Trusted Information
Springer-Verlag New York Inc.
978-1-4757-7536-5 (ISBN)
eSociety.- PyTHIA: Towards Anonymity in Authentication.- Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?.- Internet Anonymity: Problems and Solutions.- TTP Management and PKI.- Reducing Certificate Revocation Cost using NPKI.- The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems.- Smart Card.- Is the Performance of Smart Card Crytographic Functions the Real Bottleneck?.- Modelling Audit Security for Smart-Card Payment Schemes with UML-Sec.- Security Protocols.- Strong Forward Security.- Secret Sharing and Visual Cryptography Schemes.- A Two-level Time-Stamping System.- Security Analysis of the Cliques Protocols Suites: First Results.- Secure Workflow Environment.- A Secure Workflow System for Dynamic Collaboration.- On Securely Scheduling a Meeting.- Modeling and Analyzing Separation of Duties in Workflow Environments.- Secure Group Communications.- Group Security Association (GSA) Management in IP Multicast.- Communication-Efficient Group Key Agreement.- Security Policies.- Going Beyond MAC and DAC Using Mobile Policies.- An Access Control Model for Data Archives.- Risk Management.- Checklist-Based Risk Analysis with Evidential Reasoning.- Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis.- The Security Model to Combine the Corporate and Information Security.- Design Criteria to Classified Information Systems Numerically.- Network Security and Intrusion Detection.- Deception: A Tool and Curse for Security Management.- A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection.- ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection.- Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.- Trusted Platforms.- An Efficient Software Protection Scheme.- Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs.- Trusted System Design and Management.- Security Concerns for Contemporary Development Practices.- A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS.- Redefining Information Systems Security: Viable Information Systems.- Extended Description Techniques for Security Engineering.
Erscheint lt. Verlag | 23.3.2013 |
---|---|
Reihe/Serie | IFIP International Federation for Information Processing ; 65 |
Zusatzinfo | XVIII, 490 p. |
Verlagsort | New York, NY |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Office Programme ► Outlook |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Mathematik / Informatik ► Mathematik ► Finanz- / Wirtschaftsmathematik | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
ISBN-10 | 1-4757-7536-9 / 1475775369 |
ISBN-13 | 978-1-4757-7536-5 / 9781475775365 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich