close
1.

図書

図書
edited by Louise Yngström, Jan Carlsen
出版情報: London ; Tokyo : Chapman & Hall on behalf of the IFIP, 1997  vii, 468 p. ; 24 cm
所蔵情報: loading…
2.

図書

図書
edited by Jan H. P. Eloff and Sebastiaan H. von Solms
出版情報: London ; Tokyo : Chapman & Hall on behalf of the IFIP, 1995  viii, 623 p. ; 24 cm
所蔵情報: loading…
3.

図書

図書
Roger Dingledine, Paul Syverson (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 238 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2482
所蔵情報: loading…
4.

図書

図書
Roger Dingledine (ed.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 221 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2760
所蔵情報: loading…
目次情報: 続きを見る
Mix-Networks with Restricted Routes / George Danezis
Generalising Mixes / Claudia D'iaz ; Andrei Serjantov
Modelling Unlinkability / Sandra Steinbrecher ; Stefan Kopsell
Metrics for Traffic Analysis Prevention / Richard E. Newman ; Ira S. Moskowitz ; Paul Syverson
Breaking and Mending Resilient Mix-Nets / Lan Nguyen ; Rei Safavi-Naini
Improving Onion Notation / Richard Clayton
Engineering Privacy in Public: Confounding Face Recognition / James Alexander ; Jonathan Smith
From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions / Andrew S. Patrick ; Steve Kenny
Thwarting Web Censorship with Untrusted Messenger Discovery / Nick Feamster ; Magdalena Balazinska ; Winston Wang ; Hari Balakrishnan ; David Karger
gap - Practical Anonymous Networking / Krista Bennett ; Christian Grothoff
An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks / Dennis Kügler
A Component Architecture for Dynamically Managing Privacy Constraints in Personalized Web-Based Systems / Alfred Kobsa
Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon / Birgit Pfitzmann
From P3P to Data Licenses / Shi-Cho Cha ; Yuh-Jzer Joung
Author Index
Mix-Networks with Restricted Routes / George Danezis
Generalising Mixes / Claudia D'iaz ; Andrei Serjantov
Modelling Unlinkability / Sandra Steinbrecher ; Stefan Kopsell
5.

図書

図書
Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xiv, 470 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2776
所蔵情報: loading…
目次情報: 続きを見る
Invited Papers
ForNet: A Distributed Forensics Network / K. Shanmugasundaram ; N. Memon ; A. Savant ; H. Bronnimann
Usage Control: A Vision for Next Generation Access Control / R. Sandhu ; J. Park
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL / T. Kosiyatrakul ; S. Older ; P. Humenn ; S.-K. Chin
Complexity Problems in the Analysis of Information Systems Security / A. Slissenko
A Behavior-Based Approach to Securing Email Systems / S.J. Stolfo ; S. Hershkop ; K. Wang ; O. Nimeskern ; C.-W. Hu
Real-Time Intrusion Detection with Emphasis on Insider Attacks / S. Upadhyaya
Mathematical Models and Architectures for Computer Network Security
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols / S. Bistarelli ; I. Cervesato ; G. Lenzini ; F. Martinelli
GRID Security Review / L. Gymnopoulos ; S. Dritsas ; S. Gritzalis ; C. Lambrinoudakis
A Knowledge-Based Repository Model for Security Policies Management / S. Kokolakis ; D. Gritzalis
Symbolic Partial Model Checking for Security Analysis
Rule-Based Systems Security Model / M. Smirnov
Logical Resolving for Security Evaluation / P.D. Zegzhda ; D.P. Zegzhda ; M.O. Kalinin
Intrusion Detection
Enhanced Correlation in an Intrusion Detection Process / S. Benferhat ; F. Autrel ; F. Cuppens
Safeguarding SCADA Systems with Anomaly Detection / J. Bigham ; D. Gamez ; N. Lu
Experiments with Simulation of Attacks against Computer Networks / I. Kotenko ; E. Man'kov
Detecting Malicious Codes by the Presence of Their "Gene of Self-replication" / V.A. Skormin ; D.H. Summerville ; J.S. Moronski
Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences / K. Wee ; B. Moon
Public Key Distribution, Authentication, Access Control
Distributed Access Control: A Logic-Based Approach / S. Barker
Advanced Certificate Status Protocol / D.H. Yum ; J.E. Kang ; P.J. Lee
Key History Tree: Efficient Group Key Management with Off-Line Members / A. Lain ; V. Borisov
A Certificate Status Checking Protocol for the Authenticated Dictionary / J.L. Munoz ; J. Forne ; O. Esparza ; M. Soriano
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach / R. Wolf ; M. Schneider
Cryptography
A Signcryption Scheme Based on Secret Sharing Technique / M. Al-Ibrahim
A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem / P. Caballero-Gil ; C. Hernández-Goya
Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property / Y.D. Ko ; D.J. Hong ; S.H. Hong ; S.J. Lee ; J.L. Lim
Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper / V. Korzhik ; V. Yakovlev ; A. Sinuk
On Cipher Design Based on Switchable Controlled Operations / N.A. Moldovyan
Elliptic Curve Point Multiplication / A. Rostovtsev ; E. Makhovenko
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation / N. Sklavos ; A.A. Moldovyan ; O. Koufopavlou
Steganography
Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel / V. Gorodetsky ; V. Samoilov
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation / K. Zhang ; S. Wang ; X. Zhang
Digital Watermarking under a Filtering and Additive Noise Attack Condition / V. Korzhik, G ; . Morales-Luna ; I. Marakova ; C. Patino-Ruvalcaba
Data Hiding in Digital Audio by Frequency Domain Dithering
Steganography with Least Histogram Abnormality
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences
Short Papers
Authentication of Anycast Communication / A. Cerny
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy / R. Ando ; Y. Takefuji
Construction of the Covert Channels / A. Grusho ; E. Timonina
Privacy and Data Protection in Electronic Communications / L. Mitrou ; K. Moulinos
Multiplier for Public-Key Cryptosystem Based on Cellular Automata / H.S. Kim ; S.H. Hwang
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols / S. Kumar ; V. Marbukh
Alert Triage on the ROC / F.J. Martin ; E. Plaza
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64 / N.D. Goots ; B.V. Izotov
Immunocomputing Model of Intrusion Detection / Y. Melnikov ; A. Tarakanov
Agent Platform Security Architecture / G. Santana ; L.B. Sheremetov ; M. Contreras
Support Vector Machine Based ICMP Covert Channel Attack Detection / T. Sohn ; T. Noh ; J. Moon
Computer Immunology System with Variable Configuration / S.P. Sokolova ; R.S. Ivlev
Author Index
Invited Papers
ForNet: A Distributed Forensics Network / K. Shanmugasundaram ; N. Memon ; A. Savant ; H. Bronnimann
Usage Control: A Vision for Next Generation Access Control / R. Sandhu ; J. Park
6.

