close
1.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2002  viii, 331 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Information Flow I
Approximate Non-Interference / A. Di Pierro ; C. Hankin ; H. Wiklicky
Quantifying Information Flow / G. Lowe
Secrecy in Multiagent Systems / J. Halpern ; K. O'Neill
Intrusion
Two Formal Analyses of Attack Graphs / S. Jha ; O. Sheyner ; J. Wing
Formal Specification of Intrusion Signatures and Detection Rules / J.-P. Pouzol ; M. Ducasse
Protocols I
Types and Effects for Asymmetric Cryptographic Protocols / A. D. Gordon ; A. Jeffrey
Security Protocol Design via Authentication Tests / J. D. Guttman
Strand Spaces and Rank Functions: More Than Distant Cousins / J. Heather
Applications of Model-Checking
Probabilistic Analysis of Anonymity / V. Shmatikov
Analysis of SPKI/SDSI Certificates Using Model Checking / T. Reps
Protocols II
Capturing Parallel Attacks within the Data Independence Framework / P. J. Broadfoot ; A. W. Roscoe
Polynomial Fairness and Liveness / M. Backes ; B. Pfitzmann ; M. Steiner ; M. Waidner
A Formal Analysis of Some Properties of Kerberos 5 Using MSR / F. Butler ; I. Cervesato ; A. D. Jaggard ; A. Scedrov
Games
A Formal Analysis of Syverson's Rational Exchange Protocol / L. Buttyan ; J.-P. Hubaux ; S. Capkun
Game Analysis of Abuse-Free Contract Signing / S. Kremer ; J.-F. Raskin
Language-Based Security
Fine-Grained Information Flow Analysis for a [lambda]-Calculus with Sum Types / V. Simonet
Cryptographic Types / D. Duggan
Secure Information Flow and Pointer Confinement in a Java-Like Language / A. Banerjee ; D. A. Naumann
Distributed Rights, Access Control, and Watermarking
A Privacy Policy Model for Enterprises / G. Karjoth ; M. Schunter
A Logic for Reasoning about Digital Rights / R. Pucella ; V. Weissman
Hiding Functions and Computational Security of Image Watermarking Systems / N. Tran
Information Flow II
Information Flow Security in Dynamic Contexts / R. Focardi ; S. Rossi
A Simple View of Type-Secure Information Flow in the [pi]-Calculus / F. Pottier
Author Index
Preface
Workshop Committee
Information Flow I
2.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2001  viii, 307 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Non-interference and Information Flow
Noninterference Equations for Nondeterministic Systems / S. Pinsky ; E. Zieglar
Robust Declassification / S. Zdancewic ; A. Myers
Access Control
A State-Transition Model of Trust Management and Access Control / A. Chander ; D. Dean ; J. Mitchell
Revocations--A Classification / A. Hagstrom ; S. Jajodia ; F. Parisi-Presicce ; D. Wijesekera
A Logical Reconstruction of SPKI / J. Halpern ; R. van der Meyden
Protocols I
A Security Analysis of the Cliques Protocols Suites / O. Pereira ; J.-J. Quisquater
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules / B. Blanchet
Proving Secrecy is Easy Enough / V. Cortier ; J. Millen ; H. Ruess
Panel
Relating Cryptography and Cryptographic Protocols / A. Scedrov (Moderator) ; R. Canetti ; J. Guttman ; D. Wagner ; M. Waidner
Information Flow and Multi-threading
A New Type System for Secure Information Flow / G. Smith
A Generic Approach to the Security of Multi-threaded Programs / H. Mantel ; A. Sabelfeld
Protocols II
Authenticity by Typing for Security Protocols / A. Gordon ; A. Jeffrey
Computing Symbolic Models for Verifying Cryptographic Protocols / M. Fiore ; M. Abadi
Protocol Insecurity with Finite Number of Sessions is NP-Complete / M. Rusinowitch ; M. Turuani
Intrusion Tolerance and Detection
Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance / P. Liu
Markov Chains, Classifiers, and Intrusion Detection / S. Jha ; K. Tan ; R. Maxion
Log Auditing through Model-Checking / M. Roger ; J. Goubault-Larrecq
Non-interference: Who Needs It? / P. Ryan (Moderator) ; J. McLean ; V. Gligor
Logics for Protocol Verification
A Compositional Logic for Protocol Correctness / N. Durgin ; D. Pavlovic
Logical Relations for Encryption / E. Sumii ; B. Pierce
Secrecy and Privacy
Privacy-Preserving Cooperative Scientific Computations / W. Du ; M. Atallah
Confined Mobile Functions / Z. Kirli
Confidentiality-Preserving Refinement / M. Heisel ; A. Pfitzmann ; T. Santen
Author Index
Preface
Workshop Committee
Non-interference and Information Flow
3.

図書

図書
edited by Yves Deswarte ... [et al]
出版情報: Boston : Kluwer Academic Publishers, 2004  xiv, 548 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 147
所蔵情報: loading…
4.

図書

図書
edited by Theo Dimitrakos, Fabio Martinelli
出版情報: New York : Springer, 2005  x, 246 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 173
所蔵情報: loading…
目次情報: 続きを見る
Information Flow Analysis for Probabilistic Timed Automata
Dynamic Security Labels
Pattern-Matching Spi-Calculus
Interactive Trust Management and Negotiation
Tuple-Space Coordination Models
Deploying Network Security Policies
Auditing Accountability in Decentralized Systems
Overriding Access Control
Complementing Computational Protocol Analysis
Information Flow Analysis for Probabilistic Timed Automata
Dynamic Security Labels
Pattern-Matching Spi-Calculus
5.

図書

図書
edited by David Chadwick, Bart Preneel
出版情報: New York : Springer, 2005  xii, 287 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 175
所蔵情報: loading…
6.

