close
1.

図書

図書
sponsored by DARPA
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  2 vol. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Papers by Program Order / Volume I:
Composable High Assurance Trusted Systems (CHATS)
Design and Implementation of the TrustedBSD MAC Framework / R. Watson ; B. Feldman ; A. Migus ; C. Vance
Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack / C. Cowan ; S. Arnold ; S. Beattie ; C. Wright ; J. Viega
Cyber Panel
Finding the Vocabulary of Program Behavior Data for Anomaly Detection / C. Michael
Detecting Spoofed Packets / S. Templeton ; K. Levitt
Modeling Multistep Cyber Attacks for Scenario Recognition / S. Cheung ; U. Lindqvist ; M. Fong
Cooperative Response Strategies for Large Scale Attack Mitigation / D. Nojiri ; J. Rowe
Dynamic Coalitions (DC)
Dynamic Authorization and Intrusion Response in Distributed Systems / T. Ryutov ; C. Neuman ; D. Kim
The STRONGMAN Architecture / A. Keromytis ; S. Ioannidis ; M. Greenwald ; J. Smithy
Dynamic PKI and Secure Tuplespaces for Distributed Coalitions / T. Smith ; G. Byrd ; X. Wu ; H. Xin ; K. Thangavelu ; R. Wang ; A. Shah
RT: A Role-Based Trust-Management Framework / N. Li ; J. Mitchell
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer / Y. Amir ; C. Nita-Rotaru ; J. Stanton ; G. Tsudik
MuCAPSL / J. Millen ; G. Denker
Leader Election Algorithms for Wireless Ad Hoc Networks / S. Vasudevan ; B. DeCleene ; N. Immerman ; J. Kurose ; D. Towsley
Fault Tolerant Networking (FTN)
COSSACK: Coordinated Suppression of Simultaneous Attacks / C. Papadopoulos ; R. Lindell ; J. Mehringer ; A. Hussain ; R. Govindan
NetBouncer: Client-Legitimacy-Based High-Performance DDoS Filtering / R. Thomas ; B. Mark ; T. Johnson ; J. Croall
Analyzing Interaction between Distributed Denial of Service Attacks and Mitigation Technologies / W. Blackert ; D. Gregg ; A. Castner ; E. Kyle ; R. Hom ; R. Jokerst
Design and Analysis of an IP-Layer Anonymizing Infrastructure / H. Kung ; C. Cheng ; K. Tan ; S. Bradner
Prophylactic, Treatment and Containment Techniques for Ensuring Active Network Security / S. Murphy ; A. Hayatnagarkar ; S. Krishnaswamy ; W. Morrison
Understanding BGP Behavior through a Study of DoD Prefixes / X. Zhao ; D. Massey ; S. Wu ; M. Lad ; D. Pei ; L. Wang ; L. Zhang
Efficient Alarm Management in Optical Networks / S. Stanic ; S. Subramaniam ; H. Choi ; G. Sahin
Interactions Between TCP and the IEEE 802.11 MAC Protocol / R. Jiang ; V. Gupta ; C. Ravishankar
Statistical Approaches to DDoS Attack Detection and Response / L. Feinstein ; D. Schnackenberg ; R. Balupari ; D. Kindred
Organic and Survivable Information Systems (OASIS)
Towards a Rigorous Definition of Information System Survivability / J. Knight ; E. Strunk ; K. Sullivan
Intrusion Tolerance via Network Layer Controls / D. O'Brien ; R. Smith ; T. Kappel ; C. Bitzer
Operational Experimentation (OPX)
Lessons Learned in Using Live Red Teams in IA Experiments / D. Levin
Surveillance Detection in High Bandwidth Environments / S. Robertson ; E. Siegel ; M. Miller ; S. Stolfo
Detecting Novel Scans through Pattern Anomaly Detection / A. Valdes
Author Index
DARPA Information Survivability Conference and Exposition--DISCEX 2003 / Volume II:
Foreword
Acknowledgments
Demonstration Abstracts / Part I:
Open-Source PKI on SELinux--A Technology Description / E. Bubnis ; S. Evans ; P. Fischer ; E. Meighan ; A. Almeida
Demonstration of COSAK Static Analysis Tools / D. DaCosta ; C. Dahn ; S. Mancoridis ; V. Prevelakis
MYSEA Technology Demonstration / C. Irvine ; D. Shifflett ; P. Clark ; T. Levin ; G. Dinolt
