Security and protection in information processing systems : IFIP 18th world computer congress : TC11 19th international information security conference, 22-27 August 2004, Toulouse, France. / edited by Yves Deswarte [and others].
Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept...
Saved in:
Online Access: |
Full Text (via EBSCO) |
---|---|
Corporate Authors: | , , |
Other Authors: | |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Boston ; London :
Kluwer Academic Publishers,
2004.
|
Series: | International Federation for Information Processing (Series) ;
147. |
Subjects: |
Table of Contents:
- An Abstract Reduction Model for Computer Security Risk
- Remediation Graphs for Security Patch Management
- Security Modelling for Risk Analysis
- Contrasting Malicious Applets by Modifying the Java Virtual Machine
- Analyzing Network Management Effects with Spin and cTLA
- Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics
- Meeting the Global Challenges of Security Incident Response
- Security in Globally Distributed Industrial Information Systems
- A Case for Information Ownership in ERP Systems
- Interactive Access Control for Web Services
- Identity-Based Key Infrastructures (IKI)
- Modint: A Compact Modular Arithmetic Java Class Library for Cellular Phones, and its Application to Secure Electronic Voting
- Dependable Security by Twisted Secret Sharing
- A Language Driven Intrusion Detection System for Event and Alert Correlation
- Install-Time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
- Eigenconnections to Intrusion Detection
- Visualising Intrusions: Watching the Webserver
- A Long-Term Trial of Keystroke Profiling Using Digraph, Trigraph and Keyword Latencies
- Trusted Computing, Trusted Third Parties, and Verified Communications
- Maille Authentication
- Supporting end-to-end Security Across Proxies with Multiple-Channel SSL
- A Content-Protection Scheme for Multi-Layered Reselling Structures
- An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
- IPsec Clustering
- Improving Secure Device Insertion in Home Ad Hoc Networks
- Spam Filter Analysis
- Collective Signature for Efficient Authentication of XML Documents
- Updating Encrypted XML Documents on Untrusted Machines
- Efficient Simultaneous Contract Signing
- DHCP Authentication Using Certificates
- Recursive Sandboxes: Extending Systrace to Empower Applications
- Fast Digital Certificate Revocation
- Masks: Managing Anonymity while Sharing Knowledge to Servers
- Security and Differentiated Hotspot Services Through Policy-based Management Architecture
- Key Management for Secure Multicast in Hybrid Satellite Networks.