図書

図書
edited by Enrico Nardelli, Maurizio Talamo
出版情報: New York : Springer, 2005  vi, 149 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 177
所蔵情報: loading…
目次情報: 続きを見る
Authentication, Encryption, Certification and Traceability in E-Services
Safeguards, Interception, Tracking and Firewall Technology
Administration, Management, Risk Analysis and Organizational Issues
Mobile Access, Network Protocol and Multilateral Security
Certification Authorities
Public Key Infrastructures
Authentication, Encryption, Certification and Traceability in E-Services
Safeguards, Interception, Tracking and Firewall Technology
Administration, Management, Risk Analysis and Organizational Issues
7.

図書

図書
edited by Ryoichi Sasaki ... [et al.]
出版情報: New York : Springer, 2005  xvi, 612 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 181
所蔵情報: loading…
目次情報: 続きを見る
Security for Multimedia
Digital Signature Schemes
Intrusion Detection
Internet and Web Security
Mobility and Ubiquitous Security
Secure Commercial Systems
Trusted Computing Systems
Accountable Anonymous E-Mail
Protecting Consumer Data in Composite Web Services
Enhancing Security in ERP Systems
Architecture for User Authentication and Key Exchange
A Secure Quantum Communication Protocol Using Insecure Public Channels
Mathematical Models of IP Traceback Methods
Secure Human Communications Based on Biometrics Signals
Designated-Verifier Proxy Signature Schemes
Signcryption in Hierarchical Identity Based Cryptosystem
Security for Multimedia
Digital Signature Schemes
Intrusion Detection
8.

図書

図書
editor, Larry D. Sanson ; sponsored by IEEE Lexington Section, USA ... [et al.]
出版情報: Piscataway, New Jersey : IEEE, c2003  [xviii], 603 p. ; 28 cm
所蔵情報: loading…
9.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2004  viii, 292 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committees
Protocols I
A Theory of Dictionary Attacks and its Complexity / S. Delaune ; F. Jacquemard
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols / O. Pereira ; J. Quisquater
Abstraction and Refinement in Protocol Derivation / A. Datta ; A. Derek ; J. Mitchell ; D. Pavlovic
Access Control
A Distributed Calculus for Role-Based Access Control / C. Braghin ; D. Gorla ; V. Sassone
From Stack Inspection to Access Control: A Security Analysis for Libraries / F. Besson ; T. Blanc ; C. Fournet ; A. Gordon
Intrusion Detection
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework / F. Cuppens ; T. Sans ; S. Gombault
Using Active Learning in Intrusion Detection / M. Almgren ; E. Jonsson
Information Flow
Secure Information Flow by Self-Composition / G. Barthe ; P. D'Argenio ; T. Rezk
Lenient Array Operations for Practical Secure Information Flow / Z. Deng ; G. Smith
Security Policies
Owned Policies for Information Security / H. Chen ; S. Chong
Cassandra: Flexible Trust Management, Applied to Electronic Health Records / M. Becker ; P. Sewell
The Consistency of Task-Based Authorization Constraints in Workflow Systems / K. Tan ; J. Crampton ; C. Gunter
Declassification and Information Flow
Enforcing Robust Declassification / A. Myers ; A. Sabelfeld ; S. Zdancewic
Modelling Downgrading in Information Flow Security / A. Bossi ; C. Piazza ; S. Rossi
Formal Methods and Cryptography
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library / M. Backes ; B. Pfitzmann
Universally Composable Signature, Certification, and Authentication / R. Canetti
Panel: Formal Methods and Cryptography
Authorization
By Reason and Authority: A System for Authorization of Proof-Carrying Code / N. Whitehead ; M. Abadi ; G. Necula
A Formal Foundation for XrML / J. Halpern ; V. Weissman
Protocols II
Formal Analysis of Multi-Party Contract Signing / R. Chadha ; S. Kremer ; A. Scedrov
Symbolic Model Checking the Knowledge of the Dining Cryptographers / K. Su ; R. van der Meyden
Author Index
Preface
Workshop Committees
Protocols I
10.

図書

図書
edited by Sushil Jajodia, Leon Strous
出版情報: Boston : Kluwer Academic, 2004  viii, 253 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 140
所蔵情報: loading…
11.

図書

図書
ACM SIGKDD International Workshop on Knowledge Discovery from Uncertain Data ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  61 p. ; 28 cm
所蔵情報: loading…
12.

図書

図書
Workshop on Social Network Mining and Analysis ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  87 p. ; 28 cm
所蔵情報: loading…
13.

図書

図書
ACM SIGKDD Workshop on Visual Analysis and Knowledge Discovery ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  92 p. ; 28 cm
所蔵情報: loading…
14.

図書

図書
ACM Workshop on Scalable Trusted Computing ; ACM Conference on Computer and Communications Security
出版情報: New York, NY : Association for Computing Machinery, c2009  72 p. ; 28 cm
所蔵情報: loading…
15.

図書

図書
ACM Workshop on Digital Identity Management ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報: New York : Association for Computing Machinery, c2009  84 p. ; 28 cm
所蔵情報: loading…
16.

図書

図書
ACM Workshop on Privacy in the Electronic Society ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; ACM Conference on Computer and Communications Security
出版情報: New York : Association for Computing Machinery, c2009  120 p. ; 28 cm
所蔵情報: loading…
17.

図書

図書
ACM SIGPLAN/SIGSOFT International Conference on Generative Programming and Component Engineering ; ACM Special Interest Group in Programming Languages ; Object-Oriented Programming Systems, Languages and Applications
出版情報: New York : Association for Computing Machinery, c2009  187 p. ; 28 cm
所蔵情報: loading…
18.

図書

図書
editors, Rei Safavi-Naini ...[et al.]
出版情報: New York, NY : Associations for Computing Machinery, c2009  391 p. ; 28 cm
所蔵情報: loading…
19.

図書

図書
ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  ix, 90 p. ; 28 cm
所蔵情報: loading…
20.

