信息与计算安全新趋向/会议录

信息与计算安全新趋向/会议录
作 者: Günter Müller
出版社: 崇文书局(原湖北辞书出版社)
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《信息与计算安全新趋向/会议录》作者简介

内容简介

This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006.The 36 revised full papers presented were carefully reviewed and selected from around 180 submissions. The papers are organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.

图书目录

Multilateral Security

 Multilateral Security: Enabling Technologies and Their Evaluation

 Do You Trust Your Recommendations? An Exploration of Securityand Privacy Issues in Recommender Systems

 Security in Service-Oriented Computing

 Optimized Workflow Authorization in Service Oriented Architectures

 Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment

 A P2P Content Authentication Protocol Based on Byzantine Agreement

Secure Mobile Applications

 Transitive Trust in Mobile Scenarios

 An Open, PKI-Based Mobile Payment System

 Secure Rejoining Scheme for Dynamic Sensor Networks

 Developing Provable Secure M-Commerce Applications

Enterprise Privacy

 An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction

 Privacy-Preserving Decision Tree Mining Based on Random Substitutions

Privacy, Identity, and Anonymity

 Policy-Based Integration of User and Provider-Sided Identity Management

 Privacy with Delegation of Rights by Identity Management

 A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System

 Revocable Anonymity

 Low Latency Anonymous Communication - How Long Are Users Willing to Wait?

Security Engineering

 Security Engineering Using Problem Frames

 SEcTOOL - Supporting Requirements Engineering for Access Control

 Possibilistic Information Flow Control in MAKS and Action Refinement

 Toward a Framework for Forensic Analysis of Scanning Worms

 A Comparison of Market Approaches to Software Vulnerability Disclosure

 ……

Security Policies

Security and Protocls

Intrusion Detection

Perspectives of Cryptographic Security

Author Index