Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Advances in Information Security and Its Application

Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
Buch | Softcover
X, 127 Seiten
2009 | 2009
Springer Berlin (Verlag)
978-3-642-02632-4 (ISBN)

Lese- und Medienproben

Advances in Information Security and Its Application -
CHF 74,85 inkl. MwSt
Welcome to the Third International Conference on Information Security and Ass- ance (ISA 2009). ISA 2009 was the most comprehensive conference focused on the various aspects of advances in information security and assurance. The concept of security and assurance is emerging rapidly as an exciting new paradigm to provide reliable and safe life services. Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. ISA 2009 was a succ- sor of the First International Workshop on Information Assurance in Networks (IAN 2007, Jeju-island, Korea, December, 2007), and the Second International Conference on Information Security and Assurance (ISA 2008, Busan, Korea, April 2008). The goal of this conference is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of information technology. ISA 2009 contained research papers submitted by researchers from all over the world. In order to guarantee high-quality proceedings, we put extensive effort into reviewing the papers. All submissions were peer reviewed by at least three Program Committee members as well as external reviewers. As the quality of the submissions was quite high, it was extremely difficult to select the papers for oral presentation and publication in the proceedings of the conference.

Information Assurance and Its Application.- Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections.- A Security Metrics Development Method for Software Intensive Systems.- The ISDF Framework: Integrating Security Patterns and Best Practices.- Security Protocol and Its Application.- Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server.- Concurrency and Time in Role-Based Access Control.- Performance Assessment Method for a Forged Fingerprint Detection Algorithm.- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings.- A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes.- Context-Based E-Health System Access Control Mechanism.- Analysis of a Mathematical Model for Worm Virus Propagation.- Other Security Research.- A Contents Encryption Mechanism Using Reused Key in IPTV.- High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform.- Experiment Research of Automatic Deception Model Based on Autonomic Computing.- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks.- Reconsidering Data Logging in Light of Digital Forensics.- Blurriness in Live Forensics: An Introduction.

From the reviews:

"The proceedings of the Third International Conference on Advances in Information Security and its Applications (ISA) present 16 papers that are related to the multifaceted aspects of information security and assurance. ... This book will be useful to both information technology (IT) security researchers and practitioners. ... It is well written and easy to understand, and the author provides experimental results that support the design. ... suitable for researchers, graduate students (as a reference), and engineers (for self-study)." (Zheng Gong, ACM Computing Reviews, October, 2009)

Erscheint lt. Verlag 9.6.2009
Reihe/Serie Communications in Computer and Information Science
Zusatzinfo X, 127 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 225 g
Themenwelt Mathematik / Informatik Informatik Netzwerke
Schlagworte authentication • autonomic computing • Cryptographic Hardware • data hiding • Data Security • digital forensics • E-Health • fingerprint detection • Firewall • Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke • hardware token • IPTV • ISDF • Key exchange • Manet • Networks • role-based access • security • security metrics • security patterns • virus propagation • Worm
ISBN-10 3-642-02632-X / 364202632X
ISBN-13 978-3-642-02632-4 / 9783642026324
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
das umfassende Handbuch für den Einstieg in die Netzwerktechnik

von Martin Linten; Axel Schemberg; Kai Surendorf

Buch | Hardcover (2023)
Rheinwerk (Verlag)
CHF 41,85
das Praxisbuch für Admins und DevOps-Teams

von Michael Kofler

Buch | Hardcover (2023)
Rheinwerk (Verlag)
CHF 55,85