Information Security for Global Information InfrastructuresSihan Qing, Jan H.P. Eloff Springer Science & Business Media, 2000. gada 31. jūl. - 509 lappuses IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings. |
Saturs
Progress Problems and Perspectives | 1 |
Process Evaluation and Product Evaluation | 11 |
Managing Information Security in Healthcare an Action Research Experience | 19 |
From Trusted Information Security Controls to a Trusted Information Security Environment | 29 |
A Qualitative Approach to Information Availability | 37 |
A Postgraduate Programme on Information and Communication Systems Security | 49 |
Information Security Management Through Measurement | 59 |
The Defense Framework For Largescale Computer Network System | 69 |
Analysis and Design of Evoting Protocol | 281 |
Models of Agents Community | 291 |
TOWARDS NETWORK DENIAL OF SERVICE RESISTANT PROTOCOLS | 301 |
A Generic Graphical Specification Environment for Security Protocol Modelling | 311 |
Anonymous Electronic Voting System with NonTransferable Voting Passes | 321 |
Improving Packet Filters Management through Automatic and Dynamic Schemes | 331 |
A Contextsensitive Access Control Model and Prototype Implementation | 341 |
Regulating Access to Semistructured Information on the Web | 351 |
An Approach to Unravel Enterprise Security Management Policies | 79 |
Independent Policy Oriented Layering of Security Services | 89 |
Reducing Computer Fraud Through Situational Crime Prevention | 99 |
Five approaches | 111 |
DNAproofing for computer systems a new approach to computer security? | 121 |
Services and Security Features | 131 |
Model for an Auditing Security System | 141 |
CLASSIFYING INFORMATION FOR EXTERNAL RELEASE | 151 |
Using Mobile Agent Results to Create HardtoDetect Computer Viruses | 161 |
A DISTRIBUTED SYSTEM FOR DETECTING COORDINATED ATTACKS | 171 |
Based on Secure Spread Spectrum and Auditory Perception Model | 181 |
A Simple and Efficient Approach to Verifying Cryptographic Protocols | 191 |
Power analysis of RC6 and SERPENT | 201 |
A SIMPLE ALGORITHM FOR COMPUTING SEVERAL SEQUENCES SYNTHESIS | 211 |
GSFSA NEW GROUPAWARE CRYPTOGRAPHIC FILE SYSTEM | 221 |
RobustnessAgile Encryptor for ATM Networks | 231 |
FAST CONSTRUCTION OF SECURE DISCRETE LOGARITHM PROBLEMS OVER JACOBIAN VARIETIES | 241 |
A new serialparallel architecture for a low power modular multiplier | 251 |
Defending Against Null Calls Stream Attacks by Using a DoubleThreshold Dynamic Filter | 261 |
A MULTIPARTY NONREPUDIATION PROTOCOL | 271 |
A Case Study | 361 |
Elements of A Language for RoleBased Access Control | 371 |
Disallowing Unauthorized State Changes of Distributed Shared Objects | 381 |
Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network | 391 |
The problems of descriptivism and nondescriptive foundations | 401 |
Fact or Fiction? | 411 |
ENFORCING PRIVACY BY WITHHOLDING PRIVATE INFORMATION | 421 |
The Changing Roles of Patent and Copyright Protection for Software and Communication Technology In the Internet Age | 431 |
A framework for electronic commerce security | 441 |
Electronic Payment Systems with Fair Online Verification | 451 |
Fair Electronic Cash Systems with Multiple Banks | 461 |
An Experiment | 471 |
A Flexible Management Framework for Certificate Status Validation | 481 |
A security architecture for electronic commerce applications | 491 |
Invited Papers | 501 |
On the Development of the Advanced Encryption Standard | 503 |
managing the eBusiness security | 505 |
507 | |
Citi izdevumi - Skatīt visu
Information Security for Global Information Infrastructures: IFIP TC11 ... Sihan Qing,Jan H.P. Eloff Ierobežota priekšskatīšana - 2013 |
Information Security for Global Information Infrastructures: IFIP TC11 ... Sihan Qing,Jan H.P. Eloff Priekšskatījums nav pieejams - 2000 |
Information Security for Global Information Infrastructures: IFIP TC11 ... Sihan Qing,Jan H.P. Eloff Priekšskatījums nav pieejams - 2013 |
Bieži izmantoti vārdi un frāzes
access control algorithm analysis application approach architecture attacks audit authentication availability blind signature certificate client communication component Computer Security constraints criteria cryptographic cryptographic protocols database decrypt defined digital signatures discrete logarithm distributed DSMIN dynamic electronic cash electronic commerce encryption environment evaluation example Figure file system function identity IEEE implemented information security Information Systems input integrity interface Internet intrusion detection ITSEC Jacobian varieties malicious host mapping mobile agents modular module monitor multiplication node non-repudiation operation packet filter paper passwords patent presented Privacy private key problem proposed protection protocol public key result risk role S/MIME security management security policy security requirements server smart card solution specific structure subsystem SYN flooding Systems Security task TCSEC transaction verify virus voter voting watermark