Wonder Club world wonders pyramid logo
×

Trusted Information: The New Decade Challenge Book

Trusted Information: The New Decade Challenge
Trusted Information: The New Decade Challenge, With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
 Addressing this security issue, this volume is, Trusted Information: The New Decade Challenge has a rating of 3 stars
   2 Ratings
X
Trusted Information: The New Decade Challenge, With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services. Addressing this security issue, this volume is, Trusted Information: The New Decade Challenge
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $254.14
Original Magazine
Physical Format

Sold Out

  • Trusted Information: The New Decade Challenge
  • Written by author Michel Dupuy
  • Published by Springer-Verlag New York, LLC, May 2001
  • With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services. Addressing this security issue, this volume is
  • With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services. Addressing this security issue, this volume is
Buy Digital  USD$254.14

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Preface
IFIP/Sec'01 Conference Committees
Pt. 1eSociety
1PyTHIA: Towards Anonymity in Authentication1
2Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?19
3Internet Anonymity: Problems and Solutions35
Pt. 2TTP Management and PKI
4Reducing Certificate Revocation Cost using NPKI51
5The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems61
Pt. 3Smart Card
6Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?77
7Modelling Audit Security for Smart-Card Payment Schemes with UML-SEC93
Pt. 4Security Protocols
8Strong Forward Security109
9Secret Sharing and Visual Cryptography Schemes123
10A Two-level Time-Stamping System139
11Security Analysis of the Cliques Protocols Suites: First Results151
Pt. 5Secure Workflow Environment
12A Secure Workflow System for Dynamic Collaboration167
13On Securely Scheduling a Meeting183
14Modeling and Analyzing Separation of Duties in Workflow Environments199
Pt. 6Secure Group Communications
15Group Security Association (GSA) Management in IP Multicast213
16Communication-Efficient Group Key Agreement229
Pt. 7Security Policies
17Going Beyond MAC and DAC Using Mobile Policies245
18An Access Control Model for Data Archives261
Pt. 8Risk Management
19Checklist-Based Risk Analysis with Evidential Reasoning277
20Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis293
21The Security of Model to Combine the Corporate and Information Security305
22Design Criteria to Classified Information Systems Numerically317
Pt. 9Network Security and Intrusion Detection
23Deception: A Tool and Curse for Security Management327
24A Methodology of Detect Temporal Regularities in User Behavior for Anomaly Detection339
25ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection353
26Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework369
Pt. 10Trusted Platforms
27An Efficient Software Protection Scheme385
28Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs403
Pt. 11Trusted System Design and Management
29Security Concerns for Contemporary Development Practices: A Case Study421
30A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS437
31Redefining Information Systems Security: Viable Information Systems453
32Extended Description Techniques for Security Engineering469


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Trusted Information: The New Decade Challenge, With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
 Addressing this security issue, this volume is, Trusted Information: The New Decade Challenge

X
WonderClub Home

This item is in your Collection

Trusted Information: The New Decade Challenge, With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
 Addressing this security issue, this volume is, Trusted Information: The New Decade Challenge

Trusted Information: The New Decade Challenge

X
WonderClub Home

This Item is in Your Inventory

Trusted Information: The New Decade Challenge, With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
 Addressing this security issue, this volume is, Trusted Information: The New Decade Challenge

Trusted Information: The New Decade Challenge

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: