信息与计算安全新趋向/会议录/Emerging trends in information and communication security

分類: 图书,计算机/网络,信息安全,
作者: Günter Müller 著
出 版 社: 湖北辞书出版社
出版时间: 2006-12-1字数:版次: 1页数: 521印刷时间: 2006/12/01开本:印次:纸张: 胶版纸I S B N : 9783540346401包装: 平装编辑推荐
The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form.Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science resarch forum available.
The scope of LNCS,including its subseries LNAI,spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.The type of material publised traditionally includes.
-proceedings(published in time for the respective conference)
-post-proceedings(consisting of thoroughly revised final full papers)
-research monographs(which may be basde on outstanding PhD work,research projects,technical reports,etc.).
内容简介
This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006.
The 36 revised full papers presented were carefully reviewed and selected from around 180 submissions. The papers are organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.
目录
Multilateral Security
Multilateral Security: Enabling Technologies and Their Evaluation
Do You Trust Your Recommendations? An Exploration of Securityand Privacy Issues in Recommender Systems
Security in Service-Oriented Computing
Optimized Workflow Authorization in Service Oriented Architectures
Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment
A P2P Content Authentication Protocol Based on Byzantine Agreement
Secure Mobile Applications
Transitive Trust in Mobile Scenarios
An Open, PKI-Based Mobile Payment System
Secure Rejoining Scheme for Dynamic Sensor Networks
Developing Provable Secure M-Commerce Applications
Enterprise Privacy
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
Privacy-Preserving Decision Tree Mining Based on Random Substitutions
Privacy, Identity, and Anonymity
Policy-Based Integration of User and Provider-Sided Identity Management
Privacy with Delegation of Rights by Identity Management
A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System
Revocable Anonymity
Low Latency Anonymous Communication - How Long Are Users Willing to Wait?
Security Engineering
Security Engineering Using Problem Frames
SEcTOOL - Supporting Requirements Engineering for Access Control
Possibilistic Information Flow Control in MAKS and Action Refinement
Toward a Framework for Forensic Analysis of Scanning Worms
A Comparison of Market Approaches to Software Vulnerability Disclosure
……
Security Policies
Security and Protocls
Intrusion Detection
Perspectives of Cryptographic Security
Author Index