.2....Pages 135-147
Analysis and Improvement of Anti-Phishing Schemes....Pages 148-157
CAT — A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks....Pages 158-170
Protecting Web Services from DoS Attacks by SOAP Message Validation....Pages 171-182
A Flexible and Distributed Architecture to Enforce Dynamic Access Control....Pages 183-195
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications....Pages 196-207
CAS++: An Open Source Single Sign-On Solution for Secure e-Services....Pages 208-220
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps....Pages 221-232
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol....Pages 233-245
Sealed-Bid Micro Auctions....Pages 246-257
Detecting Known and Novel Network Intrusions....Pages 258-270
Evaluating Classifiers for Mobile-Masquerader Detection....Pages 271-283
A Usability Study of Security Policy Management....Pages 284-295
Considering the Usability of End-User Security Software....Pages 296-306
Utilizing the Common Criteria for Advanced Student Research Projects....Pages 307-316
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems....Pages 317-328
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications....Pages 329-339
Click Passwords....Pages 340-350
Cryptographically Enforced Personalized Role-Based Access Control....Pages 351-363
Using VO Concept for Managing Dynamic Security Associations....Pages 364-376
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets....Pages 377-388
Network Forensics on Packet Fingerprints....Pages 389-400
Oscar — File Type Identification of Binary Data in Disk Clusters and RAM Pages....Pages 401-412
Organizational Security Culture: More Than Just an End-User Phenomenon....Pages 413-424
Cyber Security Training and Awareness Through Game Play....Pages 425-430
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge....Pages 431-436
Bridging the Gap between General Management and Technicians — A Case Study in ICT Security....Pages 437-441
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment....Pages 442-447
Using Phishing for User Email Security Awareness....Pages 448-453
Anonymous Credentials: Opportunities and Challenges....Pages 454-459
Practical Private Regular Expression Matching....Pages 460-460
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments....Pages 461-470
The APROB Channel: Adaptive Semi-Real-Time Anonymous Communication....Pages 471-482
Back Matter....Pages 483-492
....Pages 493-494