Preface |
IFIP/Sec'03 Conference Committees |
IFIP/Sec'03 Workshop Program Committees |
Secure Networks and Distributed Systems / Part 1: |
Trust Mediation for Distributed Information Systems / Brian Toone ; Michael Gertz ; Premkumar Devanbu |
Concerning Enterprise Network Vulnerability to HTTP Tunneling / Constantine Daicos ; Scott Knight |
Providing Voice Privacy Over Public Switched Telephone Networks / Mohamed Sharif ; Duminda Wijesekera |
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages / Jose Antonio Onieva ; Jianying Zhou ; Mildrey Carbonell ; Javier Lopez |
Establishing Chain of Evidence as a Base for Non-Repudiation Services / Jing-Jang Hwang ; Min-Hua Shao ; Soushan Wu |
Content Protection / Part 2: |
Securing XML-based Multimedia Content / Ernesto Damiani ; Sabrina De Capitani di Vimercati |
Secure Audit Logging with Tamper-Resistant Hardware / Cheun Ngen Chong ; Zhonghong Peng ; Pieter H. Hartel |
PCMHoDC / HeeJae Park ; Jong Kim |
Secure Multicast Communication and Secure Mobile Networks / Part 3: |
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets / N.L. Clarke ; Steven M. Furnell ; Benn M. Lines ; Paul L. Reynolds |
Introducing PKI to Enhance Security in Future Mobile Networks / Georgios Kambourakis ; Angelos Rouskas ; Stefanos Gritzalis |
A Time Driven Methodology for Key Dimensioning in Multicast Communications / Roberto Di Pietro ; Luigi V. Mancini ; Alessandro Mei |
A Flexible Category-Based Collusion-Resistant Key Management Scheme for Multicast / Claudiu Duma ; Nahid Shahmehri ; Patrick Lambrix |
Security Management / Part 4: |
Content, Context, Process Analysis of IS Security Policy Formation / Maria Karyda ; Spyros Kokolakis ; Evangelos Kiountouzis |
Integrating Security into Systems Development / Ulrika Evertsson ; Urban Orthberg ; Louise Yngstrom |
Integrating Information Security into Corporate Governance / Kerry-Lynn Thomson ; Rossouw von Solms |
Building an Enterprise IT Security Management System / Meletis A. Belsis ; Leonid Smalov |
Information Security Management System: Processes and Products / Mariki M. Eloff ; Jan H.P. Eloff |
Intrusion Prevention and Detection / Part 5: |
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis / Luciano Carosielli |
E[superscript 2]xB: A Domain-Specific String Matching Algorithm for Intrusion Detection / Kostas G. Anagnostakis ; Spyros Antonatos ; P. Markatos ; Michalis Polychronakis |
Intrusion Masking for Distributed Atomic Operations / Meng Yu ; Peng Liu ; Wanyu Zang |
Using Fuzzy System to Manage False Alarms in Intrusion Detection / Mehdi Shajari ; Ali A. Ghorbani |
An Experiment in Software Decoy Design / J. Bret Michael ; Georgios Fragkos ; Mikhail Auguston |
Access Control Policies and Models / Part 6: |
A User Friendly Guard with Mobile Post-Release Access Control Policy / Douglas E. Williams ; Amgad Fayad ; Sushil Jajodia ; Daniel Calle |
Security Model for Health Care Computing and Communication Systems / Anas Abou El Kalam ; Yves Deswarte |
Constrained Role-based Delegation / Longhua Zhang ; Gail-Joon Ahn |
Secure Information Systems / Part 7: |
CSAP - An Adaptable Security Module for the E-Government System Webocrat / Fredj Dridi ; Michael Fischer ; Gunther Pernul |
Perceptions of Security Contributing to the Implementation of Secure IS / Theodore Tryfonas |
New Directions on IS Security Methods / Mikko T. Siponen |
Secure Vickrey Auctions without a Trusted Third Party / Bart De Decker ; Gregory Neven ; Frank Piessens |
Security Protocols / Part 8: |
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis / Mauricio Papa ; Oliver Bremer ; John Hale ; Sujeet Shenoi |
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments / Georgios Kalogridis ; Chan Yeob Yeun ; Gary Clemo |
Cooperative Defense Firewall Protocol / Magdi M.S. El-Soudani ; Mohamed A. Eissa |
How to turn a PIN into an Iron Beam / Stefan Lucks ; Ruediger Weis |
Workshop on Information Security Management / Part 9: |
World Framework for Security Benchmark Changes / Lech J. Janczewski ; Andrew M. Colarik |
Information Security: Auditing the Behaviour of the Employee / Cheryl Vroom |
Priorities in the Deployment of Network Intrusion Detection Systems / Marcin Dobrucki ; Teemupekka Virtanen |
Bridging the Gap between Risk Analysis and Security Policies / Paul Gaunard ; Eric Dubois |
Framework and Architecture for Secure Mobile Business Applications / Jochen Haller ; Philip Robinson ; Thomas Walter ; Roger Kilian-Kehr |
ISO 17799 and Australian Healthcare Organisations / W.J. Brooks ; Mattew J. Warren ; William Hutchinson |
Workshop on Privacy and Anonymity in Network & Distributed Systems / Part 10: |
Statistical Disclosure Attacks / George Danezis |
On the Anonymity of Timed Pool Mixes / Andrei Serjantov ; Richard E. Newman |
Privacy in Content Distribution Networks / R.J. Hulsebosch |
Workshop on Small Systems Security / Part 11: |
Security, Fault-Tolerance and their Verification for Ambient Systems / Jaap-Henk Hoepman |
Hidden Layer Authentication using Smart Card for WEP-based Wlans / Giannis Pikrammenos ; Ghassan Sarkis ; John Soldatos ; Vasilios Anagnostopoulos |
Pinpas: A Tool for Power Analysis of Smartcards / Jerry den Hartog ; Jan Vershuren ; Erik de Vink ; Jaap de Vos ; W. Wiersma |
Assessing Security in Energy-Efficient Sensor Networks / Yee Wei Law ; Sandro Etalle |
From Finite State Machines to Provably Correct Java Card Applets / Engelbert Hubbers ; Martijn Oostdijk ; Erik Poll |
Security Characteristics of E-Collaboration Environments / Bob Hulsebosch ; Ernst-Jan Goedvolk ; Wil Janssen |
Roadmap for Securing Handheld Devices / Preetida Vinayakray-Jani |
Workshop on Security and Control of IT in Society / Part 12: |
Lawful Cyber Decoy Policy / James Bret Michael ; Thomas C. Wingfield |
Electronic Signature as a part of Information Society Infrastructure / Juhani Paavilainen ; Suzana Stojakovic-Celustka ; Dagmar Brechlerova |
Preface |
IFIP/Sec'03 Conference Committees |
IFIP/Sec'03 Workshop Program Committees |