Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France
✍ Scribed by Mohamed Hamdi, Noureddine Boudriga (auth.), Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (eds.)
- Publisher
- Springer US
- Year
- 2004
- Tongue
- English
- Leaves
- 546
- Series
- IFIP — The International Federation for Information Processing 147
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful.
Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.
✦ Table of Contents
Front Matter....Pages i-xiv
An Abstract Reduction Model for Computer Security Risk....Pages 1-16
Remediation Graphs for Security Patch Management....Pages 17-28
Security Modelling for Risk Analysis....Pages 29-45
Contrasting Malicious Applets by Modifying the Java Virtual Machine....Pages 47-64
Analyzing Network Management Effects with SPIN and cTLA....Pages 65-81
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics....Pages 83-99
Meeting the Global Challenges of Security Incident Response....Pages 101-117
Security in Globally Distributed Industrial Information Systems....Pages 119-134
A Case for Information Ownership in ERP Systems....Pages 135-149
Interactive Access Control for Web Services....Pages 151-166
Identity-Based Key Infrastructures (IKI)....Pages 167-176
Modint: A Compact Modular Arithmetic Java Class Library for Cellular Phones, and its Application to Secure Electronic Voting....Pages 177-192
Dependable Security by Twisted Secret Sharing....Pages 193-207
A Language Driven Intrusion Detection System for Event and Alert Correlation....Pages 209-224
Install-Time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks....Pages 225-240
Eigenconnections to Intrusion Detection....Pages 241-258
Visualising Intrusions: Watching the Webserver....Pages 259-274
A Long-Term Trial of Keystroke Profiling Using Digraph, Trigraph and Keyword Latencies....Pages 275-289
Trusted Computing, Trusted Third Parties, and Verified Communications....Pages 291-308
Maille Authentication....Pages 309-322
Supporting End-To-End Security Across Proxies with Multiplechannel SSL....Pages 323-337
A Content-Protection Scheme for Multi-Layered Reselling Structures....Pages 339-349
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards....Pages 351-365
IPsec Clustering....Pages 367-379
Improving Secure Device Insertion in Home Ad Hoc Networks....Pages 381-394
Spam Filter Analysis....Pages 395-410
Collective Signature for Efficient Authentication of XML Documents....Pages 411-424
Updating Encrypted XML Documents on Untrusted Machines....Pages 425-439
Efficient Simultaneous Contract Signing....Pages 441-455
DHCP Authentication Using Certificates....Pages 457-472
Recursive Sandboxes: Extending Systrace to Empower Applications....Pages 473-487
Fast Digital Certificate Revocation....Pages 489-500
Masks: Managing Anonymity While Sharing Knowledge to Servers....Pages 501-515
Security and Differentiated Hotspot Services Through Policy-Based Management Architecture....Pages 517-532
Key Management for Secure Multicast in Hybrid Satellite Networks....Pages 533-548
✦ Subjects
Computers and Society
📜 SIMILAR VOLUMES
<p>This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that are currently particularly active in Security. The first one is the 10th IFIP Annual Working Conference on Information Security Management. It is org
Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC 2004 in August, 2004, in Toulouse, France. Certification and security share a com
<p><P>In the context of the 18th IFIP World Computer Congress (WCC’04), and beside the traditional organization of conferences, workshops, tutorials and student forum, it was decided to identify a range of topics of dramatic interest for the building of the Information Society. This has been feature
<p><P>Exploring New Frontiers of Theoretical Informatics</P><P>Edited by Jean-Jacques Levy, Ernst W. Mayr, and John C. Mitchell</P><P></P><P>In recent years, IT application scenarios have evolved in very innovative ways. Highly distributed networks have now become a common platform for large-scale d
<p><P>International Federation for Information Processing</P><P>The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer a