Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Müller, Günter (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 3995
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Multilateral Security
  • Multilateral Security: Enabling Technologies and Their Evaluation
  • Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems
  • Security in Service-Oriented Computing
  • Optimized Workflow Authorization in Service Oriented Architectures
  • Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment
  • A P2P Content Authentication Protocol Based on Byzantine Agreement
  • Secure Mobile Applications
  • Transitive Trust in Mobile Scenarios
  • An Open, PKI-Based Mobile Payment System
  • Secure Rejoining Scheme for Dynamic Sensor Networks
  • Developing Provable Secure M-Commerce Applications
  • Enterprise Privacy
  • An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
  • Privacy-Preserving Decision Tree Mining Based on Random Substitutions
  • Privacy, Identity, and Anonymity
  • Policy-Based Integration of User and Provider-Sided Identity Management
  • Privacy with Delegation of Rights by Identity Management
  • A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System
  • Revocable Anonymity
  • Low Latency Anonymous Communication – How Long Are Users Willing to Wait?
  • Security Engineering
  • Security Engineering Using Problem Frames
  • SecTOOL – Supporting Requirements Engineering for Access Control
  • Possibilistic Information Flow Control in MAKS and Action Refinement
  • Toward a Framework for Forensic Analysis of Scanning Worms
  • A Comparison of Market Approaches to Software Vulnerability Disclosure
  • Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples
  • Security Policies
  • Allowing State Changes in Specifications
  • Field Access Analysis for Enforcing Access Control Policies
  • Controlling Access to Documents: A Formal Access Control Model
  • How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer’s Security
  • Security and Protocols
  • Secure End-to-End Transport over SCTP
  • An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information
  • Filtering for Private Collaborative Benchmarking
  • Intrusion Detection
  • On the Use of Word Networks to Mimicry Attack Detection
  • Simplifying Signature Engineering by Reuse
  • Redesign and Implementation of Evaluation Dataset for Intrusion Detection System
  • Requirements of Information Reductions for Cooperating Intrusion Detection Agents
  • Perspectives of Cryptographic Security
  • Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age
  • Kleptographic Attacks on E-Voting Schemes
  • Visual Document Authentication Using Human-Recognizable Watermarks.