Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings /
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research...
Corporate Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Series: | Communications in Computer and Information Science,
45 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush!
- A Security Audit Framework for Security Management in the Enterprise
- Watermarking Spatial Data in Geographic Information Systems
- Situation Awareness in Systems of Systems Ad-Hoc Environments
- The Georgia’s Cyberwar
- The UK Government’s Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture
- Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions
- Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer’s Trust
- A Systems Framework for Sustainability
- Hybrid Genetic Algorithm for Travel Time Reliability of Optimal Path
- Geofencing in a Security Strategy Model
- Using Business Process Execution Language to Handle Evaluation Factors for Web Services Compositions
- The Significance of Security in Transmitting Clinical Data
- Security Concern over Earth Viewer Software Using Satellite Photo Service
- The People’s Republic of China – The Emerging Cyberpower
- Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation
- Neural Networks for Intrusion Detection Systems
- Exploitation of Secrets Injected in Java Midlets
- Biometrically Based Electronic Signatures for a Public Networked Environment
- Policy Translation and Reconciliation Techniques for the System-of-Systems Domain
- The Kido Botnet: Back to the Future
- Information Systems Security and Its Affiliation to Information Technology Risk Management
- A Sustainable Approach to Healing the World for Humanity and the Environment ... An Evolving Idea
- Hey – Get Off My Cloud!
- Static and Dynamic Analysis for Web Security in Generic Format.