Limit search to available items
Book Cover
E-book
Author IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden)

Title Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden / edited by Simone Fischer-Hübner [and others]
Published New York, N.Y. : Springer, ©2006

Copies

Description 1 online resource (xvi, 494 pages) : illustrations
Series International Federation for Information Processing (Series), 1571-5736
International Federation for Information Processing (Series) 1571-5736
Contents Improving availability of emergency health information without sacrificing patient privacy / Inger Anne Toøndel -- Ensuring privacy for buyer-seller e-commerce / George Yee, Larry Korba, Ronggong Song -- A general certification framework with applications to privacy-enhancing certificate infrastructures / Jan Camenisch, Dieter Sommer, Roger Zimmermann -- Authenticated query flooding in sensor networks / Zinaida Benenson [and others] -- Identity based message authentication for dynamic networks / Pietro Michiardi and Refik Molva -- Providing authentication and access control in vehicular network environment / Hasnaa Moustafa, Gilles Bourdon and Yvon Gourhant -- A framework for Web services trust / Marijke Coetzee, Jan Eloff -- Trust: an element of security / Stephen Flowerday and Rossouw von Solms -- Security-by-ontology: a knowledge-centric approach / Bill Tsoumas [and others] -- A methodology for designing controlled anonymous applications / Vincent Naessens and Bart De Decker -- Design options for privacy-respecting reputation systems within centralised Internet communities / Sandra Steinbrecher -- Protecting (anonymous) credentials with the trusted computing group's trusted platform modules V1.2 / Jan Camenisch -- Analysis and improvement of anti-phishing schemes / Dinei Florêncio and Cormac Herley -- CAT -- a practical graph & SDL based toolkit for vulnerability assessment of 3G networks / Kameswari Kotapati, Peng Liu and Thomas F. LaPorta -- Protecting Web services from DOS attacks by SOAP message validation / Nils Gruschka and Norbert Luttenberger -- A flexible and distributed architecture to enforce dynamic access control -- Thierry Sans, Frédéric Cuppens and Nora Cuppens-Boulahia -- A paradigm for dynamic and decentralized administration of access control in workflow applications / Andreas Mattas, Ioannins Mavridis and Iason Pagkalos -- CAS++: an open source single sign-on solution for secure E-services / Claudio Agostino Ardagna [and others] -- A synchronous multi-party contract signing protocol improving lower bound of steps / Jianying Zhou, Jose A. Onieva and Javier Lopez -- On the cryptographic key secrecy of the strengthened Yahalom protocol / Michael Backes and Birgit Pfuzmann -- Sealed-bid micro auctions / Kun Peng, Colin Boyd and Ed Dawson -- Detecting known and network intrusions / Yacine Bouzida and Frédéric Cuppens -- Evaluating classifiers for mobile-masquerader detection / Oleksiy Mazhelis, Seppo Puuronen and Mika Raento -- VisFlowCluster-IP: connectivity-based visual clustering of network hosts / Xiaoxin Yin, William Yurcik and Adam Slagell-- A usability study of security policy management / Almut Herzog and Nahid Shahmehri -- Considering the usability of end-user security software / Steven Furnell [and others] -- Utilizing the common criteria for advanced student research projects / Thuy D. Nguyen and Cynthia E. Irvine -- On the relationship of privacy and secure remote logging in dynamic systems / Rafael Accorsi -- Privacy-preserving shared-additive-inverse protocols and their applications / Huafei Zhu, Tieyan Li and Feng Bao -- Click passwords / Darko Kirovski, Nebojša Jojić and Paul Roberts -- Cryptographically enforced personalized role-based access control / Milan Petković, Claudine Conrado and Malik Hammoutène -- Using VO concept for managing dynamic security associations / Yuri Demchenko, Leon Gommans and Cees de Laat -- Secure fast handover in an open broadband access network using Kerberos-style tickets / Martin Gilji Jaatun [and others] -- Network forensics on packet fingerprints / Chia Yuan Cho [and others] -- Oscar -- file type identification of binary data in disk clusters and RAM pages / Martin Karresand and Nahid Shahmehri -- Organizational security culture: more than just an end-user phenomenon / Anthonie B. Ruighaver and Sean B. Maynard -- Cyber security training and awareness through game play / Benjamin D. Cone [and others] -- Internalisation of information security culture amongst employees through basic security knowledge / Omar Zakaria -- Bridging the gap between general management and technicians -- a case study in ICT security / Jabiri Kuwe Bakari [and others] -- Value-focused assessment of information communication and technology security awareness in an academic environment / Lynette Drevin, Hennie Kruger and Tjaart Steyn -- Using phishing for user email security awareness / Ronald C. Dodge and Aaron J. Ferguson -- Invited talk: anonymous credentials: opportunities and challenges / Jan Camenisch -- Practical private regular expression matching / Florian Kerschbaum -- A system for privacy-aware resource allocation and data processing in dynamic environments / Siani Pearson and Marco Casassa-Mont -- The APROB-channel: adaptive semi-real-time anonymous communication / Gergely Tóth, Zoltán Hornák
Summary International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org
Bibliography Includes bibliographical references and index
Notes Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
Print version record
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Subject Computer security -- Congresses
Computer networks -- Access control -- Congresses.
Computers -- Access control -- Congresses
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer networks -- Access control.
Computers -- Access control.
Computer security.
Informatique.
Computer networks -- Access control
Computer security
Computers -- Access control
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Fischer-Hübner, Simone
ISBN 9780387334066
0387334068
038733405X
9780387334059
661062402X
9786610624027