Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings

Pirmais vāks
Robert Deng, Robert H. Deng
Springer Science & Business Media, 2005. gada 5. apr. - 424 lappuses
The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.

No grāmatas satura

Saturs

Network Security
1
Modeling and Evaluation of Security Architecture for Wireless Local
25
Secure Architecture I
46
Cryptographic Techniques I
48
Tracing Traitors by Guessing Secrets The qAry Case
61
Probabilistic Analyses on Finding Optimal Combinations of Primality
74
An Email Worm Vaccine Architecture
97
Enforcing the Principle of Least Privilege with a StateBased Privilege
109
Intrusion Detection
178
Detection
192
Andre Adelsbach Sebastian Gajek Jorg Schwenk 204 Model Redundancy s Intrusion Detection v
217
Applications and Case Studies
230
An Empirical Study on the Usability of Logout in a Single Signn
243
A Restricted Multishow Credential System and Its Application
268
Using Trust for Restricted Delegation in Grid Environments
293
An IdentityBased Grid Security Infrastructure Model
314

Security Ondemand Architecture with Multiple Modules Support
121
Measuring Resistance to Social Engineering
132
Access Control
138
Conformance Checking of RBAC Policy and Its Implementation
144
A Practical Aspect Framework for Enforcing FineGrained Access
156
A TaskOriented Access Control Model for WfMS
168
Hiding Data in Binary Images
338
Protecting Mass Data Basing on Small Trusted Agent
362
TokenControlled Public Key Encryption
386
tOutofn StringBit Oblivious Transfers Revisited
410
Author Index
423
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Bibliogrāfiskā informācija