Security and Protection in Information Processing Systems IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France /
Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Boston, MA :
Springer US : Imprint: Springer,
2004.
|
Σειρά: | IFIP — The International Federation for Information Processing,
147 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- An Abstract Reduction Model for Computer Security Risk
- Remediation Graphs for Security Patch Management
- Security Modelling for Risk Analysis
- Contrasting Malicious Applets by Modifying the Java Virtual Machine
- Analyzing Network Management Effects with Spin and cTLA
- Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics
- Meeting the Global Challenges of Security Incident Response
- Security in Globally Distributed Industrial Information Systems
- A Case for Information Ownership in ERP Systems
- Interactive Access Control for Web Services
- Identity-Based Key Infrastructures (IKI)
- Modint: A Compact Modular Arithmetic Java Class Library for Cellular Phones, and its Application to Secure Electronic Voting
- Dependable Security by Twisted Secret Sharing
- A Language Driven Intrusion Detection System for Event and Alert Correlation
- Install-Time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
- Eigenconnections to Intrusion Detection
- Visualising Intrusions: Watching the Webserver
- A Long-Term Trial of Keystroke Profiling Using Digraph, Trigraph and Keyword Latencies
- Trusted Computing, Trusted Third Parties, and Verified Communications
- Maille Authentication
- Supporting end-to-end Security Across Proxies with Multiple-Channel SSL
- A Content-Protection Scheme for Multi-Layered Reselling Structures
- An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
- IPsec Clustering
- Improving Secure Device Insertion in Home Ad Hoc Networks
- Spam Filter Analysis
- Collective Signature for Efficient Authentication of XML Documents
- Updating Encrypted XML Documents on Untrusted Machines
- Efficient Simultaneous Contract Signing
- DHCP Authentication Using Certificates
- Recursive Sandboxes: Extending Systrace to Empower Applications
- Fast Digital Certificate Revocation
- Masks: Managing Anonymity while Sharing Knowledge to Servers
- Security and Differentiated Hotspot Services Through Policy-based Management Architecture
- Key Management for Secure Multicast in Hybrid Satellite Networks.