Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings /

The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Jahankhani, Hamid (Editor), Hessami, Ali G. (Editor), Hsu, Feng (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Series:Communications in Computer and Information Science, 45
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush!
  • A Security Audit Framework for Security Management in the Enterprise
  • Watermarking Spatial Data in Geographic Information Systems
  • Situation Awareness in Systems of Systems Ad-Hoc Environments
  • The Georgia’s Cyberwar
  • The UK Government’s Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture
  • Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions
  • Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer’s Trust
  • A Systems Framework for Sustainability
  • Hybrid Genetic Algorithm for Travel Time Reliability of Optimal Path
  • Geofencing in a Security Strategy Model
  • Using Business Process Execution Language to Handle Evaluation Factors for Web Services Compositions
  • The Significance of Security in Transmitting Clinical Data
  • Security Concern over Earth Viewer Software Using Satellite Photo Service
  • The People’s Republic of China – The Emerging Cyberpower
  • Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation
  • Neural Networks for Intrusion Detection Systems
  • Exploitation of Secrets Injected in Java Midlets
  • Biometrically Based Electronic Signatures for a Public Networked Environment
  • Policy Translation and Reconciliation Techniques for the System-of-Systems Domain
  • The Kido Botnet: Back to the Future
  • Information Systems Security and Its Affiliation to Information Technology Risk Management
  • A Sustainable Approach to Healing the World for Humanity and the Environment ... An Evolving Idea
  • Hey – Get Off My Cloud!
  • Static and Dynamic Analysis for Web Security in Generic Format.