Ebook: New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa
- Tags: Systems and Data Security
- Series: IFIP International Federation for Information Processing 232
- Year: 2007
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit www.springer.com.
For more information about IFIP, please visit www.ifip.org.
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit www.springer.com.
For more information about IFIP, please visit www.ifip.org.
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit www.springer.com.
For more information about IFIP, please visit www.ifip.org.
Content:
Front Matter....Pages I-XV
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints....Pages 1-12
Digital Forensic Readiness as a Component of Information Security Best Practice....Pages 13-24
Value creation and Return On Security Investments (ROSI)....Pages 25-35
Usability and Security of Personal Firewalls....Pages 37-48
Trusted Ticket Systems and Applications....Pages 49-60
Trust Evaluation for Web Applications based on Behavioral Analysis....Pages 61-72
Improving the Information Security Model by using TFI....Pages 73-84
Ontological Mapping of Common Criteria’s Security Assurance Requirements....Pages 85-95
Management of Exceptions on Access Control Policies....Pages 97-108
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols....Pages 109-120
Exploratory survey on an Evaluation Model for a Sense of Security....Pages 121-132
Employees’ Adherence to Information Security Policies: An Empirical Study....Pages 133-144
Phishing in the Wireless: Implementation and Analysis....Pages 145-156
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks....Pages 157-168
A Credential-Based System for the Anonymous Delegation of Rights....Pages 169-180
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content....Pages 181-192
Identity Theft — Empirical evidence from a Phishing Exercise....Pages 193-203
A Practical Usability Evaluation of Security Features in End-User Applications....Pages 205-216
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis....Pages 217-228
A Survey of Bots Used for Distributed Denial of Service Attacks....Pages 229-240
A Hybrid PKI-IBC Based Ephemerizer System....Pages 241-252
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices....Pages 253-263
Security Remarks on a Convertible Nominative Signature Scheme....Pages 265-275
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions....Pages 277-288
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation....Pages 289-300
Extending Role Based Access Control Model for Distributed Multidomain Applications....Pages 301-312
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy....Pages 313-324
Enabling Privacy of Real-Life LBS....Pages 325-336
Crafting Web Counters into Covert Channels....Pages 337-348
OPA: Onion Policy Administration Model — Another approach to manage rights in DRM....Pages 349-360
Non-Repudiation in Internet Telephony....Pages 361-372
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing....Pages 373-384
Building a Distributed Semantic-aware Security Architecture....Pages 385-396
Using Trust to Resist Censorship in the Presence of Collusion....Pages 397-408
Evaluating the Effects of Model Generalization on Intrusion Detection Performance....Pages 409-420
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM....Pages 421-432
Covert Identity Information in Direct Anonymous Attestation (DAA)....Pages 433-442
Safeguarding Personal Data using Rights Management in Distributed Applications....Pages 443-448
Identification Now and in the Future: Social Grant Distribution Process in South Africa....Pages 449-456
Hard-drive Disposal and Identity Fraud....Pages 457-459
An analysis of security and privacy issues relating to RFID enabled ePassports....Pages 461-466
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework....Pages 467-472
Teaching of Information Security in the “Health Care and Nursing” Postgraduate program....Pages 473-478
Remote Virtual Information Assurance Network....Pages 479-484
Certifying the Computer Security Professional Using the Project Management Institute’s PMP Model....Pages 485-490
Back Matter....Pages 491-496
....Pages 497-498