図書

図書
sponsored by ACM SIGSAC
出版情報: New York, NY : Association for Computing Machinery, c2007  75 p. ; 28 cm
所蔵情報: loading…
21.

図書

図書
sponsored by ACM SIGSAC
出版情報: New York, NY : Association for Computing Machinery, c2007  vii, 56 p. ; 28 cm
所蔵情報: loading…
22.

図書

図書
sponsored by ACM SIGSAC
出版情報: New York, N.Y. : Association for Computing Machinery, c2007  vi, 92 p. ; 28 cm
所蔵情報: loading…
23.

図書

図書
ACM Workshop on Digital Identity Management ; ACM Conference on Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報: New York, N.Y. : Association for Computing Machinery, c2006  vi, 114 p. ; 28 cm
所蔵情報: loading…
24.

図書

図書
ACM Workshop on Quality of Protection ; ACM Conference on Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York, NY : Association for Computing Machinery, c2006  60 p. ; 28 cm
所蔵情報: loading…
25.

図書

図書
ACM Workshop on Scalable Trusted Computing ; ACM Conference on Computer and Communications Security
出版情報: New York, NY : Association for Computing Machinery, c2006  56 p. ; 28 cm
所蔵情報: loading…
26.

図書

図書
International Workshop on Visualization for Computer Security ; ACM Conference on Computer and Communications Security
出版情報: New York, NY : Association for Computing Machinery, c2006  127 p. ; 28 cm
所蔵情報: loading…
27.

図書

図書
edited by Simone Fischer-Hübner ... [et al.]
出版情報: New York : Springer, c2006  xvi, 494 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 201
所蔵情報: loading…
目次情報: 続きを見る
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures / Jan Camenisch ; Dieter Sommer ; Roger Zimmermann
Security in Mobile and Ad Hoc Networks
Authenticated Query Flooding in Sensor Networks / Zinaida Benenson ; Felix C. Freiling ; Ernest Hammerschmidt ; Stefan Lucks ; Lexi Pimenidis
Identity Based Message Authentication for Dynamic Networks / Pietro Michiardi ; Refik Molva
Providing Authentication and Access Control in Vehicular Network Environment / Hasnaa Moustafa ; Gilles Bourdon ; Yvon Gourhant
Trust and Security Management
A Framework for Web Services Trust / Marijke Coetzee ; Jan Eloff
Trust: An Element of Security / Stephen Flowerday ; Rossouw von Solms
Security-by-Ontology: A Knowledge-Centric Approach / Bill Tsoumas ; Panagiotis Papagiannakopoulos ; Stelios Dritsas ; Dimitris Gritzalis
Privacy Enhancing Technologies II
A Methodology for Designing Controlled Anonymous Applications / Vincent Naessens ; Bart De Decker
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities / Sandra Steinbrecher
Protecting (Anonymous) Credentials with the Trusted Computing Group's Trusted Platform Modules V1.2
Attacks, Vulnerability Analysis, and Tools
Analysis and Improvement of Anti-Phishing Schemes / Dinei Florêncio ; Cormac Herley
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks / Kameswari Kotapati ; Peng Liu ; Thomas F. LaPorta
Protecting Web Services from DOS Attacks by SOAP Message Validation / Nils Gruschka ; Norbert Luttenberger
Access Control and Authentication I
A Flexible and Distributed Architecture to Enforce Dynamic Access Control / Thierry Sans ; Frédéric Cuppens ; Nora Cuppens-Boulahia
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications / Andreas Mattas ; Ioannins Mavridis ; Iason Pagkalos
CAS++: An Open Source Single Sign-on Solution for Secure E-services / Claudio Agostino Ardagna ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Fulvio Frati ; Pierangela Samarati
Security Protocols
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps / Jianying Zhou ; Jose A. Onieva ; Javier Lopez
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol / Michael Backes ; Birgit Pfitzmann
Sealed-Bid Micro Auctions / Kun Peng ; Colin Boyd ; Ed Dawson
Intrusion Detection
Detecting Known and Novel Network Intrusions / Yacine Bouzida
Evaluating Classifiers for Mobile-Masquerader Detection / Oleksiy Mazhelis ; Seppo Puuronen ; Mika Raento
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts / Xiaoxin Yin ; William Yurcik ; Adam Slagell
Usability and Awareness
A Usability Study of Security Policy Management / Almut Herzog ; Nahid Shahmehri
Considering the Usability of End-User Security Software / Steven Furnell ; Adila Jusoh ; Dimitris Katsabas ; Paul Dowland
Utilizing the Common Criteria for Advanced Student Research Projects / Thuy D. Nguyen ; Cynthia E. Irvine
Privacy Enhancing Technologies III
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems / Rafael Accorsi
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications / Huafei Zhu ; Tieyan Li ; Feng Bao
Access Control and Authentication II
Click Passwords / Darko Kirovski ; Nebojsa Jojic ; Paul Roberts
Cryptographically Enforced Personalized Role-Based Access Control / Milan Petkovic ; Claudine Conrado ; Malik Hammoutene
Access Control and Authentication III
Using VO Concept for Managing Dynamic Security Associations / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets / Martin Gilje Jaatun ; Inger Anne Tondel ; Frederic Paint ; Tor Hjalmar Johannessen ; John Charles Francis ; Claire Duranton
Forensics
Network Forensics on Packet Fingerprints / Chia Yuan Cho ; Sin Yeung Lee ; Chung Pheng Tan ; Yong Tai Tan
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages / Martin Karresand
IFIP WG 11.1/11.8 Security Culture Workshop
Organizational Security Culture: More Than Just an End-User Phenomenon / Anthonie B. Ruighaver ; Sean B. Maynard
Cyber Security Training and Awareness Through Game Play / Benjamin D. Cone ; Michael F. Thompson
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge / Omar Zakaria
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security / Jabiri Kuwe Bakari ; Charles N. Tarimo ; Christer Magnusson ; Louise Yngström
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment / Lynette Drevin ; Hennie Kruger ; Tjaart Steyn
Using Phishing for User Email Security Awareness / Ronald C. Dodge ; Aaron J. Ferguson
IFIP WG 11.4 I-NetSec'06 Workshop
Invited Talk: Anonymous Credentials: Opportunities and Challenges
Practical Private Regular Expression Matching / Florian Kerschbaum
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments / Siani Pearson ; Marco Casassa-Mont
The APROB-Channel: Adaptive Semi-Real-Time Anonymous Communication / Gergely Tóth ; Zoltán Hornák
Author Index
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
28.

