Security and privacy in the age of uncertainty : IFIP TC11 18th International Conference on Information Security (SEC 2003), May 26-28, 2003, Athens, Greece
著者
書誌事項
Security and privacy in the age of uncertainty : IFIP TC11 18th International Conference on Information Security (SEC 2003), May 26-28, 2003, Athens, Greece
(The International Federation for Information Processing, 122)
Kluwer Academic, c2003
- タイトル別名
-
SEC 2003
大学図書館所蔵 全10件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes bibliographical references and index
内容説明・目次
内容説明
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including:
*Secure Networks and Distributed Systems;
*Secure Multicast Communication and Secure Mobile Networks;
*Intrusion Prevention and Detection;
*Access Control Policies and Models;
*Security Protocols;
*Security and Control of IT in Society.
This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.
目次
- Preface. IFIP/Sec'03 Conference Committees. IFIP/Sec'03 Workshop Program Committees. I: Secure Networks and Distributed Systems. Trust Mediation for Distributed Information Systems
- B. Toone, et al. Concerning Enterprise Network Vulnerability to HTTP Tunneling
- C. Daicos, S. Knight. Providing Voice Privacy over Public Switched Telephone Networks
- M. Sharif, D. Wijesekera. A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages
- J.A. Onieva, et al. Establishing Chain of Evidence as a Base for Non-Repudiation Services
- Jing-Jang Huang, et al. II: Content Protection. Securing XML-Based Multimedia Content
- E. Damiani, et al. Secure Audit Logging with Tamper-Resistant Hardware
- Cheun Ngen Chong, et al. PCMHoDC
- HeeJae Park, Jong Kim. III: Secure Multicast Communication and Secure Mobile Networks. Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets
- N.L. Clarke, et al. Introducing PKI to Enhance Security in Future Mobile Networks
- G. Kambourakis, et al. A Time Driven Methodology for Key Dimensioning in Multicast Communications
- R. di Pietro, et al. A Flexible Category-Based Collusion-Resistant Management Scheme for Multicast
- C. Duma, et al. IV: Security Management. Context, Content, Process Analysis of IS Security Policy Formation
- M. Karyda, et al. Integrating Security into Systems Development
- U. Evertsson, et al. Integrating Information Security into Corporate Governance
- K.-L. Thomson, R. von Solms. Building an Enterprise IT Security Management System
- M.A. Belsis, L. Smalov. Information Security Management System: Processes and Products
- M.M. Eloff, J.H.P. Eloff. V:Intrusion Prevention and Detection. Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis
- S. Knight, L. Carosielli. E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection
- K.G. Anagnostakis, et al. Intrusion Masking for Distributed Atomic Operations
- Meng Yu, et al. Using Fuzzy System to Manage False Alarms in Intrusion Detection
- M. Shajari, A.A. Ghorbani. An Experiment in Software Decoy Design
- J.B. Michael, et al. VI: Access Control Policies and Models. A User Friendly Guard with Mobile Post-Release Access Control Policy
- D.E. Williams, et al. Security Model for Health Care Computing and Communication Systems
- A.A. El Kalam, Y. Deswarte. Constrained Role-based Delegation
- Longhua Zhang, Gail-Joon Ahn. VII: Secure Information Systems. CSAP An Adaptable Security Module for the E-Government System Webocrat
- F. Dridi, et al. Perceptions of Security Contributing to the Implementation of Secure IS
- T. Tryfonas, E. Kiountouzis. New Directions on IS Security Methods
- M.T. Siponen. Secure Vickrey Auctions without a Trusted Third Party
- B. de Dekker, et al. VIII: Security Protocols. Integrating Logics and Process Calculi for Cryptographic Protocol Analysis
- M. Papa, et al. Flexible Delegation Security for Improved Distribution in Ubiquitous Environments
- G. Kalogridis, et al. Cooperative Defense Firewall Protocol
- M.M.S. El-Soudani, M.A. Eissa. How to Turn a PIN into an Iron Beam
- S. Lucks, R. Weis. IX: Workshop on Information Security Management. World Framework for Security Benchmark Changes
- L.J. Janczewski, A.M. Colarik. Information Security: Auditing the Behavior of the Employee
- C. Vroom, R.von Solms. Priorit
「Nielsen BookData」 より