The TrustedBSD MAC Framework
Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches / A. D'Amico ; S. Salas
A Controller-Based Autonomic Defense System / D. Armstrong ; S. Carter ; G. Frazier ; T. Frazier
Scyllarus Intrusion Detection Report Correlator and Analyzer / W. Heimerdinger
System Health and Intrusion Monitoring: Technology Description / C. Ko
CIRCADIA Demonstration: Active Adaptive Defense / D. Musliner
An Integrated Cyber Panel System / L. Tinnel ; O. Saydjari ; J. Haines
Intelligence Preparation of the Information Battlespace (IPIB) / J. Williams
Integrated Security Services for Dynamic Coalitions / H. Khurana ; S. Gavrila ; R. Bobba ; R. Koleva ; A. Sonalker ; E. Dinu ; V. Gligor ; J. Baras
Key Management for Secure Multicast Group Communication in Mobile Networks / T. Kostas ; D. Kiwior ; G. Rajappan ; M. Dalal
Antigone: Policy-Based Secure Group Communication System and AmirD: Antigone-Based Secure File Mirroring System / J. Irrer ; A. Prakash ; P. McDaniel
Federated Security Management for Dynamic Coalitions / S. Bhatt ; S. Rajagopalan ; P. Rao
TrustBuilder: Negotiating Trust in Dynamic Coalitions / K. Seamons ; T. Chan ; E. Child ; M. Halcrow ; A. Hess ; J. Holt ; J. Jacobson ; R. Jarvis ; A. Patty ; B. Smith ; T. Sundelin ; L. Yu
Yalta: A Dynamic PKI and Secure Tuplespaces for Distributed Coalitions
A Toolkit for Building Secure, Fault-Tolerant Virtual Private Networks / W. Stephens ; B. Coan ; S. Narain ; V. Kaul ; K. Parmeswaran ; T. Cheng
Distributed Data Authentication / M. Goodrich ; M. Shin ; C. Straub ; R. Tamassia
Automated Trust Negotiation Technology with Attribute-Based Access Control / W. Winsborough ; J. Jacobs
Fault Tolerant Networks (FTN)
The Wackamole Approach to Fault Tolerant Networks / R. Caudy ; A. Munjal ; T. Schlossnagle ; C. Tutu
Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA)
NCAC: Network Congestion Analyzer and Controller
DDoS Tolerant Networks
Guaranteed Internet Stack Utilization (GINSU) Building Blocks / R. Knobbe ; A. Purtell
ANON: An IP-Layer Anonymizing Infrastructure
Distributed Embedded Firewalls with Virtual Private Groups / T. Markham ; L. Meredith ; C. Payne
Fault-Tolerant Mesh of Trust Applied to DNS Security / W. Griffin ; R. Mundy ; S. Weiler ; N. Vora
Demonstration of Fault Tolerance for CORBA Applications / L. Moser ; M. Melliar-Smith
Dynamic Trust-Based Resource Allocation / T. Hughes ; M. Junod ; P. Muckelbauer
Active Network Fault Response
Scalable DDoS Protection Using Route-Based Filtering / K. Park
Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA) / R. Ramanujan ; S. Kudige ; T. Nguyen
DefCOM: Defensive Cooperative Overlay Mesh / M. Robinson ; J. Mirkovic ; S. Michel ; M. Schnaider ; P. Reiher
Improving Failure Responsiveness in Jini Leasing / S. Rose ; K. Bowers ; S. Quirolgico ; K. Mills
SPIE Demonstration: Single Packet Traceback / W. Strayer ; C. Jones ; F. Tchakountio ; A. Snoeren ; B. Schwartz ; R. Clements ; M. Condell ; C. Partridge
Onion Routing for Resistance to Traffic Analysis / P. Syverson
TetherNet Anti-NAT--Secure Internet Subnet Rental System / H. Zhu ; T. Huck ; J. Touch ; L. Eggert ; Y. Wang
Organically Assured and Survivable Information Systems (OASIS)
Safe Email, Safe Office, and Safe Web Browser / R. Balzer
Access Control on the Web Using Proof-Carrying Authorization / L. Bauer ; M. Schneider ; E. Felten ; A. Appel
Enterprise Wrappers for Information Assurance / M. Feldman
Willow System Demonstration / J. Hill ; P. Varner ; A. Wolf ; D. Heimbigner ; P. Devanbu