図書

図書
edited by Jaynarayan H. Lala ; [supported by] DARPA
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  xix, 435 p. ; 28 cm
所蔵情報: loading…
29.

図書

図書
[sponsored by IEEE Computer Society Task Force on Information Assurance, IEEE Computer Society Mass Storage Systems Technical Committee]
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2004  v, 78 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Decentralized Authentication Mechanisms for Object-Based Storage Devices / V. Kher ; Y. Kim
Fast and Secure Magnetic WORM Storage Systems / Y. Wang ; Y. Zheng
Key Management for Encrypted Data Storage in Distributed Systems / L. Seitz ; J.-M. Pierson ; L. Brunie
Information Security on the Logistical Network: An End-to-End Approach / M. Beck ; J. Plank ; J. Millar ; S. Atchley ; S. Soltesz ; A. Bassi ; H. Liu
Implementation of a Storage Mechanism for Untrusted DBMSs / E. Damiani ; S. di Vimercati ; M. Finetti ; S. Paraboschi ; P. Samarati ; S. Jajodia
Cryptographic File Systems Performance: What You Don't Know Can Hurt You / C. Wright ; J. Dave ; E. Zadok
Memories: A Survey of Their Secure Uses in Smart Cards / M. Neve ; E. Peeters ; D. Samyde ; J.-J. Quisquater
The Object Store Security Protocol / M. Factor ; D. Naor ; N. Rinetzky ; J. Satran ; D. Nagle ; D. Beaver ; E. Riede
IEEE Standard for Encrypted Storage / J. Hughes
Research and Implement of an Encrypted File System Used to NAS / H. Jianzhong ; X. Changsheng ; C. Bin
Author Index
Decentralized Authentication Mechanisms for Object-Based Storage Devices / V. Kher ; Y. Kim
Fast and Secure Magnetic WORM Storage Systems / Y. Wang ; Y. Zheng
Key Management for Encrypted Data Storage in Distributed Systems / L. Seitz ; J.-M. Pierson ; L. Brunie
30.

図書

図書
[editor, Oleg Stoukatch]
出版情報: Piscataway, NJ : IEEE, 2003  152 p. ; 20 cm
所蔵情報: loading…
31.

図書

図書
editor, Larry D. Sanson ; sponsored by IEEE Lexington Section USA ... [et al.] ; in association with Universidad de las Palmas de Gran Canaria, Gobierno de Canarias, SECURITAS
出版情報: Piscataway, NJ : IEEE, c2005  336 p. ; 28 cm
所蔵情報: loading…
32.

図書

図書
ACM Workshop on XML Security ; Association for Computing Machinery ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; ACM Conference on Computer and Communications Security
出版情報: New York, N.Y. : Association for Computing Machinery, c2004  vi, 121 p. ; 28 cm
所蔵情報: loading…
33.

図書

図書
sponsored by ACM SIGSAC
出版情報: New York : ACM, 2004  vii, 148 p. ; 28 cm
所蔵情報: loading…
34.

図書

図書
[general chairs: Jana Dittmann ; program chairs: Jessica Fridrich]
出版情報: New York, NY : ACM Press, 2004  viii, 228 p. ; 28 cm
所蔵情報: loading…
35.

図書

図書
Workshop on Software Engineering for Secure Systems ; International Conference on Software Engineering
出版情報: New York, N.Y. : Association for Computing Machinery, c2005  128 p. ; 28 cm
所蔵情報: loading…
36.

図書

図書
ACM Symposium on Information, Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York, NY : Associations for Computing Machinery, c2006  i, [12], 347 p. ; 28 cm
所蔵情報: loading…
37.

