Security and Privacy in Dynamic Environments
Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, IFIP Advances in Information and Communication Technology 201
Erschienen am
19.11.2010, 1. Auflage 2010
Beschreibung
InhaltsangabeImproving Availability of Emergency Health Information without Sacrificing Patient Privacy.- Ensuring Privacy for Buyer-Seller E-Commerce.- Authenticated Query Flooding in Sensor Networks.- A Framework for Web Services Trust.- Security-by-Ontology: A Knowledge-Centric Approach.- Analysis and Improvement of Anti-Phishing Schemes.- Protecting Web Services from DOS Attacks by SOAP Message Validation.- A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.- Sealed-Bid Micro Auctions.-Detecting Known and Novel Network Intrusions.-A Usability Study of Security Policy Management.- Utilizing the Common Criteria for Advanced Student Research Projects.- Click Passwords.- Secure Fast Handover in an Open Broadband Access Network Using Kerberos-Style Tickets.- Network Forensics on Packet Fingerprints.- Organizational Security Culture: More Than Just an End-User Phenomenon.-Value-Focused Assessment of Unformation Communication and Technology Security Awareness in an Academic Environment.- Practical Private Regular Expression Matching.
Produktsicherheitsverordnung
Hersteller:
Springer Verlag GmbH
juergen.hartmann@springer.com
Tiergartenstr. 17
DE 69121 Heidelberg
Inhalt
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy.- Ensuring Privacy for Buyer-Seller E-Commerce.- Authenticated Query Flooding in Sensor Networks.- A Framework for Web Services Trust.- Security-by-Ontology: A Knowledge-Centric Approach.- Analysis and Improvement of Anti-Phishing Schemes.- Protecting Web Services from DOS Attacks by SOAP Message Validation.- A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.- Sealed-Bid Micro Auctions.-Detecting Known and Novel Network Intrusions.-A Usability Study of Security Policy Management.- Utilizing the Common Criteria for Advanced Student Research Projects.- Click Passwords.- Secure Fast Handover in an Open Broadband Access Network Using Kerberos-Style Tickets.- Network Forensics on Packet Fingerprints.- Organizational Security Culture: More Than Just an End-User Phenomenon.-Value-Focused Assessment of Unformation Communication and Technology Security Awareness in an Academic Environment.- Practical Private Regular Expression Matching.