Camouflage of Network Traffic to Resist Attack (CONTRA) / W. Weinstein ; J. Lepanto
Dependable Intrusion Tolerance: Technology Demo / M. Almgren ; Y. Deswarte ; B. Dutertre ; J. Levy ; H. Saidi ; V. Stavridou ; T. Uribe
ITDB: An Attack Self-Healing Database System Prototype / P. Liu
Intrustion Tolerant Web Servers via Network Layer Controls
Demonstrating Intrusion Tolerance with ITUA / P. Pal
VPNshield: Protecting VPN Services from Denial-of-Service (DoS) Attacks / M. Kaddoura ; J. Wu ; C. Sanders ; K. Millikin
On-Line Attack Prevention and Continual Recovery / J. Reynolds
An Aspect-Oriented Security Solution / V. Shah ; F. Hill
OmniVPN / J. Shukla
Efficient Code Certification for Open Firmware / M. Stillerman ; D. Kozen
Intrusion Tolerant Distributed Object Systems / G. Tally ; B. Whitmore ; D. Sames ; B. Matt ; B. Niebuhr ; D. Bakken
SPMA--Java Binary Enhancement Tool / T. Van Vleck ; A. Reisse
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services / F. Wang ; R. Uppalli
System Detection's Hawkeye Platform
Research Summaries / Part II:
Modeling Security-Enhanced Linux Policy Specifications for Analysis / M. Archer ; E. Leonard ; M. Pradella
Open-Source PKI on SELinux
Monterey Security Enhanced Architecture Project
Achieving Principled Assuredly Trustworthy Composable Systems and Networks / P. Neumann
Enhancing ReiserFS Security in Linux / H. Reiser
LLSIM: Network Simulation for Correlation and Response Testing / S. Goulet ; R. Durst ; T. Champion
System Health and Intrusion Monitoring (SHIM): Project Summary
Predicting the Impact of Cyber-Attacks on BMC[subscript 3] Enterprises / J. Shaw
A Framework for Automated Negotiation of Access Control Policies / V. Bharadwaj
Recommendations in Using Group Key Management Algorithms / W. Chen ; L. Dondeti
DyCER: A Lightweight Data Sharing System Using Replication / J. Kay ; S. Crocker
A Flexible Architecture for Security Policy Enforcement
Trust Negotiation in Dynamic Coalitions / M. Winslett ; T. Yu
Efficient and Scalable Infrastructure Support for Dynamic Coalitions
Automated Trust Negotiation in Attribute-Based Access Control
A Summary of the Autonomic Distributed Firewalls (ADF) Project
Traceback of Single IP Packets Using SPIE
DynaBone: Dynamic Defense Using Multi-Layer Internet Overlays / G. Finn
A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks / V. Mahadik ; D. Reeves
Engineering a Distributed Intrusion Tolerant Database System Using COTS Components
EMT/MET: Systems for Modeling and Detecting Errant Email / S. Hershkop ; K. Wang ; O. Nimeskern
Papers by Program Order / Volume I:
Composable High Assurance Trusted Systems (CHATS)
Design and Implementation of the TrustedBSD MAC Framework / R. Watson ; B. Feldman ; A. Migus ; C. Vance
2.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  viii, 265 p. ; 28 cm
所蔵情報: loading…
3.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2002  viii, 331 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Information Flow I
Approximate Non-Interference / A. Di Pierro ; C. Hankin ; H. Wiklicky
Quantifying Information Flow / G. Lowe
Secrecy in Multiagent Systems / J. Halpern ; K. O'Neill
Intrusion
Two Formal Analyses of Attack Graphs / S. Jha ; O. Sheyner ; J. Wing
Formal Specification of Intrusion Signatures and Detection Rules / J.-P. Pouzol ; M. Ducasse
Protocols I
Types and Effects for Asymmetric Cryptographic Protocols / A. D. Gordon ; A. Jeffrey
Security Protocol Design via Authentication Tests / J. D. Guttman
Strand Spaces and Rank Functions: More Than Distant Cousins / J. Heather
