Buch, Englisch, Band 330, 312 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 664 g
Reihe: IFIP Advances in Information and Communication Technology
25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings
Buch, Englisch, Band 330, 312 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 664 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-3-642-15256-6
Verlag: Springer
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Cloud-Computing, Grid-Computing
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
Kristian Beckman Award Awardee Keynote.- The 5 Waves of Information Security – From Kristian Beckman to the Present.- Security Management.- A Business Continuity Management Simulator.- Mining Business-Relevant RBAC States through Decomposition.- Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study.- Security Management & Governance.- Using Actor Network Theory to Understand Information Security Management.- Information Security Governance: When Compliance Becomes More Important than Security.- Network Security & Authentication.- Understanding Domain Registration Abuses.- Who on Earth Is “Mr. Cypher”: Automated Friend Injection Attacks on Social Networking Sites.- Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems.- Qualified Mobile Server Signature.- Intrusion Detection, Trust Management, and Models.- Fraud Detection in ERP Systems Using Scenario Matching.- Use of IP Addresses for High Rate Flooding Attack Detection.- Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information.- Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment.- Software Security and Assurance.- A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism.- On-the-fly Inlining of Dynamic Security Monitors.- A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems.- Evaluation of the Offensive Approach in Information Security Education.- Panel.- Research Methodologies in Information Security Research: The Road Ahead.- Access Control and Privacy.- Purpose-Based Access Control Policies and Conflicting Analysis.- Delegation in Predicate Encryption Supporting Disjunctive Queries.- Tagging Disclosures of Personal Data to Third Parties to PreservePrivacy.- k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments.- Privacy.- Towards Fair Indictment for Data Collection with Self-Enforcing Privacy.- How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project.- Performance Analysis of Accumulator-Based Revocation Mechanisms.- IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems.