Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings /

This book constitutes the refereed proceedings of the 24th IFIP TC 11 International Information Security Conference, SEC 2009, held in Pafos, Cyprus, in May 2009. The 38 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers are organized in topical secti...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Gritzalis, Dimitris (Επιμελητής έκδοσης), Lopez, Javier (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Σειρά:IFIP Advances in Information and Communication Technology, 297
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05444nam a22005175i 4500
001 978-3-642-01244-0
003 DE-He213
005 20161216113313.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642012440  |9 978-3-642-01244-0 
024 7 |a 10.1007/978-3-642-01244-0  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Emerging Challenges for Security, Privacy and Trust  |h [electronic resource] :  |b 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings /  |c edited by Dimitris Gritzalis, Javier Lopez. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a XIV, 444 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a IFIP Advances in Information and Communication Technology,  |x 1868-4238 ;  |v 297 
505 0 |a Identification and Authentication I -- Flexible and Transparent User Authentication for Mobile Devices -- Combining Authentication, Reputation and Classification to Make Phishing Unprofitable -- Audio CAPTCHA for SIP-Based VoIP -- Threats and Attacks -- Roving Bugnet: Distributed Surveillance Threat and Mitigation -- On Robust Covert Channels Inside DNS -- Discovering Application-Level Insider Attacks Using Symbolic Execution -- Identification and Authentication II -- Custom JPEG Quantization for Improved Iris Recognition Accuracy -- On the IPP Properties of Reed-Solomon Codes -- A Generic Authentication LoA Derivation Model -- Applications of Cryptography and Information Hiding -- Media-Break Resistant eSignatures in eGovernment: An Austrian Experience -- How to Bootstrap Security for Ad-Hoc Network: Revisited -- Steganalysis of Hydan -- Trusted Computing -- On the Impossibility of Detecting Virtual Machine Monitors -- Implementation of a Trusted Ticket System -- Security Policies -- A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor -- A Policy Language for Modelling Recommendations -- Validation, Verification, Evaluation -- On the Security Validation of Integrated Security Solutions -- Verification of Security Policy Enforcement in Enterprise Systems -- Optimization of the Controlled Evaluation of Closed Relational Queries -- Privacy Protection - Security Assessment -- Collaborative Privacy – A Community-Based Privacy Infrastructure -- Security and Privacy Improvements for the Belgian eID Technology -- A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components -- Role Mining and Content Protection -- Mining Stable Roles in RBAC -- Privacy-Preserving Content-Based Publish/Subscribe Networks -- Broadcast Encryption for Differently Privileged -- Ontology-Based Secure XML Content Distribution -- Security Protocols -- NGBPA Next Generation BotNet Protocol Analysis -- Non-repudiation Analysis with LySa -- A Provably Secure Secret Handshake with Dynamic Controlled Matching -- Towards a Theory of White-Box Security -- Access Control -- On a Taxonomy of Delegation -- Efficient Key Management for Enforcing Access Control in Outsourced Scenarios -- A Probabilistic Bound on the Basic Role Mining Problem and Its Applications -- Automating Access Control Logics in Simple Type Theory with LEO-II -- Internet and Web Applications Security -- In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security -- Persona: Network Layer Anonymity and Accountability for Next Generation Internet -- Jason: A Scalable Reputation System for the Semantic Web -- Which Web Browsers Process SSL Certificates in a Standardized Way?. 
520 |a This book constitutes the refereed proceedings of the 24th IFIP TC 11 International Information Security Conference, SEC 2009, held in Pafos, Cyprus, in May 2009. The 38 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers are organized in topical sections on identification and authentication, threats and attacks, applications of cryptography and information hiding, trusted computing, security policies, validation, verification and evaluation, privacy protection and security assessment, role mining and content protection, security protocols, access control, and internet and Web applications security. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data structures (Computer science). 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Data Encryption. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
700 1 |a Gritzalis, Dimitris.  |e editor. 
700 1 |a Lopez, Javier.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642012433 
830 0 |a IFIP Advances in Information and Communication Technology,  |x 1868-4238 ;  |v 297 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-01244-0  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)