図書

図書
Antonio Lioy, Daniele Mazzocchi (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 263 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2828
所蔵情報: loading…
目次情報: 続きを見る
Cryptography
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection
Network Security
Securing the Border Gateway Protocol: A Status Update / Stephen T. Kent
Towards an IPv6-Based Security Framework for Distributed Storage Resources / Alessandro Bassi ; Julien Laganier
Operational Characteristics of an Automated Intrusion Response System / Maria Papadaki ; Steven Furnell ; Benn Lines ; Paul Reynolds
Mobile and Wireless Network Security
A Secure Multimedia System in Emerging Wireless Home Networks / Nut Taesombut ; Richard Huang ; Venkat P. Rangan
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents / Yusuke Sakabe ; Masakazu Soshi ; Atsuko Miyaji
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems / Michelle S. Wangham ; Joni da Silva Fraga ; Rafael R. Obelheiro
Trust and Privacy
Privacy and Trust in Distributed Networks / Thomas Rossler ; Arno Hollosi
Extending the SDSI / SPKI Model through Federation Webs / Altair Olivo Santin ; Carlos Maziero
Trust-X: An XML Framework for Trust Negotiations / Elisa Bertino ; Elena Ferrari ; Anna C. Squicciarini
Application Security
How to Specify Security Services: A Practical Approach / Javier Lopez ; Juan J. Ortega ; Jose Vivas ; Jose M. Troya
Application Level Smart Card Support through Networked Mobile Devices / Pierpaolo Baglietto ; Francesco Moggia ; Nicola Zingirian ; Massimo Maresca
Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage / Kuan W. Yip
Multimedia Security
Selective Encryption of the JPEG2000 Bitstream / Roland Norcen ; Andreas Uhl
Robust Spatial Data Hiding for Color Images / Xiaoqiang Li ; Xiangyang Xue ; Wei Li
Watermark Security via Secret Wavelet Packet Subband Structures / Werner Dietl
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression / David Megias ; Jordi Herrera-Joancomarti ; Julià Minguillón
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs / G.S. Poh
Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization / Bubi G. Flepp-Stars ; Herbert Stogner
Author Index
Cryptography
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan
7.