Applications of Model-Checking
Probabilistic Analysis of Anonymity / V. Shmatikov
Analysis of SPKI/SDSI Certificates Using Model Checking / T. Reps
Protocols II
Capturing Parallel Attacks within the Data Independence Framework / P. J. Broadfoot ; A. W. Roscoe
Polynomial Fairness and Liveness / M. Backes ; B. Pfitzmann ; M. Steiner ; M. Waidner
A Formal Analysis of Some Properties of Kerberos 5 Using MSR / F. Butler ; I. Cervesato ; A. D. Jaggard ; A. Scedrov
Games
A Formal Analysis of Syverson's Rational Exchange Protocol / L. Buttyan ; J.-P. Hubaux ; S. Capkun
Game Analysis of Abuse-Free Contract Signing / S. Kremer ; J.-F. Raskin
Language-Based Security
Fine-Grained Information Flow Analysis for a [lambda]-Calculus with Sum Types / V. Simonet
Cryptographic Types / D. Duggan
Secure Information Flow and Pointer Confinement in a Java-Like Language / A. Banerjee ; D. A. Naumann
Distributed Rights, Access Control, and Watermarking
A Privacy Policy Model for Enterprises / G. Karjoth ; M. Schunter
A Logic for Reasoning about Digital Rights / R. Pucella ; V. Weissman
Hiding Functions and Computational Security of Image Watermarking Systems / N. Tran
Information Flow II
Information Flow Security in Dynamic Contexts / R. Focardi ; S. Rossi
A Simple View of Type-Secure Information Flow in the [pi]-Calculus / F. Pottier
Author Index
Preface
Workshop Committee
Information Flow I
4.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2001  viii, 307 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Non-interference and Information Flow
Noninterference Equations for Nondeterministic Systems / S. Pinsky ; E. Zieglar
Robust Declassification / S. Zdancewic ; A. Myers
Access Control
A State-Transition Model of Trust Management and Access Control / A. Chander ; D. Dean ; J. Mitchell
Revocations--A Classification / A. Hagstrom ; S. Jajodia ; F. Parisi-Presicce ; D. Wijesekera
A Logical Reconstruction of SPKI / J. Halpern ; R. van der Meyden
Protocols I
A Security Analysis of the Cliques Protocols Suites / O. Pereira ; J.-J. Quisquater
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules / B. Blanchet
Proving Secrecy is Easy Enough / V. Cortier ; J. Millen ; H. Ruess
Panel
Relating Cryptography and Cryptographic Protocols / A. Scedrov (Moderator) ; R. Canetti ; J. Guttman ; D. Wagner ; M. Waidner
Information Flow and Multi-threading
A New Type System for Secure Information Flow / G. Smith
A Generic Approach to the Security of Multi-threaded Programs / H. Mantel ; A. Sabelfeld
Protocols II
Authenticity by Typing for Security Protocols / A. Gordon ; A. Jeffrey
Computing Symbolic Models for Verifying Cryptographic Protocols / M. Fiore ; M. Abadi
Protocol Insecurity with Finite Number of Sessions is NP-Complete / M. Rusinowitch ; M. Turuani
Intrusion Tolerance and Detection
Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance / P. Liu
Markov Chains, Classifiers, and Intrusion Detection / S. Jha ; K. Tan ; R. Maxion
Log Auditing through Model-Checking / M. Roger ; J. Goubault-Larrecq
Non-interference: Who Needs It? / P. Ryan (Moderator) ; J. McLean ; V. Gligor
Logics for Protocol Verification
A Compositional Logic for Protocol Correctness / N. Durgin ; D. Pavlovic
Logical Relations for Encryption / E. Sumii ; B. Pierce
Secrecy and Privacy
Privacy-Preserving Cooperative Scientific Computations / W. Du ; M. Atallah
Confined Mobile Functions / Z. Kirli
Confidentiality-Preserving Refinement / M. Heisel ; A. Pfitzmann ; T. Santen
Author Index
Preface
Workshop Committee
Non-interference and Information Flow
5.

図書

図書
edited by Ralf Steinmetz, Jana Dittman, Martin Steinebach
出版情報: Boston : Kluwer Academic Publishers, c2001  x, 393, [34] p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 64
所蔵情報: loading…
目次情報: 続きを見る
Preface
Conference Committees
Web Security
What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification / K. Scheibelhofer
XML Electronic Signatures / G. Karlinger
An integrated secure Web architecture for protected Mobile code distribution / M. Jalali-Sohi, et al.
Secure and anonymous multicast framework / N. Weiler ; B. Plattner
Vulnerabilities and Security Limitations of current IP Telephony Systems / R. Ackermann, et al. Watermarking I
Quantization Watermarking in the JPEG2000 Coding Pipeline / P. Meerwald
Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences / S. Tsekeridou, et al.
Scalable Detection of Perceptual Watermarks in JPEG2000 Images / D. Simitopoulos, et al.
Cryptographic Algorithms
Collecting randomness from the net / B. Bencsath ; I. Vajda
Encryption System Based on Neutral Network / C.-K. Chan, et al.
A Modified Chaotic Cryptographic Method / W. Wong, et al.
An Elliptic Curve Random Number Generator / I. Lee ; K. Wong
Watermarking II
Conditional and User Specific Access to Services and Resources Using Annotation Watermarks / J. Dittmann, et al.
Large Scale distributed watermarking of multicast media through encryption / R. Parviainen ; P. Parnes
Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept / S. Craver ; S. Katzenbeisser
Fingerprints for Copyright Protection / S. Encheva
System Security
Software Security Assessment through Specification Mutations and Fault Injection / R. Kaksonen, et al.
Asynchronous Large-Scale Certification Based on Certificate Verification Trees / J. Domingo-Ferrer, et al.
ACLA: A Framework for Access Control List (ACL) Analysis and Optimization / J. Qian, et al.
Transparent Access to Encrypted Data Using Operating System Network Stack Extensions / E. Rademer ; S.D. Wolthusen
A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System / M. Markovic, et al.
Watermarking III
Optimization of Watermarking Performances Using Error Correcting Codes and Repetition / S. Zinger, et al.
Using Raw Speech as a Watermark, does it work? / P. Nintanavongsa ; T. Amornraksa
Multiple Security Aspects
Transferability in Coin Systems with Observers / C. Fremdt ; H. Neumann
Secure iLearning / F. Graf
Tree-based Multicast Key Agreement / J. Schwenk, et al.
Security for the core network of third generation mobile systems / G. Horn, et al.
Secure Internet Phone / P. Horster, et al.
Posters
Secure Meeting Scheduling with AgenTa / T. Herlea, et al.
Virtual Hidden Network / N. Shin
Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval / R. Puertpan, et al.
A Prepositioned Secret Sharing Scheme for Message Authentification in Broadcast Networks / A. Eskicioglu
Secure Service Centered Networking for Nomadic Usage / M. Hollick
Last Minute Papers
A Secure Authentication Infrastructure for Mobile Communication Services over the Internet / I. Dupre la Tour, et al.
Blind Compressed-Domain Watermarking for MPEG-encoded Videos / C.-L. Wu, et al.
Index of Contributors
Preface
Conference Committees
Web Security
6.

図書

図書
edited by Hein Venter ... [et al.]
