Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, ProceedingsRobert Deng, Robert H. Deng Springer Science & Business Media, 2005. gada 5. apr. - 424 lappuses The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 1114, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference. |
Saturs
Network Security | 1 |
Modeling and Evaluation of Security Architecture for Wireless Local | 25 |
Secure Architecture I | 46 |
Cryptographic Techniques I | 48 |
Tracing Traitors by Guessing Secrets The qAry Case | 61 |
Probabilistic Analyses on Finding Optimal Combinations of Primality | 74 |
An Email Worm Vaccine Architecture | 97 |
Enforcing the Principle of Least Privilege with a StateBased Privilege | 109 |
Intrusion Detection | 178 |
Detection | 192 |
Andre Adelsbach Sebastian Gajek Jorg Schwenk 204 Model Redundancy s Intrusion Detection v | 217 |
Applications and Case Studies | 230 |
An Empirical Study on the Usability of Logout in a Single Signn | 243 |
A Restricted Multishow Credential System and Its Application | 268 |
Using Trust for Restricted Delegation in Grid Environments | 293 |
An IdentityBased Grid Security Infrastructure Model | 314 |
Security Ondemand Architecture with Multiple Modules Support | 121 |
Measuring Resistance to Social Engineering | 132 |
Access Control | 138 |
Conformance Checking of RBAC Policy and Its Implementation | 144 |
A Practical Aspect Framework for Enforcing FineGrained Access | 156 |
A TaskOriented Access Control Model for WfMS | 168 |
Hiding Data in Binary Images | 338 |
Protecting Mass Data Basing on Small Trusted Agent | 362 |
TokenControlled Public Key Encryption | 386 |
tOutofn StringBit Oblivious Transfers Revisited | 410 |
423 | |
Citi izdevumi - Skatīt visu
Information Security Practice and Experience: First International Conference ... Robert H. Deng,Feng Bao,HweeHwa Pang,Jianying Zhou Ierobežota priekšskatīšana - 2005 |
Information Security Practice and Experience: First International Conference ... Robert H. Deng,Feng Bao,HweeHwa Pang,Jianying Zhou Ierobežota priekšskatīšana - 2005 |
Information Security Practice and Experience Robert H. Deng,Tao Feng Priekšskatījums nav pieejams - 2013 |
Bieži izmantoti vārdi un frāzes
access control active algorithm allows analysis application approach architecture aspects assigned attacks authentication authorization behavior bits block called channel ciphertext combination communication components Computer consider constraints construction corresponding defined delegation denotes described detection device different discussed distribution efficient embedding encryption environment evaluation example existing experiment first function given implementation input intrusion length LNCS means mechanism method module nodes normal object operating original packets parameters peer performance phase platform positive possible present privilege probability problem properties proposed protect protocol proxy public key random receiver References request requirements role route scheme secret selected sends sequence session share signature single step Table task techniques tion transfer trust University valid voting vulnerability