Sold Out
Book Categories |
Preface | ||
IFIP/Sec'01 Conference Committees | ||
Pt. 1 | eSociety | |
1 | PyTHIA: Towards Anonymity in Authentication | 1 |
2 | Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? | 19 |
3 | Internet Anonymity: Problems and Solutions | 35 |
Pt. 2 | TTP Management and PKI | |
4 | Reducing Certificate Revocation Cost using NPKI | 51 |
5 | The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems | 61 |
Pt. 3 | Smart Card | |
6 | Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? | 77 |
7 | Modelling Audit Security for Smart-Card Payment Schemes with UML-SEC | 93 |
Pt. 4 | Security Protocols | |
8 | Strong Forward Security | 109 |
9 | Secret Sharing and Visual Cryptography Schemes | 123 |
10 | A Two-level Time-Stamping System | 139 |
11 | Security Analysis of the Cliques Protocols Suites: First Results | 151 |
Pt. 5 | Secure Workflow Environment | |
12 | A Secure Workflow System for Dynamic Collaboration | 167 |
13 | On Securely Scheduling a Meeting | 183 |
14 | Modeling and Analyzing Separation of Duties in Workflow Environments | 199 |
Pt. 6 | Secure Group Communications | |
15 | Group Security Association (GSA) Management in IP Multicast | 213 |
16 | Communication-Efficient Group Key Agreement | 229 |
Pt. 7 | Security Policies | |
17 | Going Beyond MAC and DAC Using Mobile Policies | 245 |
18 | An Access Control Model for Data Archives | 261 |
Pt. 8 | Risk Management | |
19 | Checklist-Based Risk Analysis with Evidential Reasoning | 277 |
20 | Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis | 293 |
21 | The Security of Model to Combine the Corporate and Information Security | 305 |
22 | Design Criteria to Classified Information Systems Numerically | 317 |
Pt. 9 | Network Security and Intrusion Detection | |
23 | Deception: A Tool and Curse for Security Management | 327 |
24 | A Methodology of Detect Temporal Regularities in User Behavior for Anomaly Detection | 339 |
25 | ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection | 353 |
26 | Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework | 369 |
Pt. 10 | Trusted Platforms | |
27 | An Efficient Software Protection Scheme | 385 |
28 | Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs | 403 |
Pt. 11 | Trusted System Design and Management | |
29 | Security Concerns for Contemporary Development Practices: A Case Study | 421 |
30 | A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS | 437 |
31 | Redefining Information Systems Security: Viable Information Systems | 453 |
32 | Extended Description Techniques for Security Engineering | 469 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionTrusted Information: The New Decade Challenge
X
This Item is in Your InventoryTrusted Information: The New Decade Challenge
X
You must be logged in to review the productsX
X
X
Add Trusted Information: The New Decade Challenge, With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services. Addressing this security issue, this volume is, Trusted Information: The New Decade Challenge to the inventory that you are selling on WonderClubX
X
Add Trusted Information: The New Decade Challenge, With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services. Addressing this security issue, this volume is, Trusted Information: The New Decade Challenge to your collection on WonderClub |