The Resource Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.)
Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.)
Resource Information
The item Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Edition
- 1st ed.
- Extent
- 1 online resource (xii, 424 pages)
- Contents
-
- Network Security
- Risk Assessment of Production Networks Using Honeynets
- Some Practical Experience
- POSSET
- Policy-Driven Secure Session Transfer
- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach
- Robust Routing in Malicious Environment for Ad Hoc Networks
- Cryptographic Techniques I
- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
- Tracing Traitors by Guessing Secrets. The q-Ary Case
- Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications
- Countermeasures for Preventing Comb Method Against SCA Attacks
- Secure Architecture I
- An Email Worm Vaccine Architecture
- Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model
- Security On-demand Architecture with Multiple Modules Support
- Measuring Resistance to Social Engineering
- Access Control
- Conformance Checking of RBAC Policy and its Implementation
- A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications
- A Task-Oriented Access Control Model for WfMS
- Intrusion Detection
- A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection
- Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks
- Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
- Model Redundancy vs. Intrusion Detection
- Applications and Case Studies
- An Open Approach for Designing Secure Electronic Immobilizers
- An Empirical Study on the Usability of Logout in a Single Sign-on System
- Secure Software Delivery and Installation in Embedded Systems
- A Restricted Multi-show Credential System and Its Application on E-Voting
- Secure Architecture II
- Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks
- Using Trust for Restricted Delegation in Grid Environments
- Computer Vulnerability Evaluation Using Fault Tree Analysis
- An Identity-Based Grid Security Infrastructure Model
- Data Security
- Towards Multilateral-Secure DRM Platforms
- Hiding Data in Binary Images
- Performance Analysis of CDMA-Based Watermarking with Quantization Scheme
- Protecting Mass Data Basing on Small Trusted Agent
- Cryptographic Techniques II
- On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
- Token-Controlled Public Key Encryption
- A New Class of Codes for Fingerprinting Schemes
- t-Out-of-n String/Bit Oblivious Transfers Revisited
- Isbn
- 9783540255840
- Label
- Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
- Title
- Information security practice and experience
- Title remainder
- first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
- Statement of responsibility
- Robert H. Deng [and others] (eds.)
- Subject
-
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
- Computer security
- Computer security
- Computer security -- Congresses
- Computersicherheit
- Conference papers and proceedings
- Conference papers and proceedings
- Contrôle d'accès
- Data protection
- Data protection
- Data protection -- Congresses
- Datensicherung
- Eindringerkennung
- Elektronische Unterschrift
- Informatique
- Kongress
- Kryptosystem
- Protection de l'information (Informatique) -- Congrès
- Rechnernetz
- Réseaux d'ordinateurs -- Sécurité | Mesures -- Congrès
- Système cryptographique
- Sécurité des données
- Sécurité des réseaux
- Sécurité informatique
- Sécurité informatique -- Congrès
- COMPUTERS -- Internet | Security
- Language
- eng
- Summary
- Annotation
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- I855 2005eb
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2005
- http://bibfra.me/vocab/lite/meetingName
- ISPEC 2005
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Deng, Robert H
- Series statement
- Lecture notes in computer science
- Series volume
- 3439
- http://library.link/vocab/subjectName
-
- Computer security
- Computer networks
- Data protection
- Sécurité informatique
- Réseaux d'ordinateurs
- Protection de l'information (Informatique)
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Informatique
- Computer networks
- Computer security
- Data protection
- Computersicherheit
- Datensicherung
- Eindringerkennung
- Elektronische Unterschrift
- Kryptosystem
- Rechnernetz
- Contrôle d'accès
- Sécurité des données
- Sécurité des réseaux
- Sécurité informatique
- Système cryptographique
- Summary expansion
- This book constitutes the refereed proceedings of the First International Information Security Practice and Experience Conference, ISPEC 2005, held in Singapore in April 2005. The 35 revised full papers presented were carefully reviewed and selected from more than 120 submissions. The papers are organized in topical sections on network security, cryptographic techniques, secure architectures, access control, intrusion detection, data security, and applications and case studies
- Label
- Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Network Security -- Risk Assessment of Production Networks Using Honeynets -- Some Practical Experience -- POSSET -- Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation -- Tracing Traitors by Guessing Secrets. The q-Ary Case -- Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications -- Countermeasures for Preventing Comb Method Against SCA Attacks -- Secure Architecture I -- An Email Worm Vaccine Architecture -- Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model -- Security On-demand Architecture with Multiple Modules Support -- Measuring Resistance to Social Engineering -- Access Control -- Conformance Checking of RBAC Policy and its Implementation -- A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications -- A Task-Oriented Access Control Model for WfMS -- Intrusion Detection -- A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection -- Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks -- Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures -- Model Redundancy vs. Intrusion Detection -- Applications and Case Studies -- An Open Approach for Designing Secure Electronic Immobilizers -- An Empirical Study on the Usability of Logout in a Single Sign-on System -- Secure Software Delivery and Installation in Embedded Systems -- A Restricted Multi-show Credential System and Its Application on E-Voting -- Secure Architecture II -- Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks -- Using Trust for Restricted Delegation in Grid Environments -- Computer Vulnerability Evaluation Using Fault Tree Analysis -- An Identity-Based Grid Security Infrastructure Model -- Data Security -- Towards Multilateral-Secure DRM Platforms -- Hiding Data in Binary Images -- Performance Analysis of CDMA-Based Watermarking with Quantization Scheme -- Protecting Mass Data Basing on Small Trusted Agent -- Cryptographic Techniques II -- On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes -- Token-Controlled Public Key Encryption -- A New Class of Codes for Fingerprinting Schemes -- t-Out-of-n String/Bit Oblivious Transfers Revisited
- Control code
- 262677932
- Dimensions
- unknown
- Edition
- 1st ed.
