Trusted Information: The New Decade Challenge

Author:   Michel Dupuy ,  Pierre Paradinas
Publisher:   Springer
Edition:   2001 ed.
Volume:   65
ISBN:  

9780792373896


Pages:   490
Publication Date:   31 May 2001
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $842.16 Quantity:  
Add to Cart

Share |

Trusted Information: The New Decade Challenge


Add your own review!

Overview

With the explosive growth of data exchange and the availability of access to services over the Web, the ""Trusted Information"" requirement is more and more an issue to providers and users of these services. Addressing this security issue, this volume is divided into 11 parts covering the essentials of information security technologies, including application-related topics, and issues relating to application development and deployment: security protocols; smart card; network security and intrusion detection; trusted platforms; eSociety; TTP management and PKI; secure workflow environment; secure group communications; risk management; security policies; and trusted system design and management. This book comprises the proceedings of the 16th International Conference on Information Security (Sec'01), which was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP Technical Committee 11. The conference was held in June 2000 in Paris, France.

Full Product Details

Author:   Michel Dupuy ,  Pierre Paradinas
Publisher:   Springer
Imprint:   Springer
Edition:   2001 ed.
Volume:   65
Dimensions:   Width: 15.60cm , Height: 2.80cm , Length: 23.40cm
Weight:   1.950kg
ISBN:  

9780792373896


ISBN 10:   0792373898
Pages:   490
Publication Date:   31 May 2001
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

eSociety.- PyTHIA: Towards Anonymity in Authentication.- Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?.- Internet Anonymity: Problems and Solutions.- TTP Management and PKI.- Reducing Certificate Revocation Cost using NPKI.- The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems.- Smart Card.- Is the Performance of Smart Card Crytographic Functions the Real Bottleneck?.- Modelling Audit Security for Smart-Card Payment Schemes with UML-Sec.- Security Protocols.- Strong Forward Security.- Secret Sharing and Visual Cryptography Schemes.- A Two-level Time-Stamping System.- Security Analysis of the Cliques Protocols Suites: First Results.- Secure Workflow Environment.- A Secure Workflow System for Dynamic Collaboration.- On Securely Scheduling a Meeting.- Modeling and Analyzing Separation of Duties in Workflow Environments.- Secure Group Communications.- Group Security Association (GSA) Management in IP Multicast.- Communication-Efficient Group Key Agreement.- Security Policies.- Going Beyond MAC and DAC Using Mobile Policies.- An Access Control Model for Data Archives.- Risk Management.- Checklist-Based Risk Analysis with Evidential Reasoning.- Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis.- The Security Model to Combine the Corporate and Information Security.- Design Criteria to Classified Information Systems Numerically.- Network Security and Intrusion Detection.- Deception: A Tool and Curse for Security Management.- A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection.- ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection.- Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.- Trusted Platforms.- An Efficient Software Protection Scheme.- Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs.- Trusted System Design and Management.- Security Concerns for Contemporary Development Practices.- A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS.- Redefining Information Systems Security: Viable Information Systems.- Extended Description Techniques for Security Engineering.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List