close
1.

図書

図書
edited by Michel Dupuy, Pierre Paradinas
出版情報: Boston : Kluwer Academic Publishers, c2001  vii, 485 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 65
所蔵情報: loading…
2.

図書

図書
edited by Yves Deswarte ... [et al]
出版情報: Boston : Kluwer Academic Publishers, 2004  xiv, 548 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 147
所蔵情報: loading…
3.

図書

図書
edited by Ryoichi Sasaki ... [et al.]
出版情報: New York : Springer, 2005  xvi, 612 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 181
所蔵情報: loading…
目次情報: 続きを見る
Security for Multimedia
Digital Signature Schemes
Intrusion Detection
Internet and Web Security
Mobility and Ubiquitous Security
Secure Commercial Systems
Trusted Computing Systems
Accountable Anonymous E-Mail
Protecting Consumer Data in Composite Web Services
Enhancing Security in ERP Systems
Architecture for User Authentication and Key Exchange
A Secure Quantum Communication Protocol Using Insecure Public Channels
Mathematical Models of IP Traceback Methods
Secure Human Communications Based on Biometrics Signals
Designated-Verifier Proxy Signature Schemes
Signcryption in Hierarchical Identity Based Cryptosystem
Security for Multimedia
Digital Signature Schemes
Intrusion Detection
4.

