| Preface |
|
ix | |
| IFIP/Sec'01 Conference Committees |
|
xi | |
| PART ONE eSociety |
|
|
PyTHIA: Towards Anonymity in Authentication |
|
|
1 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? |
|
|
19 | (16) |
|
|
|
|
|
|
|
|
|
|
|
Internet Anonymity: Problems and Solutions |
|
|
35 | (16) |
|
|
|
|
|
|
|
|
|
|
| PART TWO TTP Management and PKI |
|
|
Reducing Certificate Revocation Cost using NPKI |
|
|
51 | (10) |
|
|
|
|
|
|
|
|
|
|
|
The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems |
|
|
61 | (16) |
|
|
|
|
|
|
|
|
|
|
| PART THREE Smart Card |
|
|
Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? |
|
|
77 | (16) |
|
|
|
|
|
|
Modelling Audit Security for Smart-Card Payment Schemes with UML-SEC |
|
|
93 | (16) |
|
|
|
|
|
| PART FOUR Security Protocols |
|
|
|
|
109 | (14) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Secret Sharing and Visual Cryptography Schemes |
|
|
123 | (16) |
|
|
|
|
|
|
|
|
|
|
|
A Two-level Time-Stamping System |
|
|
139 | (12) |
|
|
|
|
|
|
|
|
|
|
|
Security Analysis of the Cliques Protocols Suites: First Results |
|
|
151 | (16) |
|
|
|
|
|
|
|
|
|
|
| PART FIVE Secure Workflow Environment |
|
|
A Secure Workflow System for Dynamic Collaboration |
|
|
167 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
On Securely Scheduling a Meeting |
|
|
183 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Modeling and Analyzing Separation of Duties in Workflow Environments |
|
|
199 | (14) |
|
|
|
|
|
|
|
|
|
|
| PART SIX Secure Group Communications |
|
|
Group Security Association (GSA) Management in IP Multicast |
|
|
213 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Communication-Efficient Group Key Agreement |
|
|
229 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| PART SEVEN Security Policies |
|
|
Going Beyond MAC and DAC Using Mobile Policies |
|
|
245 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
An Access Control Model for Data Archives |
|
|
261 | (16) |
|
|
|
|
|
|
|
|
|
|
|
S. De Capitani Di Vimercati |
|
|
|
|
|
|
|
|
|
| PART EIGHT Risk Management |
|
|
Checklist-Based Risk Analysis with Evidential Reasoning |
|
|
277 | (16) |
|
|
|
|
|
|
|
|
|
|
|
Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis |
|
|
293 | (12) |
|
|
|
|
|
|
The Security Model to Combine the Corporate and Information Security |
|
|
305 | (12) |
|
|
|
|
|
|
Design Criteria to Classified Information Systems Numerically |
|
|
317 | (10) |
|
|
|
|
|
| PART NINE Network Security and Intrusion Detection |
|
|
Deception: A Tool and Curse for Security Management |
|
|
327 | (12) |
|
|
|
|
|
|
|
|
|
|
|
A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection |
|
|
339 | (14) |
|
|
|
|
|
|
ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection |
|
|
353 | (16) |
|
|
|
|
|
|
|
|
|
|
|
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework |
|
|
369 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| PART TEN Trusted Platforms |
|
|
An Efficient Software Protection Scheme |
|
|
385 | (18) |
|
|
|
|
|
|
|
|
|
|
|
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs |
|
|
403 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| PART ELEVEN Trusted System Design and Management |
|
|
Security Concerns for Contemporary Development Practices: A Case Study |
|
|
421 | (16) |
|
|
|
|
|
|
|
|
|
|
|
A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS |
|
|
437 | (16) |
|
|
|
|
|
|
Redefining Information Systems Security: Viable Information Systems |
|
|
453 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Extended Description Techniques for Security Engineering |
|
|
469 | |
|
|
|
|
|
|
|
|
|
|