図書

図書
edited by Ralf Steinmetz, Jana Dittman, Martin Steinebach
出版情報: Boston : Kluwer Academic Publishers, c2001  x, 393, [34] p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 64
所蔵情報: loading…
目次情報: 続きを見る
Preface
Conference Committees
Web Security
What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification / K. Scheibelhofer
XML Electronic Signatures / G. Karlinger
An integrated secure Web architecture for protected Mobile code distribution / M. Jalali-Sohi, et al.
Secure and anonymous multicast framework / N. Weiler ; B. Plattner
Vulnerabilities and Security Limitations of current IP Telephony Systems / R. Ackermann, et al. Watermarking I
Quantization Watermarking in the JPEG2000 Coding Pipeline / P. Meerwald
Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences / S. Tsekeridou, et al.
Scalable Detection of Perceptual Watermarks in JPEG2000 Images / D. Simitopoulos, et al.
Cryptographic Algorithms
Collecting randomness from the net / B. Bencsath ; I. Vajda
Encryption System Based on Neutral Network / C.-K. Chan, et al.
A Modified Chaotic Cryptographic Method / W. Wong, et al.
An Elliptic Curve Random Number Generator / I. Lee ; K. Wong
Watermarking II
Conditional and User Specific Access to Services and Resources Using Annotation Watermarks / J. Dittmann, et al.
Large Scale distributed watermarking of multicast media through encryption / R. Parviainen ; P. Parnes
Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept / S. Craver ; S. Katzenbeisser
Fingerprints for Copyright Protection / S. Encheva
System Security
Software Security Assessment through Specification Mutations and Fault Injection / R. Kaksonen, et al.
Asynchronous Large-Scale Certification Based on Certificate Verification Trees / J. Domingo-Ferrer, et al.
ACLA: A Framework for Access Control List (ACL) Analysis and Optimization / J. Qian, et al.
Transparent Access to Encrypted Data Using Operating System Network Stack Extensions / E. Rademer ; S.D. Wolthusen
A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System / M. Markovic, et al.
Watermarking III
Optimization of Watermarking Performances Using Error Correcting Codes and Repetition / S. Zinger, et al.
Using Raw Speech as a Watermark, does it work? / P. Nintanavongsa ; T. Amornraksa
Multiple Security Aspects
Transferability in Coin Systems with Observers / C. Fremdt ; H. Neumann
Secure iLearning / F. Graf
Tree-based Multicast Key Agreement / J. Schwenk, et al.
Security for the core network of third generation mobile systems / G. Horn, et al.
Secure Internet Phone / P. Horster, et al.
Posters
Secure Meeting Scheduling with AgenTa / T. Herlea, et al.
Virtual Hidden Network / N. Shin
Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval / R. Puertpan, et al.
A Prepositioned Secret Sharing Scheme for Message Authentification in Broadcast Networks / A. Eskicioglu
Secure Service Centered Networking for Nomadic Usage / M. Hollick
Last Minute Papers
A Secure Authentication Infrastructure for Mobile Communication Services over the Internet / I. Dupre la Tour, et al.
Blind Compressed-Domain Watermarking for MPEG-encoded Videos / C.-L. Wu, et al.
Index of Contributors
Preface
Conference Committees
Web Security
8.

