000 07091nam a22006855i 4500
001 978-3-540-31979-5
003 DE-He213
005 20240730182050.0
007 cr nn 008mamaa
008 100630s2005 gw | s |||| 0|eng d
020 _a9783540319795
_9978-3-540-31979-5
024 7 _a10.1007/b107167
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aInformation Security Practice and Experience
_h[electronic resource] :
_bFirst International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings /
_cedited by Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou.
250 _a1st ed. 2005.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2005.
300 _aXII, 428 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v3439
505 0 _aNetwork Security -- Risk Assessment of Production Networks Using Honeynets - Some Practical Experience -- POSSET - Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation -- Tracing Traitors by Guessing Secrets. The q-Ary Case -- Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications -- Countermeasures for Preventing Comb Method Against SCA Attacks -- Secure Architecture I -- An Email Worm Vaccine Architecture -- Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model -- Security On-demand Architecture with Multiple Modules Support -- Measuring Resistance to Social Engineering -- Access Control -- Conformance Checking of RBAC Policy and its Implementation -- A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications -- A Task-Oriented Access Control Model for WfMS -- Intrusion Detection -- A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection -- Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks -- Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures -- Model Redundancy vs. Intrusion Detection -- Applications and Case Studies -- An Open Approach for Designing Secure Electronic Immobilizers -- An Empirical Study on the Usability of Logout in a Single Sign-on System -- Secure Software Delivery and Installation in Embedded Systems -- A Restricted Multi-show Credential System and Its Application on E-Voting -- Secure ArchitectureII -- Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks -- Using Trust for Restricted Delegation in Grid Environments -- Computer Vulnerability Evaluation Using Fault Tree Analysis -- An Identity-Based Grid Security Infrastructure Model -- Data Security -- Towards Multilateral-Secure DRM Platforms -- Hiding Data in Binary Images -- Performance Analysis of CDMA-Based Watermarking with Quantization Scheme -- Protecting Mass Data Basing on Small Trusted Agent -- Cryptographic Techniques II -- On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes -- Token-Controlled Public Key Encryption -- A New Class of Codes for Fingerprinting Schemes -- t-Out-of-n String/Bit Oblivious Transfers Revisited.
520 _aThe inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in runningthe conference.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aOperating systems (Computers).
_95329
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic data processing
_xManagement.
_9127138
650 0 _aInformation storage and retrieval systems.
_922213
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9127139
650 2 4 _aOperating Systems.
_937074
650 2 4 _aComputers and Society.
_931668
650 2 4 _aIT Operations.
_931703
650 2 4 _aInformation Storage and Retrieval.
_923927
700 1 _aDeng, Robert H.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9127140
700 1 _aBao, Feng.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9127141
700 1 _aPang, HweeHwa.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9127142
700 1 _aZhou, Jianying.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9127143
710 2 _aSpringerLink (Online service)
_9127144
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540255840
776 0 8 _iPrinted edition:
_z9783540809944
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v3439
_9127145
856 4 0 _uhttps://doi.org/10.1007/b107167
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c91214
_d91214