The Resource 2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks : SECURECOMM : Athens, Greece, 5-9 September, 2005

2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks : SECURECOMM : Athens, Greece, 5-9 September, 2005

Label
2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks : SECURECOMM : Athens, Greece, 5-9 September, 2005
Title
2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks
Title remainder
SECURECOMM : Athens, Greece, 5-9 September, 2005
Title variation
  • 2005 Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks
  • SECURECOMM
  • Security and Privacy for Emerging Areas in Communication Networks, 2005. Workshop of the 1st International Conference on
Creator
Subject
Genre
Language
eng
Summary
Proceedings of workshops held in conjunction with the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, held in Athens, Greece, Sept. 5-9, 2005
Member of
Cataloging source
UAB
Illustrations
illustrations
Index
index present
Language note
English
LC call number
TK5103.2
LC item number
.I5199 2005a
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2005
http://bibfra.me/vocab/lite/meetingName
International Conference on Security and Privacy for Emerging Areas in Communications Networks
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/subjectName
  • Wireless communication systems
  • Computer networks
  • Computer crimes
  • Data protection
  • Privacy, Right of
  • Computer crimes
  • Computer networks
  • Data protection
  • Privacy, Right of
  • Wireless communication systems
http://bibfra.me/vocab/relation/workshop
zpa_djL_B-I
Label
2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks : SECURECOMM : Athens, Greece, 5-9 September, 2005
Instantiates
Publication
Note
  • "IEEE Catalog Number: 05EX1200."
  • "Computer Network Forensics Research Workshop 2005, Defining Network Forensics"--Page 1
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Machine derived contents note: Computer Network Forensics Research W orkshop 2005 1 -- Message From Workshop Chair(s) -- M odelig the Network Forensis Behavior 3 -- Wet Ren, Hai Jin -- Network Forensics: Towards a classifcation of traceback mechanisms -- Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris -- EAKAGE OF CLASSIFIED INFOR TION BY MAIL: A CASE STUDY 19 -- SMurilo Tro Pereira -- Cyberprfiling: Offender Profiling and Geographic Prfilng of Crime on the Internet 23 -- Etr Ing Brian CC Tompsett, Angus M. Marshall and Natasha C Senmens -- Investigating Real-Tim eSystem Forensics 27 -- Joseph C. Srenack -- Trusted Inernet Forensics: desgn ofa network forensis appliance 35 -- D. Brsc/i, AM fonga, E. Rosti -- Sharing Network Logs for Computer Forensics: A New Tool for the Anonymization of NetFlow Records 38 -- Adam iJ Slage, Y ifan Li and Katherine L o -- SECOVAL: The IEEECREATE-NET Workshop on the Value of Securit through Collaboration 44 -- ean-Marc Seigineur, Piotr Cota Stephen Alarsh -- Towards Evidence-based Trust rokering 46 -- Dong Hang, r S/hane Bracher -- Social approaches to trust-building in web technologies 5 54 -- Fil/ippo U/iieri -- Privacy in Distributed Reputat n M anagement 64 -- Aatri lilta, Yki Kort esnie mi -- Privacy Preserving Ubiquitous Service Provisioning Based on Bayesian Network Conversion 73 -- Hiiroyuki KAsai Watari Uchida, Sh7oji Kurakake -- Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of -- A nonym iza on 3 -- Adam Slagel, illiamn Yurcik -- EstablishingAgreements D namicVirtual Organizat s 93 -- Ta, ana Ryautoa Clifford Neunman, Li Zhou, Noria Foukia -- Towards Ubiquitous Cooperative Security 103 -- Philip Robinson -- Demonstration of Securitythrough Collaboration in the Digital Business Ecosystem 111 -- Jeau-Marc Seigneur -- Tailored Trustworthiness Estimations in Peer-to-Peer Networks 113 -- Katri Y1/italo Silke Hotrmanns -- A Comprehensive Repution-Based Trust Model for Distributed Systems 119 -- Ayman lareddine, Ayman Kassi, Alt Chehab, Hassan Artail -- Computational complexityof one reputatonmetric 29 -- Victor S. Grishchenko -- Performance evalation of a selfevoing trus building framework 135 -- GianniosF c ass Tsetsos, OaYsseas Sekkas Panagiotis Georgiadis -- Reasoning about Trust Groups to Coordinate Mobile Ad-Hoc Systems 145 -- Licia Capra -- A Context-aware Trust-based Security System for Ad Hoc Networks 5 55 -- Maria Moloney, Stefan Weber -- Security and Quality of Service in Communication Networks l 162 -- Message from the workshop chairs: enye Wang and Cristina Costa -- Securty A ys and Soutions for epoying P Telephony in the Critical fr ctre 164 -- Feng Cao, Saadat Maiik -- A Pocybase Approach to ireless LAN Security Management 74 -- George Lapiotis, Byungsuk Kin, Subir Das and Farooq Anjum -- A Security Framework with Trust Management for Sensor Networks 183 -- Zhiyjing Yao, Daeyoung Kin Insun Lee, Kiyoung Kin, Jongsoo Jang -- Trust, the "Wisdom of Crowds", and Societa Norms: the Creatio, Mintenance, and Reasoning about -- Trust in Peer Networks 192 -- Fernando C. Con Osorio and Justin Whitney -- Caching Alternatives for a MNET-Oriented OCSP Scheme 202 -- C.F. Marias, K. Pappanpaagiotou, P. Georgiadis -- Full Agreem ent in BAN K erberos 2 11 -- Aybek Mnutkhamedov -- Advancd Authentication and Authorization for Qualit of Servce Signaling 217 -- Tseno Tsenov, Hannes eTchofenig, Xiaoming Fu. Eckhart Korner -- Vuerabiities in SOHO VoP Gateways 229 -- Peter Thermos and Guy Hadsall -- Preventing Theft of Quaity of Service on Open Platforms .3 239 -- Kwain gHyun Baek and Sean W. Smith -- Design and mpmentation of a Tunab Ecrypton Service for Networked Applications -- Stefan Lindskog and Anna Brunstronm -- Next Generation Communications and Secure Seamless Handover 260 -- Anand RP Prasad A/f Zugenmaier, and Peter Schoo -- Comparison of security protocos in Mobile Wireless Environments: Tradeoffs between eve of security -- btained and battery life 268 -- Fernando C. Coln Osorio, Kerry M iKay and Emmanuel Agu -- New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks 281 -- DIamenl Djenour, Nadjib Badaehe -- FrDA-SSL: Experiments with securing ommunication PANs 288 -- Diana Berbecaru -- Trust and Security in Pervasive Networking (pervasivetrust 2005) 299 -- Message from the workshop Chair: Dr Sathya Rao
Control code
77270749
Dimensions
unknown
Extent
1 online resource (iv, 300, 2 pages)
File format
unknown
Form of item
online
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)77270749
Label
2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks : SECURECOMM : Athens, Greece, 5-9 September, 2005
Publication
Note
  • "IEEE Catalog Number: 05EX1200."
  • "Computer Network Forensics Research Workshop 2005, Defining Network Forensics"--Page 1
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Machine derived contents note: Computer Network Forensics Research W orkshop 2005 1 -- Message From Workshop Chair(s) -- M odelig the Network Forensis Behavior 3 -- Wet Ren, Hai Jin -- Network Forensics: Towards a classifcation of traceback mechanisms -- Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris -- EAKAGE OF CLASSIFIED INFOR TION BY MAIL: A CASE STUDY 19 -- SMurilo Tro Pereira -- Cyberprfiling: Offender Profiling and Geographic Prfilng of Crime on the Internet 23 -- Etr Ing Brian CC Tompsett, Angus M. Marshall and Natasha C Senmens -- Investigating Real-Tim eSystem Forensics 27 -- Joseph C. Srenack -- Trusted Inernet Forensics: desgn ofa network forensis appliance 35 -- D. Brsc/i, AM fonga, E. Rosti -- Sharing Network Logs for Computer Forensics: A New Tool for the Anonymization