図書

図書
edited by Hein Venter ... [et al.]
出版情報: New York : Springer, c2007  xv, 498 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 232
所蔵情報: loading…
目次情報: 続きを見る
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
Human-Computer Interaction I
Value creation and Return on Security Investments (ROSI) / Christer Magnusson ; Josef Molvidsson ; Sven Zetterqvist
Usability and Security of Personal Firewalls / Almut Herzog ; Nahid Shahmehri
Computer-Based Trust
Trusted Ticket Systems and Applications / Andreas U. Schmidt ; Nicolai Kuntze
Trust Evaluation for Web Applications based on Behavioral Analysis / Luiz da Costa Carmo ; Breno de Oliveira ; Augusto Braga
Information Security Management I
Improving the Information Security Model by using TFI / Rose-Mharie Ahlfeldt ; Paolo Spagnoletti ; Guttorm Sindre
Ontological Mapping of Common Criteria's Security Assurance Requirements / Andreas Ekelhart ; Stefan Fenz ; Gernot Goluch ; Edgar Weippl
Network Security I
Management of Exceptions on Access Control Policies / Joaquin Garcia-Alfaro ; Frederic Cuppens ; Nora Cuppens-Boulahia
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols / Tieyan Li ; Guilin Wang
Information Security Management II
Exploratory Survey on an Evaluation Model for a Sense of Security / Natsuko Hikage ; Yuko Murayama ; Carl Hauser
Employees' Adherence to Information Security Policies: An Empirical Study / Mikko Siponen ; Seppo Pahnila ; Adam Mahmood
Network Security II
Phishing in the Wireless: Implementation and Analysis / Ivan Martinovic ; Frank Zdarsky ; Adam Bachorek ; Christian Jung ; Jens Schmitt
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks / Tyler Moore ; Jolyon Clulow
Access Control I
A Credential-Based System for the Anonymous Delegation of Rights / Liesje Demuynck ; Bart De Decker ; Wouter Joosen
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content / Christian Josef Eibl ; S.H. Basie von Solms ; Sigrid Schubert
Human-Computer Interaction II
Identity Theft - Empirical Evidence from a Phishing Exercise / Tjaart Steyn ; Hennie Kruger ; Lynette Drevin
A Practical Usability Evaluation of Security Features in End-User Applications / Steven Furnell ; Dimitris Katsabas ; Paul Dowland ; Fraser Reid
Intrusion Detection Systems
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis / Maciej Rossudowski ; Hein Venter ; Jan Eloff
A Survey of Bots Used for Distributed Denial of Service Attacks / Vrizlynn Thing ; Morris Sloman ; Naranker Dulay
Access Control II
A Hybrid PKI-IBC Based Ephemerizer System / Srijith Nair ; Mohammad Dashti ; Bruno Crispo ; Andrew Tanenbaum
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices / Sevasti Karatzouni ; Nathan Clarke
Information Privacy I
Security Remarks on a Convertible Nominative Signature Scheme / Feng Bao
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions / Alapan Arnab ; Andrew Hutchison
Access Control III
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation / Evangelos Kotsovinos ; Ingo Friese ; Martin Kurze ; Jorg Heuer
Extending Role Based Access Control Model for Distributed Multidomain Applications / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Information Privacy II
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy / Claudio Ardagna ; Marco Cremonini ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Pierangela Samarati
Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning / Jan Zibuschka ; Lothar Fritsch ; Mike Radmacher ; Tobias Scherner ; Kai Rannenberg
Access Control IV
Crafting Web Counters into Covert Channels / Xiapu Luo ; Edmond Chan ; Rocky Chang
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM / Thierry Sans
Security Services
Non-Repudiation in Internet Telephony / Andreas Schmidt ; Christian Hett
FirePatch: Secure and Time-Critical Dissemination of Software Patches / Havard Johansen ; Dag Johansen ; Robbert van Renesse
Access Control V
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing / Sara Foresti ; Sushil Jajodia ; Stefano Paraboschi
Building a Distributed Semantic-aware Security Architecture / Jan Kolter ; Rolf Schillinger ; Gunther Pernul
Trust and Intrusion Detection Systems
Using Trust to Resist Censorship in the Presence of Collusion / Andriy Panchenko ; Lexi Pimenidis
Evaluating the Effects of Model Generalization on Intrusion Detection Performance / Zhuowei Li ; Amitabha Das ; Jianying Zhou
Keynote paper
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM / William Caelli
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society
Covert Identity Information in Direct Anonymous Attestation (DAA) / Carsten Rudolph
Safeguarding Personal Data using Rights Management in Distributed Applications / Adolf Hohl ; Alf Zugenmaier
Identification Now and in the Future: Social Grant Distribution Process in South Africa / Stephen Flowerday ; Gideon Ranga
Hard-drive Disposal and Identity Fraud / Paula Thomas ; Theodore Tryfonas
An analysis of security and privacy issues relating to RFID enabled ePassports / Eleni Kosta ; Martin Meints ; Marit Hansen ; Mark Gasson
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Manageable Information Security
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework / Nicholas Tate ; Sharman Lichtenstein ; Matthew Warren
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program / Tatjana Welzer ; Marko Holbl ; Ana Habjanic ; Bostjan Brumen ; Marjan Druzovec
Remote Virtual Information Assurance Network / Ronald Dodge ; Corey Bertram ; Daniel Ragsdale
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model / Kara Nance ; Brian Hay
Author Index
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
9.

