Buch, Englisch, Band 147, 548 Seiten, Format (B × H): 165 mm x 244 mm, Gewicht: 1124 g
Reihe: IFIP Advances in Information and Communication Technology
Ifip 18th World Computer Congress Tc11 19th International Information Security Conference 22-27 August 2004 Toulouse, France
Buch, Englisch, Band 147, 548 Seiten, Format (B × H): 165 mm x 244 mm, Gewicht: 1124 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-1-4020-8142-2
Verlag: Springer Us
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
An Abstract Reduction Model for Computer Security Risk.- Remediation Graphs for Security Patch Management.- Security Modelling for Risk Analysis.- Contrasting Malicious Applets by Modifying the Java Virtual Machine.- Analyzing Network Management Effects with Spin and cTLA.- Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics.- Meeting the Global Challenges of Security Incident Response.- Security in Globally Distributed Industrial Information Systems.- A Case for Information Ownership in ERP Systems.- Interactive Access Control for Web Services.- Identity-Based Key Infrastructures (IKI).- Modint: A Compact Modular Arithmetic Java Class Library for Cellular Phones, and its Application to Secure Electronic Voting.- Dependable Security by Twisted Secret Sharing.- A Language Driven Intrusion Detection System for Event and Alert Correlation.- Install-Time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks.- Eigenconnections to Intrusion Detection.- Visualising Intrusions: Watching the Webserver.- A Long-Term Trial of Keystroke Profiling Using Digraph, Trigraph and Keyword Latencies.- Trusted Computing, Trusted Third Parties, and Verified Communications.- Maille Authentication.- Supporting end-to-end Security Across Proxies with Multiple-Channel SSL.- A Content-Protection Scheme for Multi-Layered Reselling Structures.- An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.- IPsec Clustering.- Improving Secure Device Insertion in Home Ad Hoc Networks.- Spam Filter Analysis.- Collective Signature for Efficient Authentication of XML Documents.- Updating Encrypted XML Documents on Untrusted Machines.- Efficient Simultaneous Contract Signing.- DHCP Authentication Using Certificates.- Recursive Sandboxes: Extending Systrace to Empower Applications.- Fast Digital Certificate Revocation.- Masks: Managing Anonymity while Sharing Knowledge to Servers.- Security and Differentiated Hotspot Services Through Policy-based Management Architecture.- Key Management for Secure Multicast in Hybrid Satellite Networks.