図書

図書
edited by Hein Venter ... [et al.]
出版情報: New York : Springer, c2007  xv, 498 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 232
所蔵情報: loading…
目次情報: 続きを見る
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
Human-Computer Interaction I
Value creation and Return on Security Investments (ROSI) / Christer Magnusson ; Josef Molvidsson ; Sven Zetterqvist
Usability and Security of Personal Firewalls / Almut Herzog ; Nahid Shahmehri
Computer-Based Trust
Trusted Ticket Systems and Applications / Andreas U. Schmidt ; Nicolai Kuntze
Trust Evaluation for Web Applications based on Behavioral Analysis / Luiz da Costa Carmo ; Breno de Oliveira ; Augusto Braga
Information Security Management I
Improving the Information Security Model by using TFI / Rose-Mharie Ahlfeldt ; Paolo Spagnoletti ; Guttorm Sindre
Ontological Mapping of Common Criteria's Security Assurance Requirements / Andreas Ekelhart ; Stefan Fenz ; Gernot Goluch ; Edgar Weippl
Network Security I
Management of Exceptions on Access Control Policies / Joaquin Garcia-Alfaro ; Frederic Cuppens ; Nora Cuppens-Boulahia
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols / Tieyan Li ; Guilin Wang
Information Security Management II
Exploratory Survey on an Evaluation Model for a Sense of Security / Natsuko Hikage ; Yuko Murayama ; Carl Hauser
Employees' Adherence to Information Security Policies: An Empirical Study / Mikko Siponen ; Seppo Pahnila ; Adam Mahmood
Network Security II
Phishing in the Wireless: Implementation and Analysis / Ivan Martinovic ; Frank Zdarsky ; Adam Bachorek ; Christian Jung ; Jens Schmitt
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks / Tyler Moore ; Jolyon Clulow
Access Control I
A Credential-Based System for the Anonymous Delegation of Rights / Liesje Demuynck ; Bart De Decker ; Wouter Joosen
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content / Christian Josef Eibl ; S.H. Basie von Solms ; Sigrid Schubert
Human-Computer Interaction II
Identity Theft - Empirical Evidence from a Phishing Exercise / Tjaart Steyn ; Hennie Kruger ; Lynette Drevin
A Practical Usability Evaluation of Security Features in End-User Applications / Steven Furnell ; Dimitris Katsabas ; Paul Dowland ; Fraser Reid
Intrusion Detection Systems
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis / Maciej Rossudowski ; Hein Venter ; Jan Eloff
A Survey of Bots Used for Distributed Denial of Service Attacks / Vrizlynn Thing ; Morris Sloman ; Naranker Dulay
Access Control II
A Hybrid PKI-IBC Based Ephemerizer System / Srijith Nair ; Mohammad Dashti ; Bruno Crispo ; Andrew Tanenbaum
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices / Sevasti Karatzouni ; Nathan Clarke
Information Privacy I
Security Remarks on a Convertible Nominative Signature Scheme / Feng Bao
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions / Alapan Arnab ; Andrew Hutchison
Access Control III
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation / Evangelos Kotsovinos ; Ingo Friese ; Martin Kurze ; Jorg Heuer
Extending Role Based Access Control Model for Distributed Multidomain Applications / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Information Privacy II
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy / Claudio Ardagna ; Marco Cremonini ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Pierangela Samarati
Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning / Jan Zibuschka ; Lothar Fritsch ; Mike Radmacher ; Tobias Scherner ; Kai Rannenberg
Access Control IV
Crafting Web Counters into Covert Channels / Xiapu Luo ; Edmond Chan ; Rocky Chang
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM / Thierry Sans
Security Services
Non-Repudiation in Internet Telephony / Andreas Schmidt ; Christian Hett
FirePatch: Secure and Time-Critical Dissemination of Software Patches / Havard Johansen ; Dag Johansen ; Robbert van Renesse
Access Control V
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing / Sara Foresti ; Sushil Jajodia ; Stefano Paraboschi
Building a Distributed Semantic-aware Security Architecture / Jan Kolter ; Rolf Schillinger ; Gunther Pernul
Trust and Intrusion Detection Systems
Using Trust to Resist Censorship in the Presence of Collusion / Andriy Panchenko ; Lexi Pimenidis
Evaluating the Effects of Model Generalization on Intrusion Detection Performance / Zhuowei Li ; Amitabha Das ; Jianying Zhou
Keynote paper
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM / William Caelli
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society
Covert Identity Information in Direct Anonymous Attestation (DAA) / Carsten Rudolph
Safeguarding Personal Data using Rights Management in Distributed Applications / Adolf Hohl ; Alf Zugenmaier
Identification Now and in the Future: Social Grant Distribution Process in South Africa / Stephen Flowerday ; Gideon Ranga
Hard-drive Disposal and Identity Fraud / Paula Thomas ; Theodore Tryfonas
An analysis of security and privacy issues relating to RFID enabled ePassports / Eleni Kosta ; Martin Meints ; Marit Hansen ; Mark Gasson
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Manageable Information Security
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework / Nicholas Tate ; Sharman Lichtenstein ; Matthew Warren
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program / Tatjana Welzer ; Marko Holbl ; Ana Habjanic ; Bostjan Brumen ; Marjan Druzovec
Remote Virtual Information Assurance Network / Ronald Dodge ; Corey Bertram ; Daniel Ragsdale
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model / Kara Nance ; Brian Hay
Author Index
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
38.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2005  viii, 302 p. ; 28 cm
所蔵情報: loading…
39.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c2000  ix, 285 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Program Committee
Cover Photo
Names and Certificates
Local Names In SPKI/SDSI / N. Li
Reasoning about Trust and Insurance in a Public Key Infrastructure / J. Millen ; R. Wright
Strands and Multiset Rewriting
Protocol Independence through Disjoint Encryption / J. Guttman ; F. J. Thayer
Relating Strands and Multiset Rewriting for Security Protocol Analysis / I. Cervesato ; N. Durgin ; J. Mitchell ; P. Lincoln ; A. Scedrov
Optimizing Protocol Rewrite Rules of CIL Specifications / G. Denker ; A. Grau ; J. Filipe
Automated Security Protocol Methods
Looking for Diamonds in the Desert--Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols / A. Perrig ; D. Song
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis / A. Dekker
An Executable Specification Language for Planning Attacks to Security Protocols / L. Aiello ; F. Massacci
Panel
Foundations for Intrusion Detection? / T. Lunt
Network Security
Analyzing Single-Server Network Inhibition / T. Aura ; M. Bishop ; D. Sniegowski
Reasoning about Secrecy for Active Networks / P. Kakkar ; C. Gunter ; M. Abadi
Invariants, Induction, Ranks, Languages, and Ideals
Towards Automatic Verification of Authentication Protocols on an Unbounded Network / J. Heather ; S. Schneider
TAPS: A First-Order Verifier for Cryptographic Protocols / E. Cohen
Invariant Generation Techniques in Cryptographic Protocol Analysis / C. Meadows
Noninterference and Information Flow
Information Flow Analysis in a Discrete-Time Process Algebra / R. Focardi ; R. Gorrieri ; F. Martinelli
Possibilistic Definitions of Security--An Assembly Kit / H. Mantel
Probabilistic Noninterference for Multi-Threaded Programs / A. Sabelfeld ; D. Sands
Invited Talk
Lorenz and Colossus / A. Sale
Java and Mobile Code Security
An Operational Semantics of Java 2 Access Control / G. Karjoth
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol / M. Dam ; P. Giambiagi
Types and Language-Based Security
Secure Introduction of One-Way Functions / D. Volpano
How to Prevent Type Flaw Attacks on Security Protocols / G. Lowe
Secure Composition of Untrusted Code: Wrappers and Causality Types / P. Sewell ; J. Vitek
Author Index
Preface
Program Committee
Cover Photo
40.

