Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings

Overview

This book constitutes the refereed proceedings of the Infrastructure Security Conference, InfraSec 2002, held in Bristol, UK in October 2002.
The 23 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on biometrics; identification, authentication, and process; analysis process; mobile networks; vulnerability assessment and logs; systems design; formal methods; ...

See more details below
Paperback (2002)
$75.80
BN.com price
(Save 23%)$99.00 List Price
Other sellers (Paperback)
  • All (6) from $19.89   
  • New (3) from $73.66   
  • Used (3) from $19.89   
Sending request ...

Overview

This book constitutes the refereed proceedings of the Infrastructure Security Conference, InfraSec 2002, held in Bristol, UK in October 2002.
The 23 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on biometrics; identification, authentication, and process; analysis process; mobile networks; vulnerability assessment and logs; systems design; formal methods; cryptographic techniques, and networks.

Read More Show Less

Product Details

  • ISBN-13: 9783540443094
  • Publisher: Springer Berlin Heidelberg
  • Publication date: 11/11/2002
  • Series: Lecture Notes in Computer Science Series , #2437
  • Edition description: 2002
  • Edition number: 1
  • Pages: 340
  • Product dimensions: 9.21 (w) x 6.14 (h) x 0.74 (d)

Table of Contents

Biometrics.- Biometric Authentication in Infrastructure Security.- Denial of Access in Biometrics-Based Authentication Systems.- Identification, Authentication, and Process.- A Novel Approach to Proactive Password Checking.- Single Sign-On Architectures.- Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information.- Analysis Process.- How to Buy Better Testing Using Competition to Get the Most Security and Robustness for Your Dollar.- Structured Risk Analysis.- A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls.- Mobile Networks.- Authentication and Authorization of Mobile Clients in Public Data Networks.- A Contemporary Foreword on GSM Security.- Vulnerability Assessment and Logs.- Vulnerability Assessment Simulation for Information Infrastructure Protection.- Pseudonymizing Unix Log Files.- System Design.- DPS: An Architectural Style for Development of Secure Software.- A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping.- Different Smartcard-Based Approaches to Physical Access Control.- Formal Methods.- Authenticity and Provability — A Formal Framework.- Prool Engineering Applied to Formal Analysis of Security Systems.- Cryptographic Techniques.- Applications of Multiple Trust Authorities in Pairing Based Cryptosystems.- Plausible Deniability Using Automated Linguistic Stegonagraphy.- Virtual Software Tokens - A Practical Way to Secure PKI Roaming.- Bit-Serial AOP Arithmetic Architectures over GF(2m).- Networks.- A Practical Distributed Authorization System for GARA.- Design of a VPN Software Solution Integrating TCP and UDP Services.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)