出版情報: New York : Springer, c2007  xv, 498 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 232
所蔵情報: loading…
目次情報: 続きを見る
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
Human-Computer Interaction I
Value creation and Return on Security Investments (ROSI) / Christer Magnusson ; Josef Molvidsson ; Sven Zetterqvist
Usability and Security of Personal Firewalls / Almut Herzog ; Nahid Shahmehri
Computer-Based Trust
Trusted Ticket Systems and Applications / Andreas U. Schmidt ; Nicolai Kuntze
Trust Evaluation for Web Applications based on Behavioral Analysis / Luiz da Costa Carmo ; Breno de Oliveira ; Augusto Braga
Information Security Management I
Improving the Information Security Model by using TFI / Rose-Mharie Ahlfeldt ; Paolo Spagnoletti ; Guttorm Sindre
Ontological Mapping of Common Criteria's Security Assurance Requirements / Andreas Ekelhart ; Stefan Fenz ; Gernot Goluch ; Edgar Weippl
Network Security I
Management of Exceptions on Access Control Policies / Joaquin Garcia-Alfaro ; Frederic Cuppens ; Nora Cuppens-Boulahia
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols / Tieyan Li ; Guilin Wang
Information Security Management II
Exploratory Survey on an Evaluation Model for a Sense of Security / Natsuko Hikage ; Yuko Murayama ; Carl Hauser
Employees' Adherence to Information Security Policies: An Empirical Study / Mikko Siponen ; Seppo Pahnila ; Adam Mahmood
Network Security II
Phishing in the Wireless: Implementation and Analysis / Ivan Martinovic ; Frank Zdarsky ; Adam Bachorek ; Christian Jung ; Jens Schmitt
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks / Tyler Moore ; Jolyon Clulow
Access Control I
A Credential-Based System for the Anonymous Delegation of Rights / Liesje Demuynck ; Bart De Decker ; Wouter Joosen
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content / Christian Josef Eibl ; S.H. Basie von Solms ; Sigrid Schubert
Human-Computer Interaction II
Identity Theft - Empirical Evidence from a Phishing Exercise / Tjaart Steyn ; Hennie Kruger ; Lynette Drevin
A Practical Usability Evaluation of Security Features in End-User Applications / Steven Furnell ; Dimitris Katsabas ; Paul Dowland ; Fraser Reid
Intrusion Detection Systems
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis / Maciej Rossudowski ; Hein Venter ; Jan Eloff
A Survey of Bots Used for Distributed Denial of Service Attacks / Vrizlynn Thing ; Morris Sloman ; Naranker Dulay
Access Control II
A Hybrid PKI-IBC Based Ephemerizer System / Srijith Nair ; Mohammad Dashti ; Bruno Crispo ; Andrew Tanenbaum
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices / Sevasti Karatzouni ; Nathan Clarke
Information Privacy I
Security Remarks on a Convertible Nominative Signature Scheme / Feng Bao
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions / Alapan Arnab ; Andrew Hutchison
Access Control III
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation / Evangelos Kotsovinos ; Ingo Friese ; Martin Kurze ; Jorg Heuer
Extending Role Based Access Control Model for Distributed Multidomain Applications / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Information Privacy II
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy / Claudio Ardagna ; Marco Cremonini ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Pierangela Samarati
Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning / Jan Zibuschka ; Lothar Fritsch ; Mike Radmacher ; Tobias Scherner ; Kai Rannenberg
Access Control IV
Crafting Web Counters into Covert Channels / Xiapu Luo ; Edmond Chan ; Rocky Chang
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM / Thierry Sans
Security Services
Non-Repudiation in Internet Telephony / Andreas Schmidt ; Christian Hett
FirePatch: Secure and Time-Critical Dissemination of Software Patches / Havard Johansen ; Dag Johansen ; Robbert van Renesse
Access Control V
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing / Sara Foresti ; Sushil Jajodia ; Stefano Paraboschi
Building a Distributed Semantic-aware Security Architecture / Jan Kolter ; Rolf Schillinger ; Gunther Pernul
Trust and Intrusion Detection Systems
Using Trust to Resist Censorship in the Presence of Collusion / Andriy Panchenko ; Lexi Pimenidis
Evaluating the Effects of Model Generalization on Intrusion Detection Performance / Zhuowei Li ; Amitabha Das ; Jianying Zhou
Keynote paper
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM / William Caelli
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society
Covert Identity Information in Direct Anonymous Attestation (DAA) / Carsten Rudolph
Safeguarding Personal Data using Rights Management in Distributed Applications / Adolf Hohl ; Alf Zugenmaier
Identification Now and in the Future: Social Grant Distribution Process in South Africa / Stephen Flowerday ; Gideon Ranga
Hard-drive Disposal and Identity Fraud / Paula Thomas ; Theodore Tryfonas
An analysis of security and privacy issues relating to RFID enabled ePassports / Eleni Kosta ; Martin Meints ; Marit Hansen ; Mark Gasson
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Manageable Information Security
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework / Nicholas Tate ; Sharman Lichtenstein ; Matthew Warren
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program / Tatjana Welzer ; Marko Holbl ; Ana Habjanic ; Bostjan Brumen ; Marjan Druzovec
Remote Virtual Information Assurance Network / Ronald Dodge ; Corey Bertram ; Daniel Ragsdale
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model / Kara Nance ; Brian Hay
Author Index
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
7.