図書

図書
edited by Dimitris Gritzalis ... [et al.]
出版情報: Boston : Kluwer Academic, c2003  xviii, 494 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 122
所蔵情報: loading…
目次情報: 続きを見る
Preface
IFIP/Sec'03 Conference Committees
IFIP/Sec'03 Workshop Program Committees
Secure Networks and Distributed Systems / Part 1:
Trust Mediation for Distributed Information Systems / Brian Toone ; Michael Gertz ; Premkumar Devanbu
Concerning Enterprise Network Vulnerability to HTTP Tunneling / Constantine Daicos ; Scott Knight
Providing Voice Privacy Over Public Switched Telephone Networks / Mohamed Sharif ; Duminda Wijesekera
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages / Jose Antonio Onieva ; Jianying Zhou ; Mildrey Carbonell ; Javier Lopez
Establishing Chain of Evidence as a Base for Non-Repudiation Services / Jing-Jang Hwang ; Min-Hua Shao ; Soushan Wu
Content Protection / Part 2:
Securing XML-based Multimedia Content / Ernesto Damiani ; Sabrina De Capitani di Vimercati
Secure Audit Logging with Tamper-Resistant Hardware / Cheun Ngen Chong ; Zhonghong Peng ; Pieter H. Hartel
PCMHoDC / HeeJae Park ; Jong Kim
Secure Multicast Communication and Secure Mobile Networks / Part 3:
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets / N.L. Clarke ; Steven M. Furnell ; Benn M. Lines ; Paul L. Reynolds
Introducing PKI to Enhance Security in Future Mobile Networks / Georgios Kambourakis ; Angelos Rouskas ; Stefanos Gritzalis
A Time Driven Methodology for Key Dimensioning in Multicast Communications / Roberto Di Pietro ; Luigi V. Mancini ; Alessandro Mei
A Flexible Category-Based Collusion-Resistant Key Management Scheme for Multicast / Claudiu Duma ; Nahid Shahmehri ; Patrick Lambrix
Security Management / Part 4:
Content, Context, Process Analysis of IS Security Policy Formation / Maria Karyda ; Spyros Kokolakis ; Evangelos Kiountouzis
Integrating Security into Systems Development / Ulrika Evertsson ; Urban Orthberg ; Louise Yngstrom
Integrating Information Security into Corporate Governance / Kerry-Lynn Thomson ; Rossouw von Solms
Building an Enterprise IT Security Management System / Meletis A. Belsis ; Leonid Smalov
Information Security Management System: Processes and Products / Mariki M. Eloff ; Jan H.P. Eloff
Intrusion Prevention and Detection / Part 5:
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis / Luciano Carosielli
E[superscript 2]xB: A Domain-Specific String Matching Algorithm for Intrusion Detection / Kostas G. Anagnostakis ; Spyros Antonatos ; P. Markatos ; Michalis Polychronakis
Intrusion Masking for Distributed Atomic Operations / Meng Yu ; Peng Liu ; Wanyu Zang
Using Fuzzy System to Manage False Alarms in Intrusion Detection / Mehdi Shajari ; Ali A. Ghorbani
An Experiment in Software Decoy Design / J. Bret Michael ; Georgios Fragkos ; Mikhail Auguston
Access Control Policies and Models / Part 6:
A User Friendly Guard with Mobile Post-Release Access Control Policy / Douglas E. Williams ; Amgad Fayad ; Sushil Jajodia ; Daniel Calle
