Trusted Information: The New Decade Challenge

Overview

Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec?01 is the first of this decade (and century) and it will be devoted to ?Trusted Information - the New Decade Challenge? This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies:...

See more details below
Hardcover (2001)
$268.53
BN.com price
(Save 15%)$319.00 List Price
Other sellers (Hardcover)
  • All (4) from $234.63   
  • New (4) from $234.63   
Sending request ...

Overview

Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec’01 is the first of this decade (and century) and it will be devoted to “Trusted Information - the New Decade Challenge” This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Prools, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management. The year 2001 is a double anniversary. First, fifteen years ago, the first IFIP/Sec was held in France (IFIP/Sec’86, Monte-Carlo) and 2001 is also the anniversary of smart card technology. Smart cards emerged some twenty years ago as an innovation and have now become pervasive information devices used for highly distributed secure applications. These cards let millions of people carry a highly secure device that can represent them on a variety of networks. To conclude, we hope that the rich “menu” of conference papers for this IFIP/Sec conference will provide valuable insights and encourage specialists to pursue their work in trusted information.

Read More Show Less

Product Details

Table of Contents

Preface
IFIP/Sec'01 Conference Committees
Pt. 1 eSociety
1 PyTHIA: Towards Anonymity in Authentication 1
2 Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? 19
3 Internet Anonymity: Problems and Solutions 35
Pt. 2 TTP Management and PKI
4 Reducing Certificate Revocation Cost using NPKI 51
5 The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems 61
Pt. 3 Smart Card
6 Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? 77
7 Modelling Audit Security for Smart-Card Payment Schemes with UML-SEC 93
Pt. 4 Security Protocols
8 Strong Forward Security 109
9 Secret Sharing and Visual Cryptography Schemes 123
10 A Two-level Time-Stamping System 139
11 Security Analysis of the Cliques Protocols Suites: First Results 151
Pt. 5 Secure Workflow Environment
12 A Secure Workflow System for Dynamic Collaboration 167
13 On Securely Scheduling a Meeting 183
14 Modeling and Analyzing Separation of Duties in Workflow Environments 199
Pt. 6 Secure Group Communications
15 Group Security Association (GSA) Management in IP Multicast 213
16 Communication-Efficient Group Key Agreement 229
Pt. 7 Security Policies
17 Going Beyond MAC and DAC Using Mobile Policies 245
18 An Access Control Model for Data Archives 261
Pt. 8 Risk Management
19 Checklist-Based Risk Analysis with Evidential Reasoning 277
20 Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis 293
21 The Security of Model to Combine the Corporate and Information Security 305
22 Design Criteria to Classified Information Systems Numerically 317
Pt. 9 Network Security and Intrusion Detection
23 Deception: A Tool and Curse for Security Management 327
24 A Methodology of Detect Temporal Regularities in User Behavior for Anomaly Detection 339
25 ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection 353
26 Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework 369
Pt. 10 Trusted Platforms
27 An Efficient Software Protection Scheme 385
28 Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs 403
Pt. 11 Trusted System Design and Management
29 Security Concerns for Contemporary Development Practices: A Case Study 421
30 A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS 437
31 Redefining Information Systems Security: Viable Information Systems 453
32 Extended Description Techniques for Security Engineering 469
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)