skip to content
Emerging Challenges for Security, Privacy and Trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings Preview this item
ClosePreview this item
Checking...

Emerging Challenges for Security, Privacy and Trust : 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings

Author: Dimitris Gritzalis; Javier Lopez
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.
Series: SpringerLink: Springer e-Books; IFIP Advances in Information and Communication Technology, 297.; International Federation for Information Processing.; IFIP advances in information and communication technology
Edition/Format:   Computer file : English : Online-ausg
Summary:

It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Computer File, Internet Resource
All Authors / Contributors: Dimitris Gritzalis; Javier Lopez
ISBN: 9783642012440 3642012442 9783642012433 3642012434
OCLC Number: 609878656
Reproduction Notes: Online-Ausg. Berlin [u.a.] Springer, 2009. online-Ressource.
Description: S.
Contents: Identification and Authentication I.- Flexible and Transparent User Authentication for Mobile Devices.- Combining Authentication, Reputation and Classification to Make Phishing Unprofitable.- Audio CAPTCHA for SIP-Based VoIP.- Threats and Attacks.- Roving Bugnet: Distributed Surveillance Threat and Mitigation.- On Robust Covert Channels Inside DNS.- Discovering Application-Level Insider Attacks Using Symbolic Execution.- Identification and Authentication II.- Custom JPEG Quantization for Improved Iris Recognition Accuracy.- On the IPP Properties of Reed-Solomon Codes.- A Generic Authentication LoA Derivation Model.- Applications of Cryptography and Information Hiding.- Media-Break Resistant eSignatures in eGovernment: An Austrian Experience.- How to Bootstrap Security for Ad-Hoc Network: Revisited.- Steganalysis of Hydan.- Trusted Computing.- On the Impossibility of Detecting Virtual Machine Monitors.- Implementation of a Trusted Ticket System.- Security Policies.- A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor.- A Policy Language for Modelling Recommendations.- Validation, Verification, Evaluation.- On the Security Validation of Integrated Security Solutions.- Verification of Security Policy Enforcement in Enterprise Systems.- Optimization of the Controlled Evaluation of Closed Relational Queries.- Privacy Protection - Security Assessment.- Collaborative Privacy - A Community-Based Privacy Infrastructure.- Security and Privacy Improvements for the Belgian eID Technology.- A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components.- Role Mining and Content Protection.- Mining Stable Roles in RBAC.- Privacy-Preserving Content-Based Publish/Subscribe Networks.- Broadcast Encryption for Differently Privileged.- Ontology-Based Secure XML Content Distribution.- Security Protocols.- NGBPA Next Generation BotNet Protocol Analysis.- Non-repudiation Analysis with LySa.- A Provably Secure Secret Handshake with Dynamic Controlled Matching.- Towards a Theory of White-Box Security.- Access Control.- On a Taxonomy of Delegation.- Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.- A Probabilistic Bound on the Basic Role Mining Problem and Its Applications.- Automating Access Control Logics in Simple Type Theory with LEO-II.- Internet and Web Applications Security.- In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security.- Persona: Network Layer Anonymity and Accountability for Next Generation Internet.- Jason: A Scalable Reputation System for the Semantic Web.- Which Web Browsers Process SSL Certificates in a Standardized Way?.
Series Title: SpringerLink: Springer e-Books; IFIP Advances in Information and Communication Technology, 297.; International Federation for Information Processing.; IFIP advances in information and communication technology
Responsibility: edited by Dimitris Gritzalis, Javier Lopez.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/609878656> # Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings
    a bgn:ComputerFile, schema:CreativeWork ;
   library:oclcnum "609878656" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/3374544425#Place/berlin_heidelberg> ; # Berlin, Heidelberg
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/3374544425#Topic/computer_science> ; # Computer Science
   schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
   schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
   schema:about <http://id.loc.gov/authorities/subjects/sh89003285> ; # Computer science
   schema:about <http://id.worldcat.org/fast/887978> ; # Data structures (Computer science)
   schema:about <http://id.worldcat.org/fast/872451> ; # Computer science
   schema:about <http://experiment.worldcat.org/entity/work/data/3374544425#Topic/computer_communication_networks> ; # Computer Communication Networks
   schema:about <http://id.loc.gov/authorities/subjects/sh85035859> ; # Data protection
   schema:author <http://viaf.org/viaf/6013153> ; # Javier Lopez
   schema:author <http://viaf.org/viaf/12209857> ; # Dimitris Gritzalis
   schema:bookEdition "Online-ausg." ;
   schema:datePublished "2009" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/3374544425> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/3374544425#Series/ifip_advances_in_information_and_communication_technology> ; # IFIP advances in information and communication technology ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/3374544425#Series/springerlink_springer_e_books> ; # SpringerLink: Springer e-Books
   schema:name "Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings" ;
   schema:productID "609878656" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/609878656#PublicationEvent/berlin_heidelberg_springer_berlin_heidelberg_2009> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/3374544425#Agent/springer_berlin_heidelberg> ; # Springer Berlin Heidelberg
   schema:url <http://dx.doi.org/10.1007/978-3-642-01244-0> ;
   schema:workExample <http://worldcat.org/isbn/9783642012433> ;
   schema:workExample <http://dx.doi.org/10.1007/978-3-642-01244-0> ;
   schema:workExample <http://worldcat.org/isbn/9783642012440> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/609878656> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/3374544425#Agent/springer_berlin_heidelberg> # Springer Berlin Heidelberg
    a bgn:Agent ;
   schema:name "Springer Berlin Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/3374544425#Organization/international_federation_for_information_processing> # International Federation for Information Processing.
    a schema:Organization ;
   schema:name "International Federation for Information Processing." ;
    .