Security Model for Health Care Computing and Communication Systems / Anas Abou El Kalam ; Yves Deswarte
Constrained Role-based Delegation / Longhua Zhang ; Gail-Joon Ahn
Secure Information Systems / Part 7:
CSAP - An Adaptable Security Module for the E-Government System Webocrat / Fredj Dridi ; Michael Fischer ; Gunther Pernul
Perceptions of Security Contributing to the Implementation of Secure IS / Theodore Tryfonas
New Directions on IS Security Methods / Mikko T. Siponen
Secure Vickrey Auctions without a Trusted Third Party / Bart De Decker ; Gregory Neven ; Frank Piessens
Security Protocols / Part 8:
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis / Mauricio Papa ; Oliver Bremer ; John Hale ; Sujeet Shenoi
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments / Georgios Kalogridis ; Chan Yeob Yeun ; Gary Clemo
Cooperative Defense Firewall Protocol / Magdi M.S. El-Soudani ; Mohamed A. Eissa
How to turn a PIN into an Iron Beam / Stefan Lucks ; Ruediger Weis
Workshop on Information Security Management / Part 9:
World Framework for Security Benchmark Changes / Lech J. Janczewski ; Andrew M. Colarik
Information Security: Auditing the Behaviour of the Employee / Cheryl Vroom
Priorities in the Deployment of Network Intrusion Detection Systems / Marcin Dobrucki ; Teemupekka Virtanen
Bridging the Gap between Risk Analysis and Security Policies / Paul Gaunard ; Eric Dubois
Framework and Architecture for Secure Mobile Business Applications / Jochen Haller ; Philip Robinson ; Thomas Walter ; Roger Kilian-Kehr
ISO 17799 and Australian Healthcare Organisations / W.J. Brooks ; Mattew J. Warren ; William Hutchinson
Workshop on Privacy and Anonymity in Network & Distributed Systems / Part 10:
Statistical Disclosure Attacks / George Danezis
On the Anonymity of Timed Pool Mixes / Andrei Serjantov ; Richard E. Newman
Privacy in Content Distribution Networks / R.J. Hulsebosch
Workshop on Small Systems Security / Part 11:
Security, Fault-Tolerance and their Verification for Ambient Systems / Jaap-Henk Hoepman
Hidden Layer Authentication using Smart Card for WEP-based Wlans / Giannis Pikrammenos ; Ghassan Sarkis ; John Soldatos ; Vasilios Anagnostopoulos
Pinpas: A Tool for Power Analysis of Smartcards / Jerry den Hartog ; Jan Vershuren ; Erik de Vink ; Jaap de Vos ; W. Wiersma
Assessing Security in Energy-Efficient Sensor Networks / Yee Wei Law ; Sandro Etalle
From Finite State Machines to Provably Correct Java Card Applets / Engelbert Hubbers ; Martijn Oostdijk ; Erik Poll
Security Characteristics of E-Collaboration Environments / Bob Hulsebosch ; Ernst-Jan Goedvolk ; Wil Janssen
Roadmap for Securing Handheld Devices / Preetida Vinayakray-Jani
Workshop on Security and Control of IT in Society / Part 12:
Lawful Cyber Decoy Policy / James Bret Michael ; Thomas C. Wingfield
Electronic Signature as a part of Information Society Infrastructure / Juhani Paavilainen ; Suzana Stojakovic-Celustka ; Dagmar Brechlerova
Preface
IFIP/Sec'03 Conference Committees
IFIP/Sec'03 Workshop Program Committees
5.

