Buch, Englisch, Band 65, 490 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 1950 g
Reihe: IFIP Advances in Information and Communication Technology
The New Decade Challenge
Buch, Englisch, Band 65, 490 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 1950 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-0-7923-7389-6
Verlag: Springer US
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Wirtschaftswissenschaften Literatur für Manager
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Wirtschaftswissenschaften Betriebswirtschaft Management
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management E-Commerce, E-Business, E-Marketing
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsmathematik und -statistik
Weitere Infos & Material
eSociety.- PyTHIA: Towards Anonymity in Authentication.- Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?.- Internet Anonymity: Problems and Solutions.- TTP Management and PKI.- Reducing Certificate Revocation Cost using NPKI.- The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems.- Smart Card.- Is the Performance of Smart Card Crytographic Functions the Real Bottleneck?.- Modelling Audit Security for Smart-Card Payment Schemes with UML-Sec.- Security Protocols.- Strong Forward Security.- Secret Sharing and Visual Cryptography Schemes.- A Two-level Time-Stamping System.- Security Analysis of the Cliques Protocols Suites: First Results.- Secure Workflow Environment.- A Secure Workflow System for Dynamic Collaboration.- On Securely Scheduling a Meeting.- Modeling and Analyzing Separation of Duties in Workflow Environments.- Secure Group Communications.- Group Security Association (GSA) Management in IP Multicast.- Communication-Efficient Group Key Agreement.- Security Policies.- Going Beyond MAC and DAC Using Mobile Policies.- An Access Control Model for Data Archives.- Risk Management.- Checklist-Based Risk Analysis with Evidential Reasoning.- Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis.- The Security Model to Combine the Corporate and Information Security.- Design Criteria to Classified Information Systems Numerically.- Network Security and Intrusion Detection.- Deception: A Tool and Curse for Security Management.- A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection.- ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection.- Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.- Trusted Platforms.- An Efficient Software Protection Scheme.- Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs.- Trusted System Design and Management.- Security Concerns for Contemporary Development Practices.- A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS.- Redefining Information Systems Security: Viable Information Systems.- Extended Description Techniques for Security Engineering.