<http://experiment.worldcat.org/entity/work/data/3374544425#Place/berlin_heidelberg> # Berlin, Heidelberg
    a schema:Place ;
   schema:name "Berlin, Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/3374544425#Series/ifip_advances_in_information_and_communication_technology> # IFIP advances in information and communication technology ;
    a bgn:PublicationSeries ;
   schema:creator <http://experiment.worldcat.org/entity/work/data/3374544425#Organization/international_federation_for_information_processing> ; # International Federation for Information Processing.
   schema:hasPart <http://www.worldcat.org/oclc/609878656> ; # Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings
   schema:name "IFIP advances in information and communication technology ;" ;
   schema:name "IFIP Advances in Information and Communication Technology ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/3374544425#Series/springerlink_springer_e_books> # SpringerLink: Springer e-Books
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/609878656> ; # Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings
   schema:name "SpringerLink: Springer e-Books" ;
    .

<http://experiment.worldcat.org/entity/work/data/3374544425#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
   schema:name "Computer Communication Networks" ;
    .

<http://id.loc.gov/authorities/subjects/sh85035859> # Data protection
    a schema:Intangible ;
   schema:name "Data protection" ;
    .

<http://id.loc.gov/authorities/subjects/sh89003285> # Computer science
    a schema:Intangible ;
   schema:name "Computer science" ;
    .

<http://id.worldcat.org/fast/872451> # Computer science
    a schema:Intangible ;
   schema:name "Computer science" ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
   schema:name "Data encryption (Computer science)" ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
   schema:name "Data protection" ;
    .

<http://id.worldcat.org/fast/887978> # Data structures (Computer science)
    a schema:Intangible ;
   schema:name "Data structures (Computer science)" ;
    .

<http://viaf.org/viaf/12209857> # Dimitris Gritzalis
    a schema:Person ;
   schema:familyName "Gritzalis" ;
   schema:givenName "Dimitris" ;
   schema:name "Dimitris Gritzalis" ;
    .

<http://viaf.org/viaf/6013153> # Javier Lopez
    a schema:Person ;
   schema:familyName "Lopez" ;
   schema:givenName "Javier" ;
   schema:name "Javier Lopez" ;
    .

<http://worldcat.org/isbn/9783642012433>
    a schema:ProductModel ;
   schema:isbn "3642012434" ;
   schema:isbn "9783642012433" ;
    .

<http://worldcat.org/isbn/9783642012440>
    a schema:ProductModel ;
   schema:isbn "3642012442" ;
   schema:isbn "9783642012440" ;
    .

<http://www.worldcat.org/title/-/oclc/609878656>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/609878656> ; # Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings
   schema:dateModified "2017-12-25" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.