図書

図書
edited by Simone Fischer-Hübner ... [et al.]
出版情報: New York : Springer, c2006  xvi, 494 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 201
所蔵情報: loading…
目次情報: 続きを見る
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures / Jan Camenisch ; Dieter Sommer ; Roger Zimmermann
Security in Mobile and Ad Hoc Networks
Authenticated Query Flooding in Sensor Networks / Zinaida Benenson ; Felix C. Freiling ; Ernest Hammerschmidt ; Stefan Lucks ; Lexi Pimenidis
Identity Based Message Authentication for Dynamic Networks / Pietro Michiardi ; Refik Molva
Providing Authentication and Access Control in Vehicular Network Environment / Hasnaa Moustafa ; Gilles Bourdon ; Yvon Gourhant
Trust and Security Management
A Framework for Web Services Trust / Marijke Coetzee ; Jan Eloff
Trust: An Element of Security / Stephen Flowerday ; Rossouw von Solms
Security-by-Ontology: A Knowledge-Centric Approach / Bill Tsoumas ; Panagiotis Papagiannakopoulos ; Stelios Dritsas ; Dimitris Gritzalis
Privacy Enhancing Technologies II
A Methodology for Designing Controlled Anonymous Applications / Vincent Naessens ; Bart De Decker
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities / Sandra Steinbrecher
Protecting (Anonymous) Credentials with the Trusted Computing Group's Trusted Platform Modules V1.2
Attacks, Vulnerability Analysis, and Tools
Analysis and Improvement of Anti-Phishing Schemes / Dinei Florêncio ; Cormac Herley
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks / Kameswari Kotapati ; Peng Liu ; Thomas F. LaPorta
Protecting Web Services from DOS Attacks by SOAP Message Validation / Nils Gruschka ; Norbert Luttenberger
Access Control and Authentication I
A Flexible and Distributed Architecture to Enforce Dynamic Access Control / Thierry Sans ; Frédéric Cuppens ; Nora Cuppens-Boulahia
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications / Andreas Mattas ; Ioannins Mavridis ; Iason Pagkalos
CAS++: An Open Source Single Sign-on Solution for Secure E-services / Claudio Agostino Ardagna ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Fulvio Frati ; Pierangela Samarati
Security Protocols
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps / Jianying Zhou ; Jose A. Onieva ; Javier Lopez
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol / Michael Backes ; Birgit Pfitzmann
Sealed-Bid Micro Auctions / Kun Peng ; Colin Boyd ; Ed Dawson
Intrusion Detection
Detecting Known and Novel Network Intrusions / Yacine Bouzida
Evaluating Classifiers for Mobile-Masquerader Detection / Oleksiy Mazhelis ; Seppo Puuronen ; Mika Raento
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts / Xiaoxin Yin ; William Yurcik ; Adam Slagell
Usability and Awareness
A Usability Study of Security Policy Management / Almut Herzog ; Nahid Shahmehri
Considering the Usability of End-User Security Software / Steven Furnell ; Adila Jusoh ; Dimitris Katsabas ; Paul Dowland
Utilizing the Common Criteria for Advanced Student Research Projects / Thuy D. Nguyen ; Cynthia E. Irvine
Privacy Enhancing Technologies III
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems / Rafael Accorsi
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications / Huafei Zhu ; Tieyan Li ; Feng Bao
Access Control and Authentication II
Click Passwords / Darko Kirovski ; Nebojsa Jojic ; Paul Roberts
Cryptographically Enforced Personalized Role-Based Access Control / Milan Petkovic ; Claudine Conrado ; Malik Hammoutene
