Coverart for item
The Resource Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.)

Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.)

Label
Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
Title
Information security practice and experience
Title remainder
first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
Statement of responsibility
Robert H. Deng [and others] (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Summary
Annotation
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I855 2005eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2005
http://bibfra.me/vocab/lite/meetingName
ISPEC 2005
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Deng, Robert H
Series statement
Lecture notes in computer science
Series volume
3439
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
  • Data protection
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Informatique
  • Computer networks
  • Computer security
  • Data protection
  • Computersicherheit
  • Datensicherung
  • Eindringerkennung
  • Elektronische Unterschrift
  • Kryptosystem
  • Rechnernetz
  • Contrôle d'accès
  • Sécurité des données
  • Sécurité des réseaux
  • Sécurité informatique
  • Système cryptographique
Summary expansion
This book constitutes the refereed proceedings of the First International Information Security Practice and Experience Conference, ISPEC 2005, held in Singapore in April 2005. The 35 revised full papers presented were carefully reviewed and selected from more than 120 submissions. The papers are organized in topical sections on network security, cryptographic techniques, secure architectures, access control, intrusion detection, data security, and applications and case studies
Label
Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Network Security -- Risk Assessment of Production Networks Using Honeynets - Some Practical Experience -- POSSET - Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation -- Tracing Traitors by Guessing Secrets. The q-Ary Case -- Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications -- Countermeasures for Preventing Comb Method Against SCA Attacks -- Secure Architecture I -- An Email Worm Vaccine Architecture -- Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model -- Security On-demand Architecture with Multiple Modules Support -- Measuring Resistance to Social Engineering -- Access Control -- Conformance Checking of RBAC Policy and its Implementation -- A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications -- A Task-Oriented Access Control Model for WfMS -- Intrusion Detection -- A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection -- Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks -- Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures -- Model Redundancy vs. Intrusion Detection -- Applications and Case Studies -- An Open Approach for Designing Secure Electronic Immobilizers -- An Empirical Study on the Usability of Logout in a Single Sign-on System -- Secure Software Delivery and Installation in Embedded Systems -- A Restricted Multi-show Credential System and Its Application on E-Voting -- Secure Architecture II -- Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks -- Using Trust for Restricted Delegation in Grid Environments -- Computer Vulnerability Evaluation Using Fault Tree Analysis -- An Identity-Based Grid Security Infrastructure Model -- Data Security -- Towards Multilateral-Secure DRM Platforms -- Hiding Data in Binary Images -- Performance Analysis of CDMA-Based Watermarking with Quantization Scheme -- Protecting Mass Data Basing on Small Trusted Agent -- Cryptographic Techniques II -- On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes -- Token-Controlled Public Key Encryption -- A New Class of Codes for Fingerprinting Schemes -- t-Out-of-n String/Bit Oblivious Transfers Revisited
Control code
262677932
Dimensions
unknown
Edition
1st ed.
Extent
1 online resource (xii, 424 pages)
Form of item
online
Isbn
9783540255840
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-25584-0
Specific material designation
remote
System control number
(OCoLC)262677932
Label
Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings, Robert H. Deng [and others] (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Network Security -- Risk Assessment of Production Networks Using Honeynets - Some Practical Experience -- POSSET - Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation -- Tracing Traitors by Guessing Secrets. The q-Ary Case -- Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications -- Countermeasures for Preventing Comb Method Against SCA Attacks -- Secure Architecture I -- An Email Worm Vaccine Architecture -- Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model -- Security On-demand Architecture with Multiple Modules Support -- Measuring Resistance to Social Engineering -- Access Control -- Conformance Checking of RBAC Policy and its Implementation -- A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications -- A Task-Oriented Access Control Model for WfMS -- Intrusion Detection -- A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection -- Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks -- Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures -- Model Redundancy vs. Intrusion Detection -- Applications and Case Studies -- An Open Approach for Designing Secure Electronic Immobilizers -- An Empirical Study on the Usability of Logout in a Single Sign-on System -- Secure Software Delivery and Installation in Embedded Systems -- A Restricted Multi-show Credential System and Its Application on E-Voting -- Secure Architecture II -- Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks -- Using Trust for Restricted Delegation in Grid Environments -- Computer Vulnerability Evaluation Using Fault Tree Analysis -- An Identity-Based Grid Security Infrastructure Model -- Data Security -- Towards Multilateral-Secure DRM Platforms -- Hiding Data in Binary Images -- Performance Analysis of CDMA-Based Watermarking with Quantization Scheme -- Protecting Mass Data Basing on Small Trusted Agent -- Cryptographic Techniques II -- On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes -- Token-Controlled Public Key Encryption -- A New Class of Codes for Fingerprinting Schemes -- t-Out-of-n String/Bit Oblivious Transfers Revisited
Control code
262677932
Dimensions
unknown
Edition
1st ed.
Extent
1 online resource (xii, 424 pages)
Form of item
online
Isbn
9783540255840
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-25584-0
Specific material designation
remote
System control number
(OCoLC)262677932

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...