信息与计算安全新趋向/会议录/Emerging trends in information and communication security

当前位置:首页 > 计算机网络 > 信息安全 > 信息与计算安全新趋向/会议录/Emerging trends in information and communication security

出版社:Springer-Verlag New York Inc
出版日期:2006-12
ISBN:9783540346401
作者:Muller, Gunter (EDT)
页数:521页

作者简介

This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006.    The 36 revised full papers presented were carefully reviewed and selected from around 180 submissions. The papers are organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.

书籍目录

Multilateral Security Multilateral Security: Enabling Technologies and Their Evaluation Do You Trust Your Recommendations? An Exploration of Securityand Privacy Issues in Recommender Systems Security in Service-Oriented Computing Optimized Workflow Authorization in Service Oriented Architectures Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment A P2P Content Authentication Protocol Based on Byzantine AgreementSecure Mobile Applications Transitive Trust in Mobile Scenarios An Open, PKI-Based Mobile Payment System Secure Rejoining Scheme for Dynamic Sensor Networks Developing Provable Secure M-Commerce ApplicationsEnterprise Privacy An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction Privacy-Preserving Decision Tree Mining Based on Random SubstitutionsPrivacy, Identity, and Anonymity Policy-Based Integration of User and Provider-Sided Identity Management Privacy with Delegation of Rights by Identity Management A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System Revocable Anonymity Low Latency Anonymous Communication - How Long Are Users Willing to Wait?Security Engineering Security Engineering Using Problem Frames SEcTOOL - Supporting Requirements Engineering for Access Control Possibilistic Information Flow Control in MAKS and Action Refinement Toward a Framework for Forensic Analysis of Scanning Worms A Comparison of Market Approaches to Software Vulnerability Disclosure ……Security Policies Security and Protocls Intrusion Detection Perspectives of Cryptographic SecurityAuthor Index

图书封面


 信息与计算安全新趋向/会议录/Emerging trends in information and communication security下载



发布书评

 
 


 

农业基础科学,时尚,美术/书法,绘画,软件工程/开发项目管理,研究生/本专科,爱情/情感,动漫学堂PDF下载,。 PDF下载网 

PDF下载网 @ 2024