Access Control and Authentication III
Using VO Concept for Managing Dynamic Security Associations / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets / Martin Gilje Jaatun ; Inger Anne Tondel ; Frederic Paint ; Tor Hjalmar Johannessen ; John Charles Francis ; Claire Duranton
Forensics
Network Forensics on Packet Fingerprints / Chia Yuan Cho ; Sin Yeung Lee ; Chung Pheng Tan ; Yong Tai Tan
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages / Martin Karresand
IFIP WG 11.1/11.8 Security Culture Workshop
Organizational Security Culture: More Than Just an End-User Phenomenon / Anthonie B. Ruighaver ; Sean B. Maynard
Cyber Security Training and Awareness Through Game Play / Benjamin D. Cone ; Michael F. Thompson
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge / Omar Zakaria
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security / Jabiri Kuwe Bakari ; Charles N. Tarimo ; Christer Magnusson ; Louise Yngström
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment / Lynette Drevin ; Hennie Kruger ; Tjaart Steyn
Using Phishing for User Email Security Awareness / Ronald C. Dodge ; Aaron J. Ferguson
IFIP WG 11.4 I-NetSec'06 Workshop
Invited Talk: Anonymous Credentials: Opportunities and Challenges
Practical Private Regular Expression Matching / Florian Kerschbaum
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments / Siani Pearson ; Marco Casassa-Mont
The APROB-Channel: Adaptive Semi-Real-Time Anonymous Communication / Gergely Tóth ; Zoltán Hornák
Author Index
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
8.

図書

図書
edited by Jaynarayan H. Lala ; [supported by] DARPA
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  xix, 435 p. ; 28 cm
所蔵情報: loading…
9.

図書

図書
[sponsored by IEEE Computer Society Task Force on Information Assurance, IEEE Computer Society Mass Storage Systems Technical Committee]
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2004  v, 78 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Decentralized Authentication Mechanisms for Object-Based Storage Devices / V. Kher ; Y. Kim
Fast and Secure Magnetic WORM Storage Systems / Y. Wang ; Y. Zheng
Key Management for Encrypted Data Storage in Distributed Systems / L. Seitz ; J.-M. Pierson ; L. Brunie
Information Security on the Logistical Network: An End-to-End Approach / M. Beck ; J. Plank ; J. Millar ; S. Atchley ; S. Soltesz ; A. Bassi ; H. Liu
Implementation of a Storage Mechanism for Untrusted DBMSs / E. Damiani ; S. di Vimercati ; M. Finetti ; S. Paraboschi ; P. Samarati ; S. Jajodia
Cryptographic File Systems Performance: What You Don't Know Can Hurt You / C. Wright ; J. Dave ; E. Zadok
Memories: A Survey of Their Secure Uses in Smart Cards / M. Neve ; E. Peeters ; D. Samyde ; J.-J. Quisquater
The Object Store Security Protocol / M. Factor ; D. Naor ; N. Rinetzky ; J. Satran ; D. Nagle ; D. Beaver ; E. Riede
IEEE Standard for Encrypted Storage / J. Hughes
Research and Implement of an Encrypted File System Used to NAS / H. Jianzhong ; X. Changsheng ; C. Bin
Author Index
Decentralized Authentication Mechanisms for Object-Based Storage Devices / V. Kher ; Y. Kim
Fast and Secure Magnetic WORM Storage Systems / Y. Wang ; Y. Zheng
Key Management for Encrypted Data Storage in Distributed Systems / L. Seitz ; J.-M. Pierson ; L. Brunie
10.

図書

図書
[editor, Oleg Stoukatch]
出版情報: Piscataway, NJ : IEEE, 2003  152 p. ; 20 cm
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