Atnaujinkite slapukų nuostatas

El. knyga: Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings

Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 1820, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long history. This volume contains the papers selected for presentation at SEC 2009. In response to the call for papers, 176 papers were submitted to the conference. All of them were evaluated on the basis of their novelty and technical quality, and reviewed by at least two members of the conference Program Committee. Of the papers submitted, 39 were selected for presentation at the conference; the acceptance rate was as low as 22%, thus making the conference a highly competitive forum. It is the commitment of several people that makes international conferences pos- ble. That also holds true for SEC 2009. The list of people who volunteered their time and energy to help is really long.
Identification and Authentication I
Flexible and Transparent User Authentication for Mobile Devices
1(12)
Nathan Clarke
Sevasti Karatzouni
Steven Furnell
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable
13(12)
Amir Herzberg
Audio CAPTCHA for SIP-Based VoIP
25(14)
Yannis Soupionis
George Tountas
Dimitris Gritzalis
Threats and Attacks
Roving Bugnet: Distributed Surveillance Threat and Mitigation
39(12)
Ryan Farley
Xinyuan Wang
On Robust Covert Channels Inside DNS
51(12)
Lucas Nussbaum
Pierre Neyron
Olivier Richard
Discovering Application-Level Insider Attacks Using Symbolic Execution
63(13)
Karthik Pattabiraman
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar Iyer
Identification and Authentication II
Custom JPEG Quantization for Improved Iris Recognition Accuracy
76(11)
Gerald Stefan Kostmajer
Herbert Stogner
Andreas Uhl
On the IPP Properties of Reed-Solomon Codes
87(11)
Marcel Fernandez
Josep Cotrina
Miguel Soriano
Neus Domingo
A Generic Authentication LoA Derivation Model
98(11)
Li Yao
Ning Zhang
Applications of Cryptography and Information Hiding
Media-Break Resistant eSignatures in eGovernment: An Austrian Experience
109(10)
Herbert Leitold
Reinhard Posch
Thomas Rossler
How to Bootstrap Security for Ad-Hoc Network: Revisited
119(13)
Wook Shin
Carl A. Gunter
Shinsaku Kiyomoto
Kazuhide Fukushima
Toshiaki Tanaka
Steganalysis of Hydan
132(11)
Jorge Blasco
Julio C. Hernandez-Castro
Juan M. E. Tapiador
Arturo Ribagorda
Miguel A. Orellana-Quiros
Trusted Computing
On the Impossibility of Detecting Virtual Machine Monitors
143(9)
Shay Gueron
Jean-Pierre Seifert
Implementation of a Trusted Ticket System
152(12)
Andreas Leicher
Nicolai Kuntze
Andreas U. Schmidt
Security Policies
A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor
164(12)
Guillermo Navarro-Arribas
Joaquin Garcia-Alfaro
A Policy Language for Modelling Recommendations
176(14)
Anas Abou El Kalam
Philippe Balbiani
Validation, Verification, Evaluation
On the Security Validation of Integrated Security Solutions
190(12)
Andreas Fuchs
Sigrid Gurgens
Carsten Rudolph
Verification of Security Policy Enforcement in Enterprise Systems
202(12)
Puneet Gupta
Scott D. Stoller
Optimization of the Controlled Evaluation of Closed Relational Queries
214(12)
Joachim Biskup
Jan-Hendrik Lochner
Sebastian Sonntag
Privacy Protection - Security Assessment
Collaborative Privacy - A Community-Based Privacy Infrastructure
226(11)
Jan Kolter
Thomas Kernchen
Gunther Pernul
Security and Privacy Improvements for the Belgian eID Technology
237(11)
Pieter Verhaeghe
Jorn Lapon
Bart De Decker
Vincent Naessens
Kristof Verslype
A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components
248(11)
Thomas Brandstetter
Konstantin Knorr
Ute Rosenbaum
Role Mining and Content Protection
Mining Stable Roles in RBAC
259(11)
Alessandro Colantonio
Roberto Di Pietro
Alberto Ocello
Nino Vincenzo Verde
Privacy-Preserving Content-Based Publish/Subscribe Networks
270(13)
Abdullatif Shikfa
Melek Onen
Refik Molva
Broadcast Encryption for Differently Privileged
283(11)
Hongxia Jin
Jeffery Lotspiech
Ontology-Based Secure XML Content Distribution
294(13)
Mohammad Ashiqur Rahaman
Yves Roudier
Philip Miseldine
Andreas Schaad
Security Protocols
NGBPA Next Generation BotNet Protocol Analysis
307(11)
Felix S. Leder
Peter Martini
Non-repudiation Analysis with LYSA
318(12)
Mayla Bruso
Agostino Cortesi
A Provably Secure Secret Handshake with Dynamic Controlled Matching
330(12)
Alessandro Sorniotti
Refik Molva
Towards a Theory of White-Box Security
342(11)
Amir Herzberg
Haya Shulman
Amitabh Saxena
Bruno Crispo
Access Control
On a Taxonomy of Delegation
353(11)
Quan Pham
Jason Reid
Adrian McCullagh
Ed Dawson
Efficient Key Management for Enforcing Access Control in Outsourced Seenarios
364(12)
Carlo Blundo
Stelvio Cimato
Sabrina De Capitani di Vimercati
Alfredo De Santis
Sara Foresti
Stefano Paraboschi
Pierangela Samarati
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications
376(11)
Alessandro Colantonio
Roberto Di Pietro
Alberto Ocello
Nino Vincenzo Verde
Automating Access Control Logics in Simple Type Theory with LEO-II
387(12)
Christoph Benzmuller
Internet and Web Applications Security
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security
399(11)
Yianna Danidou
Burkhard Schafer
Persona: Network Layer Anonymity and Accountability for Next Generation Internet
410(11)
Yannis Mallios
Sudeep Modi
Aditya Agarwala
Christina Johns
Jason: A Scalable Reputation System for the Semantic Web
421(11)
Sandra Steinbrecher
Stephan Grob
Markus Meichau
Which Web Browsers Process SSL Certificates in a Standardized Way?
432(11)
Ahmad Samer Wazan
Romain Laborde
David W. Chadwick
Francois Barrere
AbdelMalek Benzekri
Author Index 443