- Extent
- 1 online resource (xii, 424 pages)
- Form of item
- online
- Isbn
- 9783540255840
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-25584-0
- Specific material designation
- remote
- System control number
- (OCoLC)262677932
- Label
- Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Network Security -- Risk Assessment of Production Networks Using Honeynets -- Some Practical Experience -- POSSET -- Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation -- Tracing Traitors by Guessing Secrets. The q-Ary Case -- Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications -- Countermeasures for Preventing Comb Method Against SCA Attacks -- Secure Architecture I -- An Email Worm Vaccine Architecture -- Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model -- Security On-demand Architecture with Multiple Modules Support -- Measuring Resistance to Social Engineering -- Access Control -- Conformance Checking of RBAC Policy and its Implementation -- A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications -- A Task-Oriented Access Control Model for WfMS -- Intrusion Detection -- A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection -- Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks -- Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures -- Model Redundancy vs. Intrusion Detection -- Applications and Case Studies -- An Open Approach for Designing Secure Electronic Immobilizers -- An Empirical Study on the Usability of Logout in a Single Sign-on System -- Secure Software Delivery and Installation in Embedded Systems -- A Restricted Multi-show Credential System and Its Application on E-Voting -- Secure Architecture II -- Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks -- Using Trust for Restricted Delegation in Grid Environments -- Computer Vulnerability Evaluation Using Fault Tree Analysis -- An Identity-Based Grid Security Infrastructure Model -- Data Security -- Towards Multilateral-Secure DRM Platforms -- Hiding Data in Binary Images -- Performance Analysis of CDMA-Based Watermarking with Quantization Scheme -- Protecting Mass Data Basing on Small Trusted Agent -- Cryptographic Techniques II -- On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes -- Token-Controlled Public Key Encryption -- A New Class of Codes for Fingerprinting Schemes -- t-Out-of-n String/Bit Oblivious Transfers Revisited
- Control code
- 262677932
- Dimensions
- unknown
- Edition
- 1st ed.
- Extent
- 1 online resource (xii, 424 pages)
- Form of item
- online
- Isbn
- 9783540255840
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-25584-0
- Specific material designation
- remote
- System control number
- (OCoLC)262677932
Subject
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
- Computer security
- Computer security
- Computer security -- Congresses
- Computersicherheit
- Conference papers and proceedings
- Conference papers and proceedings
- Contrôle d'accès
- Data protection
- Data protection
- Data protection -- Congresses
- Datensicherung
- Eindringerkennung
- Elektronische Unterschrift
- Informatique
- Kongress
- Kryptosystem
- Protection de l'information (Informatique) -- Congrès
- Rechnernetz
- Réseaux d'ordinateurs -- Sécurité | Mesures -- Congrès
- Système cryptographique
- Sécurité des données
- Sécurité des réseaux
- Sécurité informatique
- Sécurité informatique -- Congrès
- COMPUTERS -- Internet | Security
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Information-security-practice-and-experience-/8m4VhS6nnBM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Information-security-practice-and-experience-/8m4VhS6nnBM/">Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Information-security-practice-and-experience-/8m4VhS6nnBM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Information-security-practice-and-experience-/8m4VhS6nnBM/">Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>