Advances in Information Security and Its Application
Springer Berlin (Verlag)
978-3-642-02632-4 (ISBN)
Information Assurance and Its Application.- Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections.- A Security Metrics Development Method for Software Intensive Systems.- The ISDF Framework: Integrating Security Patterns and Best Practices.- Security Protocol and Its Application.- Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server.- Concurrency and Time in Role-Based Access Control.- Performance Assessment Method for a Forged Fingerprint Detection Algorithm.- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings.- A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes.- Context-Based E-Health System Access Control Mechanism.- Analysis of a Mathematical Model for Worm Virus Propagation.- Other Security Research.- A Contents Encryption Mechanism Using Reused Key in IPTV.- High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform.- Experiment Research of Automatic Deception Model Based on Autonomic Computing.- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks.- Reconsidering Data Logging in Light of Digital Forensics.- Blurriness in Live Forensics: An Introduction.
From the reviews:
"The proceedings of the Third International Conference on Advances in Information Security and its Applications (ISA) present 16 papers that are related to the multifaceted aspects of information security and assurance. ... This book will be useful to both information technology (IT) security researchers and practitioners. ... It is well written and easy to understand, and the author provides experimental results that support the design. ... suitable for researchers, graduate students (as a reference), and engineers (for self-study)." (Zheng Gong, ACM Computing Reviews, October, 2009)
Erscheint lt. Verlag | 9.6.2009 |
---|---|
Reihe/Serie | Communications in Computer and Information Science |
Zusatzinfo | X, 127 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 225 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Schlagworte | authentication • autonomic computing • Cryptographic Hardware • data hiding • Data Security • digital forensics • E-Health • fingerprint detection • Firewall • Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke • hardware token • IPTV • ISDF • Key exchange • Manet • Networks • role-based access • security • security metrics • security patterns • virus propagation • Worm |
ISBN-10 | 3-642-02632-X / 364202632X |
ISBN-13 | 978-3-642-02632-4 / 9783642026324 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich