Information Systems Security
Springer Berlin (Verlag)
978-3-540-30706-8 (ISBN)
Authorization and Trust Enhanced Security for Distributed Applications.- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies.- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.- Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the ICT Industry.- Auditable Anonymous Delegation.- A Robust Double Auction Protocol Based on a Hybrid Trust Model.- VTrust: A Trust Management System Based on a Vector Model of Trust.- Analysis and Modelling of Trust in Distributed Information Systems.- EPAL Based Privacy Enforcement Using ECA Rules.- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.- Protection of Relationships in XML Documents with the XML-BB Model.- EISA - An Enterprise Application Security Solution for Databases.- Event Detection in Multilevel Secure Active Databases.- Key Management for Multicast Fingerprinting.- A Key Reshuffling Scheme for Wireless Sensor Networks.- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks.- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks.- Detecting ARP Spoofing: An Active Technique.- Episode Based Masquerade Detection.- A Game-Theoretic Approach to Credit Card Fraud Detection.- Modifications of SHA-0 to Prevent Attacks.- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes.- On Broadcast Encryption with Random Key Pre-distribution Schemes.- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field.- SPEAR: Design of a Secured Peer-to-Peer Architecture.- A Web-Enabled EnterpriseSecurity Management Framework Based on a Unified Model of Enterprise Information System Security.- Development of a Comprehensive Intrusion Detection System - Challenges and Approaches.- A Transparent End-to-End Security Solution.
Erscheint lt. Verlag | 9.12.2005 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 342 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 233 mm |
Gewicht | 1110 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | authorization • boradcast encryption • Code • Distributed Computing • Dom • Extensible Markup Language (XML) • Fingerprinting • Identity • Information • Intrusion Detection • p2p computing • privacy • secure databases • secure services • security • sensor networks • spoofing detection • System Modeling • Trust • trust management • trust models • wireless networks |
ISBN-10 | 3-540-30706-0 / 3540307060 |
ISBN-13 | 978-3-540-30706-8 / 9783540307068 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich