Security and privacy in dynamic environments:proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden

Saved in:
Bibliographic Details
Corporate Authors: IFIP TC11 International Information Security Conference (21st 2006 Karlstad, Sweden)
Group Author: Fischer-Hübner Simone.
Published: Springer,
Publisher Address: New York, N.Y.
Publication Dates: c2006.
Literature type: Book
Language: English
Series: International Federation for Information Processing (Series)
Subjects:
Carrier Form: xvi, 494 p.: ill. ; 25 cm.
ISBN: 038733405X (hb)
9780387334059 (hb)
Index Number: TP309
CLC: TP309-532
Call Number: TP309-532/I615-1/2006
Contents: Includes bibliographical references and index.
Improving availability of emergency health information without sacrificing patient privacy / Inger Anne Toøndel -- Ensuring privacy for buyer-seller e-commerce / George Yee, Larry Korba, Ronggong Song -- A general certification framework with applications to privacy-enhancing certificate infrastructures / Jan Camenisch, Dieter Sommer, Roger Zimmermann -- Authenticated query flooding in sensor networks / Zinaida Benenson ... [et al.] -- Identity based message authentication for dynamic networks / Pietro Michiardi and Refik Molva -- Providing authentication and access control in vehicular network environment / Hasnaa Moustafa, Gilles Bourdon and Yvon Gourhant -- A framework for Web services trust / Marijke Coetzee, Jan Eloff -- Trust: an element of security / Stephen Flowerday and Rossouw von Solms -- Security-by-ontology: a knowledge-centric approach / Bill Tsoumas ... [et al.] -- A methodology for designing controlled anonymous applications / Vincent Naessens and Bart De Decker -- Design options for privacy-respecting reputation systems within centralised Internet communities / Sandra Steinbrecher -- Protecting (anonymous) credentials with the trusted computing group's trusted platform modules V1.2 / Jan Camenisch -- Analysis and improvement of anti-phishing schemes / Dinei Florêncio and Cormac Herley -- CAT - a practical graph & SDL based toolkit for vulnerability assessment of 3G networks / Kameswari Kotapati, Peng Liu and Thomas F. LaPorta -- Protecting Web services from DOS attacks by SOAP message validation / Nils Gruschka and Norbert Luttenberger -- A flexible and distributed architecture to enforce dynamic access control -- Thierry Sans, Frédéric Cuppens and Nora Cuppens-Boulahia -- A paradigm for dynamic and decentralized administration of access control in workflow applications / Andreas Mattas, Ioannins Mavridis and Iason Pagkalos -- CAS++: an open source single sign-on solution for secure E-services / Claudio Agostino Ardagna ... [et al.] -- A synchronous multi-party contract signing protocol improving lower bound of steps / Jianying Zhou, Jose A. Onieva and Javier Lopez -- On the cryptographic key secrecy of the strengthened Yahalom protocol / Michael Backes and Birgit Pfuzmann -- Sealed-bid micro auctions / Kun Peng, Colin Boyd and Ed Dawson -- Detecting known and network intrusions / Yacine Bouzida and Frédéric Cuppens -- Evaluating classifiers for mobile-masquerader detection / Oleksiy Mazhelis, Seppo Puuronen and Mika Raento -- VisFlowCluster-IP: connectivity-based visual clustering of network hosts / Xiaoxin Yin, William Yurcik and Adam Slagell-- A usability study of security policy management / Almut Herzog and Nahid Shahmehri -- Considering the usability of end-user security software / Steven Furnell ... [et al.] -- Utilizing the common criteria for advanced student research projects / Thuy D. Nguyen and Cynthia E. Irvine -- On the relationship of privacy and secure remote logging in dynamic systems / Rafael Accorsi -- Privacy-preserving shared-additive-inverse protocols and their applications / Huafei Zhu, Tieyan Li and Feng Bao -- Click passwords / Darko Kirovski, Nebojša Jojić and Paul Roberts -- Cryptographically enforced personalized role-based access control / Milan Petković, Claudine Conrado and Malik Hammoutène -- Using VO concept for managing dynamic security associations / Yuri Demchenko, Leon Gommans and Cees de Laat -- Secure fast handover in an open broadband access network using Kerberos-style tickets / Martin Gilji Jaatun ... [et al.] -- Network forensics on packet fingerprints / Chia Yuan Cho ... [et al.] -- Oscar - file type identification of binary data in disk clusters and RAM pages / Martin Karresand and Nahid Shahmehri -- Organizational security culture: more than just an end-user phenomenon / Anthonie B. Ruighaver and Sean B. Maynard -- Cyber security training and awareness through game play / Benjamin D. Cone ... [et al] -- Internalisation of information security culture amongst employees through basic security knowledge / Omar Zakaria -- Bridging the gap between general management and technicians - a case study in ICT security / Jabiri Kuwe Bakari ... [et al.] -- Value-focused assessment of information communication and technology security awareness in an academic environment / Lynette Drevin, Hennie Kruger and Tjaart Steyn -- Using phishing for user email security awareness / Ronald C. Dodge and Aaron J. Ferguson -- Invited talk: anonymous credentials: opportunities and challenges / Jan Camenisch -- Practical private regular expression matching / Florian Kerschbaum -- A system for privacy-aware resource allocation and data processing in dynamic environments / Siani Pearson and Marco Casassa-Mont -- The APROB-channel: adaptive semi-real-time anonymous communication / Gergely Tóth, Zoltán Hornák.