図書

図書
edited by Simone Fischer-Hübner ... [et al.]
出版情報: New York : Springer, c2006  xvi, 494 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 201
所蔵情報: loading…
目次情報: 続きを見る
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures / Jan Camenisch ; Dieter Sommer ; Roger Zimmermann
Security in Mobile and Ad Hoc Networks
Authenticated Query Flooding in Sensor Networks / Zinaida Benenson ; Felix C. Freiling ; Ernest Hammerschmidt ; Stefan Lucks ; Lexi Pimenidis
Identity Based Message Authentication for Dynamic Networks / Pietro Michiardi ; Refik Molva
Providing Authentication and Access Control in Vehicular Network Environment / Hasnaa Moustafa ; Gilles Bourdon ; Yvon Gourhant
Trust and Security Management
A Framework for Web Services Trust / Marijke Coetzee ; Jan Eloff
Trust: An Element of Security / Stephen Flowerday ; Rossouw von Solms
Security-by-Ontology: A Knowledge-Centric Approach / Bill Tsoumas ; Panagiotis Papagiannakopoulos ; Stelios Dritsas ; Dimitris Gritzalis
Privacy Enhancing Technologies II
A Methodology for Designing Controlled Anonymous Applications / Vincent Naessens ; Bart De Decker
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities / Sandra Steinbrecher
Protecting (Anonymous) Credentials with the Trusted Computing Group's Trusted Platform Modules V1.2
Attacks, Vulnerability Analysis, and Tools
Analysis and Improvement of Anti-Phishing Schemes / Dinei Florêncio ; Cormac Herley
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks / Kameswari Kotapati ; Peng Liu ; Thomas F. LaPorta
Protecting Web Services from DOS Attacks by SOAP Message Validation / Nils Gruschka ; Norbert Luttenberger
Access Control and Authentication I
A Flexible and Distributed Architecture to Enforce Dynamic Access Control / Thierry Sans ; Frédéric Cuppens ; Nora Cuppens-Boulahia
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications / Andreas Mattas ; Ioannins Mavridis ; Iason Pagkalos
CAS++: An Open Source Single Sign-on Solution for Secure E-services / Claudio Agostino Ardagna ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Fulvio Frati ; Pierangela Samarati
Security Protocols
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps / Jianying Zhou ; Jose A. Onieva ; Javier Lopez
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol / Michael Backes ; Birgit Pfitzmann
Sealed-Bid Micro Auctions / Kun Peng ; Colin Boyd ; Ed Dawson
Intrusion Detection
Detecting Known and Novel Network Intrusions / Yacine Bouzida
Evaluating Classifiers for Mobile-Masquerader Detection / Oleksiy Mazhelis ; Seppo Puuronen ; Mika Raento
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts / Xiaoxin Yin ; William Yurcik ; Adam Slagell
Usability and Awareness
A Usability Study of Security Policy Management / Almut Herzog ; Nahid Shahmehri
Considering the Usability of End-User Security Software / Steven Furnell ; Adila Jusoh ; Dimitris Katsabas ; Paul Dowland
Utilizing the Common Criteria for Advanced Student Research Projects / Thuy D. Nguyen ; Cynthia E. Irvine
Privacy Enhancing Technologies III
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems / Rafael Accorsi
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications / Huafei Zhu ; Tieyan Li ; Feng Bao
Access Control and Authentication II
Click Passwords / Darko Kirovski ; Nebojsa Jojic ; Paul Roberts
Cryptographically Enforced Personalized Role-Based Access Control / Milan Petkovic ; Claudine Conrado ; Malik Hammoutene
Access Control and Authentication III
Using VO Concept for Managing Dynamic Security Associations / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets / Martin Gilje Jaatun ; Inger Anne Tondel ; Frederic Paint ; Tor Hjalmar Johannessen ; John Charles Francis ; Claire Duranton
Forensics
Network Forensics on Packet Fingerprints / Chia Yuan Cho ; Sin Yeung Lee ; Chung Pheng Tan ; Yong Tai Tan
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages / Martin Karresand
IFIP WG 11.1/11.8 Security Culture Workshop
Organizational Security Culture: More Than Just an End-User Phenomenon / Anthonie B. Ruighaver ; Sean B. Maynard
Cyber Security Training and Awareness Through Game Play / Benjamin D. Cone ; Michael F. Thompson
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge / Omar Zakaria
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security / Jabiri Kuwe Bakari ; Charles N. Tarimo ; Christer Magnusson ; Louise Yngström
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment / Lynette Drevin ; Hennie Kruger ; Tjaart Steyn
Using Phishing for User Email Security Awareness / Ronald C. Dodge ; Aaron J. Ferguson
IFIP WG 11.4 I-NetSec'06 Workshop
Invited Talk: Anonymous Credentials: Opportunities and Challenges
Practical Private Regular Expression Matching / Florian Kerschbaum
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments / Siani Pearson ; Marco Casassa-Mont
The APROB-Channel: Adaptive Semi-Real-Time Anonymous Communication / Gergely Tóth ; Zoltán Hornák
Author Index
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
10.

図書

図書
edited by Jaynarayan H. Lala ; [supported by] DARPA
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  xix, 435 p. ; 28 cm
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