- Format
- Häftad (Paperback / softback)
- Språk
- Engelska
- Antal sidor
- 494
- Utgivningsdatum
- 2010-11-19
- Upplaga
- Softcover reprint of hardcover 1st ed. 2006
- Förlag
- Springer-Verlag New York Inc.
- Medarbetare
- Fischer-Hübner, Simone (ed.), Lindskog, Stefan (ed.), Yngström, Louise (ed.), Rannenberg, Kai (ed.)
- Illustrationer
- XVI, 494 p.
- Dimensioner
- 234 x 156 x 26 mm
- Vikt
- Antal komponenter
- 1
- Komponenter
- 1 Paperback / softback
- ISBN
- 9781441941275
- 708 g
Du kanske gillar
-
Halo Encyclopedia
Microsoft
InbundenReality+
David J Chalmers
InbundenSecurity and Privacy in Dynamic Environments
Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
1829- Skickas inom 10-15 vardagar.
- Gratis frakt inom Sverige över 199 kr för privatpersoner.
Finns även somPassar bra ihop
De som köpt den här boken har ofta också köpt Clean Code: A Handbook Of Agile Software Crafts... av Robert C Martin (häftad).
Köp båda 2 för 2183 krKundrecensioner
Har du läst boken? Sätt ditt betyg »Fler böcker av författarna
-
Kvittning : om avräkning av privaträttsliga fordringar
Stefan Lindskog
-
Festskrift till Jan Kleineman
Stefan Lindskog
Innehållsförteckning
Privacy and Privacy-Enhancing Technologies I.- Improving Availability of Emergency Health Information without Sacrificing Patient Privacy.- Ensuring Privacy for Buyer-Seller E-Commerce.- A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures.- Security in Mobile and Ad Hoc Networks.- Authenticated Query Flooding in Sensor Networks.- Identity Based Message Authentication for Dynamic Networks.- Providing Authentication and Access Control in Vehicular Network Environment.- Trust and Security Management.- A Framework for Web Services Trust.- Trust: An Element of Information Security.- Security-by-Ontology: A Knowledge-Centric Approach.- Privacy Enhancing Technologies II.- A Methodology for Designing Controlled Anonymous Applications.- Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities.- Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2.- Attacks, Vulnerability Analysis, and Tools.- Analysis and Improvement of Anti-Phishing Schemes.- CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks.- Protecting Web Services from DoS Attacks by SOAP Message Validation.- Access Control and Authentication I.- A Flexible and Distributed Architecture to Enforce Dynamic Access Control.- A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications.- CAS++: An Open Source Single Sign-On Solution for Secure e-Services.- Security Protocols.- A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.- On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.- Sealed-Bid Micro Auctions.- Intrusion Detection.- Detecting Known and Novel Network Intrusions.- Evaluating Classifiers for Mobile-Masquerader Detection.- VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts.- Usability and Awareness.- A Usability Study of Security Policy Management.- Considering the Usability of End-User Security Software.- Utilizing the Common Criteria for Advanced Student Research Projects.- Privacy Enhancing Technologies III.- On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems.- Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications.- Access Control and Authentication II.- Click Passwords.- Cryptographically Enforced Personalized Role-Based Access Control.- Access Control and Authentication III.- Using VO Concept for Managing Dynamic Security Associations.- Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets.- Forensics.- Network Forensics on Packet Fingerprints.- Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages.- IFIP WG 11.1/11.8 Security Culture Workshop.- Organizational Security Culture: More Than Just an End-User Phenomenon.- Cyber Security Training and Awareness Through Game Play.- Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge.- Bridging the Gap between General Management and Technicians - A Case Study in ICT Security.- Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment.- Using Phishing for User Email Security Awareness.- IFIP WG 11.4 I-NetSec'06 Workshop.- Anonymous Credentials: Opportunities and Challenges.- Practical Private Regular Expression Matching.- A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments.- The APROB Channel: Adaptive Semi-Real-Time Anonymous Communication.