図書

図書
ACM Workshop on Scalable Trusted Computing ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York : Association for Computing Machinery, c2008  91 p. ; 28 cm
所蔵情報: loading…
41.

図書

図書
ACM Workshop on Digital Identity Management ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報: New York : Association for Computing Machinery, c2008  100 p. ; 28 cm
所蔵情報: loading…
42.

図書

図書
ACM Workshop on Quality of Protection ; ACM Conference on Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York : Association for Computing Machinery, c2008  60 p. ; 28 cm
所蔵情報: loading…
43.

図書

図書
sponspred by ACM SIGPLAN ; co-located with OOPSLA '08
出版情報: New York : Association for Computing Machinery, c2008  viii, 185 p. ; 28 cm
所蔵情報: loading…
44.

図書

図書
ACM Symposium on Information, Computer and Communications Security ; Association for Computing Machinery
出版情報: New York, NY : Associations for Computing Machinery, c2007  399 p. ; 28 cm
所蔵情報: loading…
45.

図書

図書
ACM Symposium on Information, Computer and Communications Security ; Association for Computing Machinery
出版情報: New York, NY : Associations for Computing Machinery, c2008  388 p. ; 28 cm
所蔵情報: loading…
46.

図書

図書
ACM SIGPLAN/SIGSOFT International Conference on Generative Programming and Component Engineering ; ACM Special Interest Group in Programming Languages ; Object-Oriented Programming Systems, Languages and Applications
出版情報: New York : Association for Computing Machinery, c2006  293 p. ; 28 cm
所蔵情報: loading…
47.

図書

図書
ACM SIGPLAN/SIGSOFT International Conference on Generative Programming and Component Engineering ; ACM Special Interest Group in Programming Languages ; Embedded Systems Week
出版情報: New York : Association for Computing Machinery, c2007  182 p. ; 28 cm
所蔵情報: loading…
48.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  viii, 265 p. ; 28 cm
所蔵情報: loading…
49.

図書

図書
sponsored by DARPA
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  2 vol. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Papers by Program Order / Volume I:
Composable High Assurance Trusted Systems (CHATS)
Design and Implementation of the TrustedBSD MAC Framework / R. Watson ; B. Feldman ; A. Migus ; C. Vance
Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack / C. Cowan ; S. Arnold ; S. Beattie ; C. Wright ; J. Viega
Cyber Panel
Finding the Vocabulary of Program Behavior Data for Anomaly Detection / C. Michael
Detecting Spoofed Packets / S. Templeton ; K. Levitt
Modeling Multistep Cyber Attacks for Scenario Recognition / S. Cheung ; U. Lindqvist ; M. Fong
Cooperative Response Strategies for Large Scale Attack Mitigation / D. Nojiri ; J. Rowe
Dynamic Coalitions (DC)
Dynamic Authorization and Intrusion Response in Distributed Systems / T. Ryutov ; C. Neuman ; D. Kim
The STRONGMAN Architecture / A. Keromytis ; S. Ioannidis ; M. Greenwald ; J. Smithy
Dynamic PKI and Secure Tuplespaces for Distributed Coalitions / T. Smith ; G. Byrd ; X. Wu ; H. Xin ; K. Thangavelu ; R. Wang ; A. Shah
RT: A Role-Based Trust-Management Framework / N. Li ; J. Mitchell
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer / Y. Amir ; C. Nita-Rotaru ; J. Stanton ; G. Tsudik
MuCAPSL / J. Millen ; G. Denker
Leader Election Algorithms for Wireless Ad Hoc Networks / S. Vasudevan ; B. DeCleene ; N. Immerman ; J. Kurose ; D. Towsley
Fault Tolerant Networking (FTN)
COSSACK: Coordinated Suppression of Simultaneous Attacks / C. Papadopoulos ; R. Lindell ; J. Mehringer ; A. Hussain ; R. Govindan
NetBouncer: Client-Legitimacy-Based High-Performance DDoS Filtering / R. Thomas ; B. Mark ; T. Johnson ; J. Croall
Analyzing Interaction between Distributed Denial of Service Attacks and Mitigation Technologies / W. Blackert ; D. Gregg ; A. Castner ; E. Kyle ; R. Hom ; R. Jokerst
Design and Analysis of an IP-Layer Anonymizing Infrastructure / H. Kung ; C. Cheng ; K. Tan ; S. Bradner
Prophylactic, Treatment and Containment Techniques for Ensuring Active Network Security / S. Murphy ; A. Hayatnagarkar ; S. Krishnaswamy ; W. Morrison
Understanding BGP Behavior through a Study of DoD Prefixes / X. Zhao ; D. Massey ; S. Wu ; M. Lad ; D. Pei ; L. Wang ; L. Zhang
Efficient Alarm Management in Optical Networks / S. Stanic ; S. Subramaniam ; H. Choi ; G. Sahin
Interactions Between TCP and the IEEE 802.11 MAC Protocol / R. Jiang ; V. Gupta ; C. Ravishankar
Statistical Approaches to DDoS Attack Detection and Response / L. Feinstein ; D. Schnackenberg ; R. Balupari ; D. Kindred
Organic and Survivable Information Systems (OASIS)
Towards a Rigorous Definition of Information System Survivability / J. Knight ; E. Strunk ; K. Sullivan
Intrusion Tolerance via Network Layer Controls / D. O'Brien ; R. Smith ; T. Kappel ; C. Bitzer
Operational Experimentation (OPX)
Lessons Learned in Using Live Red Teams in IA Experiments / D. Levin
Surveillance Detection in High Bandwidth Environments / S. Robertson ; E. Siegel ; M. Miller ; S. Stolfo
Detecting Novel Scans through Pattern Anomaly Detection / A. Valdes
Author Index
DARPA Information Survivability Conference and Exposition--DISCEX 2003 / Volume II:
Foreword
Acknowledgments
Demonstration Abstracts / Part I:
Open-Source PKI on SELinux--A Technology Description / E. Bubnis ; S. Evans ; P. Fischer ; E. Meighan ; A. Almeida
Demonstration of COSAK Static Analysis Tools / D. DaCosta ; C. Dahn ; S. Mancoridis ; V. Prevelakis
MYSEA Technology Demonstration / C. Irvine ; D. Shifflett ; P. Clark ; T. Levin ; G. Dinolt
The TrustedBSD MAC Framework
Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches / A. D'Amico ; S. Salas
A Controller-Based Autonomic Defense System / D. Armstrong ; S. Carter ; G. Frazier ; T. Frazier
Scyllarus Intrusion Detection Report Correlator and Analyzer / W. Heimerdinger
System Health and Intrusion Monitoring: Technology Description / C. Ko
CIRCADIA Demonstration: Active Adaptive Defense / D. Musliner
An Integrated Cyber Panel System / L. Tinnel ; O. Saydjari ; J. Haines
Intelligence Preparation of the Information Battlespace (IPIB) / J. Williams
Integrated Security Services for Dynamic Coalitions / H. Khurana ; S. Gavrila ; R. Bobba ; R. Koleva ; A. Sonalker ; E. Dinu ; V. Gligor ; J. Baras
Key Management for Secure Multicast Group Communication in Mobile Networks / T. Kostas ; D. Kiwior ; G. Rajappan ; M. Dalal
Antigone: Policy-Based Secure Group Communication System and AmirD: Antigone-Based Secure File Mirroring System / J. Irrer ; A. Prakash ; P. McDaniel
Federated Security Management for Dynamic Coalitions / S. Bhatt ; S. Rajagopalan ; P. Rao
TrustBuilder: Negotiating Trust in Dynamic Coalitions / K. Seamons ; T. Chan ; E. Child ; M. Halcrow ; A. Hess ; J. Holt ; J. Jacobson ; R. Jarvis ; A. Patty ; B. Smith ; T. Sundelin ; L. Yu
Yalta: A Dynamic PKI and Secure Tuplespaces for Distributed Coalitions
A Toolkit for Building Secure, Fault-Tolerant Virtual Private Networks / W. Stephens ; B. Coan ; S. Narain ; V. Kaul ; K. Parmeswaran ; T. Cheng
Distributed Data Authentication / M. Goodrich ; M. Shin ; C. Straub ; R. Tamassia
Automated Trust Negotiation Technology with Attribute-Based Access Control / W. Winsborough ; J. Jacobs
Fault Tolerant Networks (FTN)
The Wackamole Approach to Fault Tolerant Networks / R. Caudy ; A. Munjal ; T. Schlossnagle ; C. Tutu
Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA)
NCAC: Network Congestion Analyzer and Controller
DDoS Tolerant Networks
Guaranteed Internet Stack Utilization (GINSU) Building Blocks / R. Knobbe ; A. Purtell
ANON: An IP-Layer Anonymizing Infrastructure
Distributed Embedded Firewalls with Virtual Private Groups / T. Markham ; L. Meredith ; C. Payne
Fault-Tolerant Mesh of Trust Applied to DNS Security / W. Griffin ; R. Mundy ; S. Weiler ; N. Vora
Demonstration of Fault Tolerance for CORBA Applications / L. Moser ; M. Melliar-Smith
Dynamic Trust-Based Resource Allocation / T. Hughes ; M. Junod ; P. Muckelbauer
Active Network Fault Response
Scalable DDoS Protection Using Route-Based Filtering / K. Park
Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA) / R. Ramanujan ; S. Kudige ; T. Nguyen
DefCOM: Defensive Cooperative Overlay Mesh / M. Robinson ; J. Mirkovic ; S. Michel ; M. Schnaider ; P. Reiher
Improving Failure Responsiveness in Jini Leasing / S. Rose ; K. Bowers ; S. Quirolgico ; K. Mills
SPIE Demonstration: Single Packet Traceback / W. Strayer ; C. Jones ; F. Tchakountio ; A. Snoeren ; B. Schwartz ; R. Clements ; M. Condell ; C. Partridge
Onion Routing for Resistance to Traffic Analysis / P. Syverson
TetherNet Anti-NAT--Secure Internet Subnet Rental System / H. Zhu ; T. Huck ; J. Touch ; L. Eggert ; Y. Wang
Organically Assured and Survivable Information Systems (OASIS)
Safe Email, Safe Office, and Safe Web Browser / R. Balzer
Access Control on the Web Using Proof-Carrying Authorization / L. Bauer ; M. Schneider ; E. Felten ; A. Appel
Enterprise Wrappers for Information Assurance / M. Feldman
Willow System Demonstration / J. Hill ; P. Varner ; A. Wolf ; D. Heimbigner ; P. Devanbu
Camouflage of Network Traffic to Resist Attack (CONTRA) / W. Weinstein ; J. Lepanto
Dependable Intrusion Tolerance: Technology Demo / M. Almgren ; Y. Deswarte ; B. Dutertre ; J. Levy ; H. Saidi ; V. Stavridou ; T. Uribe
ITDB: An Attack Self-Healing Database System Prototype / P. Liu
Intrustion Tolerant Web Servers via Network Layer Controls
Demonstrating Intrusion Tolerance with ITUA / P. Pal
VPNshield: Protecting VPN Services from Denial-of-Service (DoS) Attacks / M. Kaddoura ; J. Wu ; C. Sanders ; K. Millikin
On-Line Attack Prevention and Continual Recovery / J. Reynolds
An Aspect-Oriented Security Solution / V. Shah ; F. Hill
OmniVPN / J. Shukla
Efficient Code Certification for Open Firmware / M. Stillerman ; D. Kozen
Intrusion Tolerant Distributed Object Systems / G. Tally ; B. Whitmore ; D. Sames ; B. Matt ; B. Niebuhr ; D. Bakken
SPMA--Java Binary Enhancement Tool / T. Van Vleck ; A. Reisse
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services / F. Wang ; R. Uppalli
System Detection's Hawkeye Platform
Research Summaries / Part II:
Modeling Security-Enhanced Linux Policy Specifications for Analysis / M. Archer ; E. Leonard ; M. Pradella
Open-Source PKI on SELinux
Monterey Security Enhanced Architecture Project
Achieving Principled Assuredly Trustworthy Composable Systems and Networks / P. Neumann
Enhancing ReiserFS Security in Linux / H. Reiser
LLSIM: Network Simulation for Correlation and Response Testing / S. Goulet ; R. Durst ; T. Champion
System Health and Intrusion Monitoring (SHIM): Project Summary
Predicting the Impact of Cyber-Attacks on BMC[subscript 3] Enterprises / J. Shaw
A Framework for Automated Negotiation of Access Control Policies / V. Bharadwaj
Recommendations in Using Group Key Management Algorithms / W. Chen ; L. Dondeti
DyCER: A Lightweight Data Sharing System Using Replication / J. Kay ; S. Crocker
A Flexible Architecture for Security Policy Enforcement
Trust Negotiation in Dynamic Coalitions / M. Winslett ; T. Yu
Efficient and Scalable Infrastructure Support for Dynamic Coalitions
Automated Trust Negotiation in Attribute-Based Access Control
A Summary of the Autonomic Distributed Firewalls (ADF) Project
Traceback of Single IP Packets Using SPIE
DynaBone: Dynamic Defense Using Multi-Layer Internet Overlays / G. Finn
A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks / V. Mahadik ; D. Reeves
Engineering a Distributed Intrusion Tolerant Database System Using COTS Components
EMT/MET: Systems for Modeling and Detecting Errant Email / S. Hershkop ; K. Wang ; O. Nimeskern
Papers by Program Order / Volume I:
Composable High Assurance Trusted Systems (CHATS)
Design and Implementation of the TrustedBSD MAC Framework / R. Watson ; B. Feldman ; A. Migus ; C. Vance
50.