図書

図書
edited by M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan
出版情報: Boston : Kluwer Academic Publishers, c2002  xii, 586 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 86
所蔵情報: loading…
目次情報: 続きを見る
Preface
IFIP/SEC2002 Conference Committees
Information Security Management / Part 1:
The Effective Implementation of Information Security in Organizations / O.A. Hoppe ; J. Van Niekerk ; R. Von Solms1.:
A Practical Approach to Information Security Awareness in the Organization / C. Vroom2.:
RBAC Policies in XML for X.509 Based Privilege Management / D.W. Chadwick ; A. Otenko3.:
A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration / A. Ahmad ; T. Ruighaver4.:
Elaborating Quantitative Approaches for IT Security Evaluation / D. Gritzalis ; M. Karyda ; L. Gymnopoulos5.:
Standards of Information Security / Part 2:
A Security Evaluation Criteria for Baseline Security Standards / W.J. Brooks ; M. Warren ; W. Hutchinson6.:
Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects / M.T. Siponen7.:
For a Secure Mobile IP and Mobile IPv6 Deployment / M. Laurent-Maknavicius8.:
Threats and Attacks to Information / Part 3:
Addressing Internet Security Vulnerabilities: A Benchmarking Study / A. Alayed ; S.M. Furnell ; I.M. Barlow9.:
The Threat From Within - An Analysis of Attacks on an Internal Network / J. Haggerty ; Q. Shi ; M. Merabti10.:
Security Vulnerabilities in Event-Driven Systems / S. Xenitellis11.:
Denial of Service: Another Example / J. J. Yan12.:
A Detection Scheme for the SK Virus / D. Salah ; H.K. Aslan ; M.T. El-Hadidi13.:
Education and Curriculum for Information Security / Part 4:
An Information Security Curriculum in Finland / T. Virtanen ; R. Addams-Moring14.:
Social and Ethical Aspects of Information Security / Part 5:
Information Security Culture: The Socio-Cultural Dimension in Information Security Management / T. Schlienger ; S. Teufel15.:
Information Security Culture / A. Martins ; J. Eloff16.:
Information Security Services / Part 6:
Keystroke Analysis as a Method of Advanced User Authentication and Response / P.S. Dowland ; M. Papadaki17.:
Zero Knowledge Broadcasting Identification Scheme / M.S. El-Soudani ; H.S. El-Refaey ; H.M. Mourad18.:
A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services / Li-Sha He ; N. Zhang ; Li-Rong He19.:
Mandatory Security Policies for CORBA Security Model / C.M. Westphall ; J. Da S. Fraga ; C.B. Westphall ; S.C.S. Bianchi20.:
Policap-Proposal, Development and Evaluation of a Policy Service and Capabilities for CORBA Security / M.S. Wangham ; R.R. Obelheiro ; L.C. Lung21.:
Secure Database Connectivity on the WWW / M. Coetzee22.:
Towards Semantic Integrity in Rational Database / R.A. Botha23.:
Formal Design of Packet Filtering Systems / G. Osman ; M. G. Darwish ; M. Zaki24.:
Elliptic Curve Cryptosystems on Smart Cards / E. Mohammed ; A. Emarah ; KH. El-Shennawy25.:
Multilateral Security / Part 7:
Establishing Bilateral Anonymous Communication in Open Networks / T. Demuth26.:
Applications of Information Security / Part 8:
BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business / C. Magnusson ; L. Yngstrom27.:
Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration / T. Tryfonas ; E. Kiountouzis28.:
An Efficient Hybrid Sealed Bid Auction Protocol / R. Abdel-Moneim ; S. El-Kassas ; H. Hosny29.:
Self-Determination in Mobile Internet: PiMI Prototype Results / S. Fischer-Hubner ; M. Nilsson ; H. Lindskog30.:
Secure Component Distribution Using WebCom / S.N. Foley ; T.B. Quillinan ; J.P. Morrison31.:
E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals / R. Uda ; M. Ito ; K. Awaya ; H. Shigeno ; Y. Matsushita32.:
An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions / D. Critchlow33.:
Infrastructure for Information Security / Part 9:
Secure Selective Exclusion in Ad Hoc Wireless Network / R.O. Di Pietro ; L.V. Mancini ; S. Jajodia34.:
Advanced Topics in Security / Part 10:
Optical Network Models for Quantum Cryptography / S.T. Faraj ; F. Al-Naima ; S.Y. Ameen35.:
Legislation for Information Security / Part 11:
A Unified Regulatory Framework on a European Information Society: Suggested Building Levels / P.S. Anastasiades36.:
Revisiting Legal and Regulatory Requirements for Secure E-Voting / L. Mitrou ; S. Katsikas37.:
Modeling and Analysis for Information Security / Part 12:
A Security Incident Data Model / M.A. Belsis ; N. Godwin ; L. Smalov38.:
Security Levels for Contracting Agents / A. Meier ; S. Rohrig39.:
Functional Requirements for a Secure Electronic Voting System / S. Ikonomopoulos ; C. Lambrinoudakis ; S. Kokolakis ; K. Vassiliou40.:
Intelligent IP Packet Filtering / M. Hashem ; A. Mohamed ; M. Wahib41.:
Tools for Information Security / Part 13:
Human Computer Interaction: An Information Security Perspectives / M.M. Eloff ; J.H.P. Eloff42.:
A Very Smart Card for Fighting Against Terrorism / J. Geneste43.:
SHEDEL - A Simple Hierarchical Event Description Language for Specifying Attack Signatures / M. Meier ; N. Bischof ; T. Holz44.:
Propagating Modifications to Mobile Policies / K. Smith ; D. Faatz ; A. Fayad45.:
Author Index
Preface
IFIP/SEC2002 Conference Committees
Information Security Management / Part 1:
6.

