Cargando…

Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Müller, Günter (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Security and Cryptology ; 3995
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Multilateral Security
  • Multilateral Security: Enabling Technologies and Their Evaluation
  • Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems
  • Security in Service-Oriented Computing
  • Optimized Workflow Authorization in Service Oriented Architectures
  • Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment
  • A P2P Content Authentication Protocol Based on Byzantine Agreement
  • Secure Mobile Applications
  • Transitive Trust in Mobile Scenarios
  • An Open, PKI-Based Mobile Payment System
  • Secure Rejoining Scheme for Dynamic Sensor Networks
  • Developing Provable Secure M-Commerce Applications
  • Enterprise Privacy
  • An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
  • Privacy-Preserving Decision Tree Mining Based on Random Substitutions
  • Privacy, Identity, and Anonymity
  • Policy-Based Integration of User and Provider-Sided Identity Management
  • Privacy with Delegation of Rights by Identity Management
  • A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System
  • Revocable Anonymity
  • Low Latency Anonymous Communication - How Long Are Users Willing to Wait?
  • Security Engineering
  • Security Engineering Using Problem Frames
  • SecTOOL - Supporting Requirements Engineering for Access Control
  • Possibilistic Information Flow Control in MAKS and Action Refinement
  • Toward a Framework for Forensic Analysis of Scanning Worms
  • A Comparison of Market Approaches to Software Vulnerability Disclosure
  • Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples
  • Security Policies
  • Allowing State Changes in Specifications
  • Field Access Analysis for Enforcing Access Control Policies
  • Controlling Access to Documents: A Formal Access Control Model
  • How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security
  • Security and Protocols
  • Secure End-to-End Transport over SCTP
  • An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information
  • Filtering for Private Collaborative Benchmarking
  • Intrusion Detection
  • On the Use of Word Networks to Mimicry Attack Detection
  • Simplifying Signature Engineering by Reuse
  • Redesign and Implementation of Evaluation Dataset for Intrusion Detection System
  • Requirements of Information Reductions for Cooperating Intrusion Detection Agents
  • Perspectives of Cryptographic Security
  • Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age
  • Kleptographic Attacks on E-Voting Schemes
  • Visual Document Authentication Using Human-Recognizable Watermarks.