The Resource Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, edited by Simone Fischer-Heùbner ... [et al.], (electronic resource)

Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, edited by Simone Fischer-Heùbner ... [et al.], (electronic resource)

Label
Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
Title
Security and privacy in dynamic environments
Title remainder
proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
Statement of responsibility
edited by Simone Fischer-Heùbner ... [et al.]
Creator
Contributor
Subject
Genre
Language
eng
Summary
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org
Member of
Action
digitized
Additional physical form
Also available in print
Cataloging source
OCoLC
Dewey number
510
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I452 2006eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
International Federation for Information Processing Series,
Label
Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, edited by Simone Fischer-Heùbner ... [et al.], (electronic resource)
Publication
Bibliography note
Includes bibliographical references and index
http://library.link/vocab/branchCode
  • net
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Improving availability of emergency health information without sacrificing patient privacy / Inger Anne To2ndel -- Ensuring privacy for buyer-seller e-commerce / George Yee, Larry Korba, Ronggong Song -- A general certification framework with applications to privacy-enhancing certificate infrastructures / Jan Camenisch, Dieter Sommer, Roger Zimmermann -- Authenticated query flooding in sensor networks / Zinaida Benenson ... [et al.] -- Identity based message authentication for dynamic networks / Pietro Michiardi and Refik Molva -- Providing authentication and access control in vehicular network environment / Hasnaa Moustafa, Gilles Bourdon and Yvon Gourhant -- A framework for Web services trust / Marijke Coetzee, Jan Eloff -- Trust: an element of security / Stephen Flowerday and Rossouw von Solms -- Security-by-ontology: a knowledge-centric approach / Bill Tsoumas ... [et al.] -- A methodology for designing controlled anonymous applications / Vincent Naessens and Bart De Decker -- Design options for privacy-respecting reputation systems within centralised Internet communities / Sandra Steinbrecher -- Protecting (anonymous) credentials with the trusted computing group's trusted platform modules V1.2 / Jan Camenisch -- Analysis and improvement of anti-phishing schemes / Dinei Floraẽncio and Cormac Herley -- CAT -- a practical graph & SDL based toolkit for vulnerability assessment of 3G networks / Kameswari Kotapati, Peng Liu and Thomas F. LaPorta -- Protecting Web services from DOS attacks by SOAP message validation / Nils Gruschka and Norbert Luttenberger -- A flexible and distributed architecture to enforce dynamic access control -- Thierry Sans, Fraêdaêric Cuppens and Nora Cuppens-Boulahia -- A paradigm for dynamic and decentralized administration of access control in workflow applications / Andreas Mattas, Ioannins Mavridis and Iason Pagkalos -- CAS++: an open source single sign-on solution for secure E-services / Claudio Agostino Ardagna ... [et al.] -- A synchronous multi-party contract signing protocol improving lower bound of steps / Jianying Zhou, Jose A. Onieva and Javier Lopez -- On the cryptographic key secrecy of the strengthened Yahalom protocol / Michael Backes and Birgit Pfuzmann -- Sealed-bid micro auctions / Kun Peng, Colin Boyd and Ed Dawson -- Detecting known and network intrusions / Yacine Bouzida and Fraêdaêric Cuppens -- Evaluating classifiers for mobile-masquerader detection / Oleksiy Mazhelis, Seppo Puuronen and Mika Raento -- VisFlowCluster-IP: connectivity-based visual clustering of network hosts / Xiaoxin Yin, William Yurcik and Adam Slagell-- A usability study of security policy management / Almut Herzog and Nahid Shahmehri -- Considering the usability of end-user security software / Steven Furnell ... [et al.] -- Utilizing the common criteria for advanced student research projects / Thuy D. Nguyen and Cynthia E. Irvine -- On the relationship of privacy and secure remote logging in dynamic systems / Rafael Accorsi -- Privacy-preserving shared-additive-inverse protocols and their applications / Huafei Zhu, Tieyan Li and Feng Bao -- Click passwords / Darko Kirovski, Nebojeśa Jojiaĉ and Paul Roberts -- Cryptographically enforced personalized role-based access control / Milan Petkoviaĉ, Claudine Conrado and Malik Hammoutaéne -- Using VO concept for managing dynamic security associations / Yuri Demchenko, Leon Gommans and Cees de Laat -- Secure fast handover in an open broadband access network using Kerberos-style tickets / Martin Gilji Jaatun ... [et al.] -- Network forensics on packet fingerprints / Chia Yuan Cho ... [et al.] -- Oscar -- file type identification of binary data in disk clusters and RAM pages / Martin Karresand and Nahid Shahmehri -- Organizational security culture: more than just an end-user phenomenon / Anthonie B. Ruighaver and Sean B. Maynard -- Cyber security training and awareness through game play / Benjamin D. Cone ... [et al.] -- Internalisation of information security culture amongst employees through basic security knowledge / Omar Zakaria -- Bridging the gap between general management and technicians -- a case study in ICT security / Jabiri Kuwe Bakari ... [et al.] -- Value-focused assessment of information communication and technology security awareness in an academic environment / Lynette Drevin, Hennie Kruger and Tjaart Steyn -- Using phishing for user email security awareness / Ronald C. Dodge and Aaron J. Ferguson -- Invited talk: anonymous credentials: opportunities and challenges / Jan Camenisch -- Practical private regular expression matching / Florian Kerschbaum -- A system for privacy-aware resource allocation and data processing in dynamic environments / Siani Pearson and Marco Casassa-Mont -- The APROB-channel: adaptive semi-real-time anonymous communication / Gergely Taôth, Zoltaân Hornaâk
Control code
000048698236
Dimensions
unknown
Extent
1 online resource (xvi, 494 p.)
Governing access note
License restrictions may limit access
Isbn
9780387334066
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
ill
http://library.link/vocab/ext/overdrive/overdriveId
978-0-387-33405-9
http://library.link/vocab/recordID
.b21643088
Reproduction note
Electronic reproduction.
Specific material designation
remote
System control number
  • (OCoLC)209923933
  • ec21643088
System details
  • Mode of access: World Wide Web
  • System requirements: Internet connectivity, World Wide Web browser, and Adobe Acrobat reader

Library Locations

    • Deakin University Library - Geelong Waurn Ponds CampusBorrow it
      75 Pigdons Road, Waurn Ponds, Victoria, 3216, AU
      -38.195656 144.304955
Processing Feedback ...