図書

図書
edited by Hein Venter ... [et al.]
出版情報: New York : Springer, c2007  xv, 498 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 232
所蔵情報: loading…
目次情報: 続きを見る
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
Human-Computer Interaction I
Value creation and Return on Security Investments (ROSI) / Christer Magnusson ; Josef Molvidsson ; Sven Zetterqvist
Usability and Security of Personal Firewalls / Almut Herzog ; Nahid Shahmehri
Computer-Based Trust
Trusted Ticket Systems and Applications / Andreas U. Schmidt ; Nicolai Kuntze
Trust Evaluation for Web Applications based on Behavioral Analysis / Luiz da Costa Carmo ; Breno de Oliveira ; Augusto Braga
Information Security Management I
Improving the Information Security Model by using TFI / Rose-Mharie Ahlfeldt ; Paolo Spagnoletti ; Guttorm Sindre
Ontological Mapping of Common Criteria's Security Assurance Requirements / Andreas Ekelhart ; Stefan Fenz ; Gernot Goluch ; Edgar Weippl
Network Security I
Management of Exceptions on Access Control Policies / Joaquin Garcia-Alfaro ; Frederic Cuppens ; Nora Cuppens-Boulahia
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols / Tieyan Li ; Guilin Wang
Information Security Management II
Exploratory Survey on an Evaluation Model for a Sense of Security / Natsuko Hikage ; Yuko Murayama ; Carl Hauser
Employees' Adherence to Information Security Policies: An Empirical Study / Mikko Siponen ; Seppo Pahnila ; Adam Mahmood
Network Security II
Phishing in the Wireless: Implementation and Analysis / Ivan Martinovic ; Frank Zdarsky ; Adam Bachorek ; Christian Jung ; Jens Schmitt
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks / Tyler Moore ; Jolyon Clulow
Access Control I
A Credential-Based System for the Anonymous Delegation of Rights / Liesje Demuynck ; Bart De Decker ; Wouter Joosen
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content / Christian Josef Eibl ; S.H. Basie von Solms ; Sigrid Schubert
Human-Computer Interaction II
Identity Theft - Empirical Evidence from a Phishing Exercise / Tjaart Steyn ; Hennie Kruger ; Lynette Drevin
A Practical Usability Evaluation of Security Features in End-User Applications / Steven Furnell ; Dimitris Katsabas ; Paul Dowland ; Fraser Reid
Intrusion Detection Systems
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis / Maciej Rossudowski ; Hein Venter ; Jan Eloff
A Survey of Bots Used for Distributed Denial of Service Attacks / Vrizlynn Thing ; Morris Sloman ; Naranker Dulay
Access Control II
A Hybrid PKI-IBC Based Ephemerizer System / Srijith Nair ; Mohammad Dashti ; Bruno Crispo ; Andrew Tanenbaum
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices / Sevasti Karatzouni ; Nathan Clarke
Information Privacy I
Security Remarks on a Convertible Nominative Signature Scheme / Feng Bao
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions / Alapan Arnab ; Andrew Hutchison
Access Control III
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation / Evangelos Kotsovinos ; Ingo Friese ; Martin Kurze ; Jorg Heuer
Extending Role Based Access Control Model for Distributed Multidomain Applications / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Information Privacy II
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy / Claudio Ardagna ; Marco Cremonini ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Pierangela Samarati
Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning / Jan Zibuschka ; Lothar Fritsch ; Mike Radmacher ; Tobias Scherner ; Kai Rannenberg
Access Control IV
Crafting Web Counters into Covert Channels / Xiapu Luo ; Edmond Chan ; Rocky Chang
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM / Thierry Sans
Security Services
Non-Repudiation in Internet Telephony / Andreas Schmidt ; Christian Hett
FirePatch: Secure and Time-Critical Dissemination of Software Patches / Havard Johansen ; Dag Johansen ; Robbert van Renesse
Access Control V
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing / Sara Foresti ; Sushil Jajodia ; Stefano Paraboschi
Building a Distributed Semantic-aware Security Architecture / Jan Kolter ; Rolf Schillinger ; Gunther Pernul
Trust and Intrusion Detection Systems
Using Trust to Resist Censorship in the Presence of Collusion / Andriy Panchenko ; Lexi Pimenidis
Evaluating the Effects of Model Generalization on Intrusion Detection Performance / Zhuowei Li ; Amitabha Das ; Jianying Zhou
Keynote paper
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM / William Caelli
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society
Covert Identity Information in Direct Anonymous Attestation (DAA) / Carsten Rudolph
Safeguarding Personal Data using Rights Management in Distributed Applications / Adolf Hohl ; Alf Zugenmaier
Identification Now and in the Future: Social Grant Distribution Process in South Africa / Stephen Flowerday ; Gideon Ranga
Hard-drive Disposal and Identity Fraud / Paula Thomas ; Theodore Tryfonas
An analysis of security and privacy issues relating to RFID enabled ePassports / Eleni Kosta ; Martin Meints ; Marit Hansen ; Mark Gasson
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Manageable Information Security
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework / Nicholas Tate ; Sharman Lichtenstein ; Matthew Warren
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program / Tatjana Welzer ; Marko Holbl ; Ana Habjanic ; Bostjan Brumen ; Marjan Druzovec
Remote Virtual Information Assurance Network / Ronald Dodge ; Corey Bertram ; Daniel Ragsdale
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model / Kara Nance ; Brian Hay
Author Index
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
7.