of NetFlow Records 38 -- Adam iJ Slage, Y ifan Li and Katherine L o -- SECOVAL: The IEEECREATE-NET Workshop on the Value of Securit through Collaboration 44 -- ean-Marc Seigineur, Piotr Cota Stephen Alarsh -- Towards Evidence-based Trust rokering 46 -- Dong Hang, r S/hane Bracher -- Social approaches to trust-building in web technologies 5 54 -- Fil/ippo U/iieri -- Privacy in Distributed Reputat n M anagement 64 -- Aatri lilta, Yki Kort esnie mi -- Privacy Preserving Ubiquitous Service Provisioning Based on Bayesian Network Conversion 73 -- Hiiroyuki KAsai Watari Uchida, Sh7oji Kurakake -- Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of -- A nonym iza on 3 -- Adam Slagel, illiamn Yurcik -- EstablishingAgreements D namicVirtual Organizat s 93 -- Ta, ana Ryautoa Clifford Neunman, Li Zhou, Noria Foukia -- Towards Ubiquitous Cooperative Security 103 -- Philip Robinson -- Demonstration of Securitythrough Collaboration in the Digital Business Ecosystem 111 -- Jeau-Marc Seigneur -- Tailored Trustworthiness Estimations in Peer-to-Peer Networks 113 -- Katri Y1/italo Silke Hotrmanns -- A Comprehensive Repution-Based Trust Model for Distributed Systems 119 -- Ayman lareddine, Ayman Kassi, Alt Chehab, Hassan Artail -- Computational complexityof one reputatonmetric 29 -- Victor S. Grishchenko -- Performance evalation of a selfevoing trus building framework 135 -- GianniosF c ass Tsetsos, OaYsseas Sekkas Panagiotis Georgiadis -- Reasoning about Trust Groups to Coordinate Mobile Ad-Hoc Systems 145 -- Licia Capra -- A Context-aware Trust-based Security System for Ad Hoc Networks 5 55 -- Maria Moloney, Stefan Weber -- Security and Quality of Service in Communication Networks l 162 -- Message from the workshop chairs: enye Wang and Cristina Costa -- Securty A ys and Soutions for epoying P Telephony in the Critical fr ctre 164 -- Feng Cao, Saadat Maiik -- A Pocybase Approach to ireless LAN Security Management 74 -- George Lapiotis, Byungsuk Kin, Subir Das and Farooq Anjum -- A Security Framework with Trust Management for Sensor Networks 183 -- Zhiyjing Yao, Daeyoung Kin Insun Lee, Kiyoung Kin, Jongsoo Jang -- Trust, the "Wisdom of Crowds", and Societa Norms: the Creatio, Mintenance, and Reasoning about -- Trust in Peer Networks 192 -- Fernando C. Con Osorio and Justin Whitney -- Caching Alternatives for a MNET-Oriented OCSP Scheme 202 -- C.F. Marias, K. Pappanpaagiotou, P. Georgiadis -- Full Agreem ent in BAN K erberos 2 11 -- Aybek Mnutkhamedov -- Advancd Authentication and Authorization for Qualit of Servce Signaling 217 -- Tseno Tsenov, Hannes eTchofenig, Xiaoming Fu. Eckhart Korner -- Vuerabiities in SOHO VoP Gateways 229 -- Peter Thermos and Guy Hadsall -- Preventing Theft of Quaity of Service on Open Platforms .3 239 -- Kwain gHyun Baek and Sean W. Smith -- Design and mpmentation of a Tunab Ecrypton Service for Networked Applications -- Stefan Lindskog and Anna Brunstronm -- Next Generation Communications and Secure Seamless Handover 260 -- Anand RP Prasad A/f Zugenmaier, and Peter Schoo -- Comparison of security protocos in Mobile Wireless Environments: Tradeoffs between eve of security -- btained and battery life 268 -- Fernando C. Coln Osorio, Kerry M iKay and Emmanuel Agu -- New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks 281 -- DIamenl Djenour, Nadjib Badaehe -- FrDA-SSL: Experiments with securing ommunication PANs 288 -- Diana Berbecaru -- Trust and Security in Pervasive Networking (pervasivetrust 2005) 299 -- Message from the workshop Chair: Dr Sathya Rao
Control code
77270749
Dimensions
unknown
Extent
1 online resource (iv, 300, 2 pages)
File format
unknown
Form of item
online
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)77270749

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...