図書

図書
edited by Ralf Steinmetz, Jana Dittman, Martin Steinebach
出版情報: Boston : Kluwer Academic Publishers, c2001  x, 393, [34] p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 64
所蔵情報: loading…
目次情報: 続きを見る
Preface
Conference Committees
Web Security
What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification / K. Scheibelhofer
XML Electronic Signatures / G. Karlinger
An integrated secure Web architecture for protected Mobile code distribution / M. Jalali-Sohi, et al.
Secure and anonymous multicast framework / N. Weiler ; B. Plattner
Vulnerabilities and Security Limitations of current IP Telephony Systems / R. Ackermann, et al. Watermarking I
Quantization Watermarking in the JPEG2000 Coding Pipeline / P. Meerwald
Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences / S. Tsekeridou, et al.
Scalable Detection of Perceptual Watermarks in JPEG2000 Images / D. Simitopoulos, et al.
Cryptographic Algorithms
Collecting randomness from the net / B. Bencsath ; I. Vajda
Encryption System Based on Neutral Network / C.-K. Chan, et al.
A Modified Chaotic Cryptographic Method / W. Wong, et al.
An Elliptic Curve Random Number Generator / I. Lee ; K. Wong
Watermarking II
Conditional and User Specific Access to Services and Resources Using Annotation Watermarks / J. Dittmann, et al.
Large Scale distributed watermarking of multicast media through encryption / R. Parviainen ; P. Parnes
Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept / S. Craver ; S. Katzenbeisser
Fingerprints for Copyright Protection / S. Encheva
System Security
Software Security Assessment through Specification Mutations and Fault Injection / R. Kaksonen, et al.
Asynchronous Large-Scale Certification Based on Certificate Verification Trees / J. Domingo-Ferrer, et al.
ACLA: A Framework for Access Control List (ACL) Analysis and Optimization / J. Qian, et al.
Transparent Access to Encrypted Data Using Operating System Network Stack Extensions / E. Rademer ; S.D. Wolthusen
A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System / M. Markovic, et al.
Watermarking III
Optimization of Watermarking Performances Using Error Correcting Codes and Repetition / S. Zinger, et al.
Using Raw Speech as a Watermark, does it work? / P. Nintanavongsa ; T. Amornraksa
Multiple Security Aspects
Transferability in Coin Systems with Observers / C. Fremdt ; H. Neumann
Secure iLearning / F. Graf
Tree-based Multicast Key Agreement / J. Schwenk, et al.
Security for the core network of third generation mobile systems / G. Horn, et al.
Secure Internet Phone / P. Horster, et al.
Posters
Secure Meeting Scheduling with AgenTa / T. Herlea, et al.
Virtual Hidden Network / N. Shin
Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval / R. Puertpan, et al.
A Prepositioned Secret Sharing Scheme for Message Authentification in Broadcast Networks / A. Eskicioglu
Secure Service Centered Networking for Nomadic Usage / M. Hollick
Last Minute Papers
A Secure Authentication Infrastructure for Mobile Communication Services over the Internet / I. Dupre la Tour, et al.
Blind Compressed-Domain Watermarking for MPEG-encoded Videos / C.-L. Wu, et al.
Index of Contributors
Preface
Conference Committees
Web Security
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