図書

図書
edited by Simone Fischer-Hübner ... [et al.]
出版情報: New York : Springer, c2006  xvi, 494 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 201
所蔵情報: loading…
目次情報: 続きを見る
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures / Jan Camenisch ; Dieter Sommer ; Roger Zimmermann
Security in Mobile and Ad Hoc Networks
Authenticated Query Flooding in Sensor Networks / Zinaida Benenson ; Felix C. Freiling ; Ernest Hammerschmidt ; Stefan Lucks ; Lexi Pimenidis
Identity Based Message Authentication for Dynamic Networks / Pietro Michiardi ; Refik Molva
Providing Authentication and Access Control in Vehicular Network Environment / Hasnaa Moustafa ; Gilles Bourdon ; Yvon Gourhant
Trust and Security Management
A Framework for Web Services Trust / Marijke Coetzee ; Jan Eloff
Trust: An Element of Security / Stephen Flowerday ; Rossouw von Solms
Security-by-Ontology: A Knowledge-Centric Approach / Bill Tsoumas ; Panagiotis Papagiannakopoulos ; Stelios Dritsas ; Dimitris Gritzalis
Privacy Enhancing Technologies II
A Methodology for Designing Controlled Anonymous Applications / Vincent Naessens ; Bart De Decker
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities / Sandra Steinbrecher
Protecting (Anonymous) Credentials with the Trusted Computing Group's Trusted Platform Modules V1.2
Attacks, Vulnerability Analysis, and Tools
Analysis and Improvement of Anti-Phishing Schemes / Dinei Florêncio ; Cormac Herley
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks / Kameswari Kotapati ; Peng Liu ; Thomas F. LaPorta
Protecting Web Services from DOS Attacks by SOAP Message Validation / Nils Gruschka ; Norbert Luttenberger
Access Control and Authentication I
A Flexible and Distributed Architecture to Enforce Dynamic Access Control / Thierry Sans ; Frédéric Cuppens ; Nora Cuppens-Boulahia
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications / Andreas Mattas ; Ioannins Mavridis ; Iason Pagkalos
CAS++: An Open Source Single Sign-on Solution for Secure E-services / Claudio Agostino Ardagna ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Fulvio Frati ; Pierangela Samarati
Security Protocols
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps / Jianying Zhou ; Jose A. Onieva ; Javier Lopez
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol / Michael Backes ; Birgit Pfitzmann
Sealed-Bid Micro Auctions / Kun Peng ; Colin Boyd ; Ed Dawson
Intrusion Detection
Detecting Known and Novel Network Intrusions / Yacine Bouzida
Evaluating Classifiers for Mobile-Masquerader Detection / Oleksiy Mazhelis ; Seppo Puuronen ; Mika Raento
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts / Xiaoxin Yin ; William Yurcik ; Adam Slagell
Usability and Awareness
A Usability Study of Security Policy Management / Almut Herzog ; Nahid Shahmehri
Considering the Usability of End-User Security Software / Steven Furnell ; Adila Jusoh ; Dimitris Katsabas ; Paul Dowland
Utilizing the Common Criteria for Advanced Student Research Projects / Thuy D. Nguyen ; Cynthia E. Irvine
Privacy Enhancing Technologies III
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems / Rafael Accorsi
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications / Huafei Zhu ; Tieyan Li ; Feng Bao
Access Control and Authentication II
Click Passwords / Darko Kirovski ; Nebojsa Jojic ; Paul Roberts
Cryptographically Enforced Personalized Role-Based Access Control / Milan Petkovic ; Claudine Conrado ; Malik Hammoutene
Access Control and Authentication III
Using VO Concept for Managing Dynamic Security Associations / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets / Martin Gilje Jaatun ; Inger Anne Tondel ; Frederic Paint ; Tor Hjalmar Johannessen ; John Charles Francis ; Claire Duranton
Forensics
Network Forensics on Packet Fingerprints / Chia Yuan Cho ; Sin Yeung Lee ; Chung Pheng Tan ; Yong Tai Tan
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages / Martin Karresand
IFIP WG 11.1/11.8 Security Culture Workshop
Organizational Security Culture: More Than Just an End-User Phenomenon / Anthonie B. Ruighaver ; Sean B. Maynard
Cyber Security Training and Awareness Through Game Play / Benjamin D. Cone ; Michael F. Thompson
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge / Omar Zakaria
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security / Jabiri Kuwe Bakari ; Charles N. Tarimo ; Christer Magnusson ; Louise Yngström
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment / Lynette Drevin ; Hennie Kruger ; Tjaart Steyn
Using Phishing for User Email Security Awareness / Ronald C. Dodge ; Aaron J. Ferguson
IFIP WG 11.4 I-NetSec'06 Workshop
Invited Talk: Anonymous Credentials: Opportunities and Challenges
Practical Private Regular Expression Matching / Florian Kerschbaum
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments / Siani Pearson ; Marco Casassa-Mont
The APROB-Channel: Adaptive Semi-Real-Time Anonymous Communication / Gergely Tóth ; Zoltán Hornák
Author Index
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