Trusted Information: The New Decade Challenge : Ifip Tc11 16th International Conference on Information Security (Ifip/Sec'01), June 11-13, 2001, Paris, France

by ;
Format: Hardcover
Pub. Date: 2001-05-01
Publisher(s): Kluwer Academic Pub
List Price: $341.30

Rent Textbook

Select for Price
There was a problem. Please try again later.

Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$75.24
Online:60 Days access
Downloadable:60 Days
$100.32
Online:90 Days access
Downloadable:90 Days
$125.40
Online:120 Days access
Downloadable:120 Days
$150.48
Online:180 Days access
Downloadable:180 Days
$163.02
Online:1825 Days access
Downloadable:Lifetime Access
$250.80
*To support the delivery of the digital material to you, a non-refundable digital delivery fee of $3.99 will be charged on each digital item.
$163.02*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services. Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies, including application-related topics, and issues relating to application development and deployment: Security Protocols; Smart Card; Network Security and Intrusion Detection; Trusted Platforms; eSociety; TTP Management and PKI; Secure Workflow Environment; Secure Group Communications; Risk Management; Security Policies; Trusted System Design and Management. This book comprises the proceedings of the 16th International Conference on Information Security (Sec'01), which was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP Technical Committee 11. The conference was held in June 2001 in Paris, France. Trusted Information: The New Decade Challenge is essential reading for computer science researchers and application developers.

Table of Contents

Preface ix
IFIP/Sec'01 Conference Committees xi
PART ONE eSociety
PyTHIA: Towards Anonymity in Authentication
1(18)
D. Gritzalis
K. Moulinos
J. Iliadis
C. Lambrinoudakis
S. Xarhoulacos
Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?
19(16)
K.M. Ang
W.J. Caelli
Internet Anonymity: Problems and Solutions
35(16)
C. Eckert
A. Pircher
PART TWO TTP Management and PKI
Reducing Certificate Revocation Cost using NPKI
51(10)
A. Levi
C. Kaya Koc
The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems
61(16)
B. Blobel
P. Pharow
PART THREE Smart Card
Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?
77(16)
K. Markantonakis
Modelling Audit Security for Smart-Card Payment Schemes with UML-SEC
93(16)
J. Jurjens
PART FOUR Security Protocols
Strong Forward Security
109(14)
M. Burmester
V. Chrissikopoulos
P. Kotzanikolaou
E. Magkos
Secret Sharing and Visual Cryptography Schemes
123(16)
A. De Bonis
A. De Santis
A Two-level Time-Stamping System
139(12)
A. Gabillon
J. Byun
Security Analysis of the Cliques Protocols Suites: First Results
151(16)
O. Pereira
J-J. Quisquater
PART FIVE Secure Workflow Environment
A Secure Workflow System for Dynamic Collaboration
167(16)
J. S. Park
M. H.Kang
J. N. Froscher
On Securely Scheduling a Meeting
183(16)
T. Herlea
J. Claessens
B. Preneel
G. Neven
F. Piessens
B. De Decker
Modeling and Analyzing Separation of Duties in Workflow Environments
199(14)
K. Knorr
H. Stormer
PART SIX Secure Group Communications
Group Security Association (GSA) Management in IP Multicast
213(16)
T. Hardjono
M. Baugher
H. Harney
Communication-Efficient Group Key Agreement
229(16)
Y. Kim
A. Perrig
G. Tsudik
PART SEVEN Security Policies
Going Beyond MAC and DAC Using Mobile Policies
245(16)
A. Fayad
S. Jajodia
D. Faatz
V. Doshi
An Access Control Model for Data Archives
261(16)
P.Bonatti
E. Damiani
S. De Capitani Di Vimercati
P. Samarati
PART EIGHT Risk Management
Checklist-Based Risk Analysis with Evidential Reasoning
277(16)
S. Cho
Z. Ciechanowicz
Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis
293(12)
A. Frisinger
The Security Model to Combine the Corporate and Information Security
305(12)
T. Virtanen
Design Criteria to Classified Information Systems Numerically
317(10)
T. Virtanen
PART NINE Network Security and Intrusion Detection
Deception: A Tool and Curse for Security Management
327(12)
M. Warren
W. Hutchinson
A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection
339(14)
A. Seleznyov
ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection
353(16)
C. Michel
L. Me
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework
369(16)
X. Wang
D. S. Reeves
S. F. Wu
J. Yuill
PART TEN Trusted Platforms
An Efficient Software Protection Scheme
385(18)
A. Mana
E. Pimentel
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs
403(18)
A. Spalka
A.B. Cremers
H. Langweg
PART ELEVEN Trusted System Design and Management
Security Concerns for Contemporary Development Practices: A Case Study
421(16)
T. Tryfonas
E. Kiountouzis
A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS
437(16)
M. T. Siponen
Redefining Information Systems Security: Viable Information Systems
453(16)
M. Karyda
S. Kokolakis
E. Kiountouzis
Extended Description Techniques for Security Engineering
469
G. Wimmel
A. Wisspeintner

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.