Security and protection in information processing systems : IFIP 18th world computer congress : TC11 19th international information security conference, 22-27 August 2004, Toulouse, France. / edited by Yves Deswarte [and others].

Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via EBSCO)
Corporate Authors: TC11 International Information Security Conference Toulouse, France, International Federation for Information Processing, IFIP World Computer Congress
Other Authors: Deswarte, Y. (Yves)
Format: Electronic Conference Proceeding eBook
Language:English
Published: Boston ; London : Kluwer Academic Publishers, 2004.
Series:International Federation for Information Processing (Series) ; 147.
Subjects:
Table of Contents:
  • An Abstract Reduction Model for Computer Security Risk
  • Remediation Graphs for Security Patch Management
  • Security Modelling for Risk Analysis
  • Contrasting Malicious Applets by Modifying the Java Virtual Machine
  • Analyzing Network Management Effects with Spin and cTLA
  • Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics
  • Meeting the Global Challenges of Security Incident Response
  • Security in Globally Distributed Industrial Information Systems
  • A Case for Information Ownership in ERP Systems
  • Interactive Access Control for Web Services
  • Identity-Based Key Infrastructures (IKI)
  • Modint: A Compact Modular Arithmetic Java Class Library for Cellular Phones, and its Application to Secure Electronic Voting
  • Dependable Security by Twisted Secret Sharing
  • A Language Driven Intrusion Detection System for Event and Alert Correlation
  • Install-Time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
  • Eigenconnections to Intrusion Detection
  • Visualising Intrusions: Watching the Webserver
  • A Long-Term Trial of Keystroke Profiling Using Digraph, Trigraph and Keyword Latencies
  • Trusted Computing, Trusted Third Parties, and Verified Communications
  • Maille Authentication
  • Supporting end-to-end Security Across Proxies with Multiple-Channel SSL
  • A Content-Protection Scheme for Multi-Layered Reselling Structures
  • An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
  • IPsec Clustering
  • Improving Secure Device Insertion in Home Ad Hoc Networks
  • Spam Filter Analysis
  • Collective Signature for Efficient Authentication of XML Documents
  • Updating Encrypted XML Documents on Untrusted Machines
  • Efficient Simultaneous Contract Signing
  • DHCP Authentication Using Certificates
  • Recursive Sandboxes: Extending Systrace to Empower Applications
  • Fast Digital Certificate Revocation
  • Masks: Managing Anonymity while Sharing Knowledge to Servers
  • Security and Differentiated Hotspot Services Through Policy-based Management Architecture
  • Key Management for Secure Multicast in Hybrid Satellite Networks.