skip to content
Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings Preview this item
ClosePreview this item
Checking...

Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings

Author: Robert H Deng
Publisher: Berlin ; New York, NY : Springer-Verlag, 2005.
Series: Lecture notes in computer science, 3439.
Edition/Format:   eBook : Document : Conference publication : English : 1st edView all editions and formats
Database:WorldCat
Summary:
Annotation
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Kongress
Congresses
Congrès
Additional Physical Format: Print version:
ISPEC 2005 (2005 : Singapore).
Information security practice and experience.
Berlin ; New York, NY : Springer-Verlag, 2005
(DLC) 2005923658
(OCoLC)59080871
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Robert H Deng
ISBN: 9783540319795 3540319794 3540255842 9783540255840
OCLC Number: 262677932
Description: 1 online resource (xii, 424 pages) : illustrations.
Contents: Network Security.- Risk Assessment of Production Networks Using Honeynets - Some Practical Experience.- POSSET - Policy-Driven Secure Session Transfer.- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach.- Robust Routing in Malicious Environment for Ad Hoc Networks.- Cryptographic Techniques I.- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation.- Tracing Traitors by Guessing Secrets. The q-Ary Case.- Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications.- Countermeasures for Preventing Comb Method Against SCA Attacks.- Secure Architecture I.- An Email Worm Vaccine Architecture.- Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.- Security On-demand Architecture with Multiple Modules Support.- Measuring Resistance to Social Engineering.- Access Control.- Conformance Checking of RBAC Policy and its Implementation.- A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications.- A Task-Oriented Access Control Model for WfMS.- Intrusion Detection.- A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection.- Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.- Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.- Model Redundancy vs. Intrusion Detection.- Applications and Case Studies.- An Open Approach for Designing Secure Electronic Immobilizers.- An Empirical Study on the Usability of Logout in a Single Sign-on System.- Secure Software Delivery and Installation in Embedded Systems.- A Restricted Multi-show Credential System and Its Application on E-Voting.- Secure Architecture II.- Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks.- Using Trust for Restricted Delegation in Grid Environments.- Computer Vulnerability Evaluation Using Fault Tree Analysis.- An Identity-Based Grid Security Infrastructure Model.- Data Security.- Towards Multilateral-Secure DRM Platforms.- Hiding Data in Binary Images.- Performance Analysis of CDMA-Based Watermarking with Quantization Scheme.- Protecting Mass Data Basing on Small Trusted Agent.- Cryptographic Techniques II.- On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes.- Token-Controlled Public Key Encryption.- A New Class of Codes for Fingerprinting Schemes.- t-Out-of-n String/Bit Oblivious Transfers Revisited.
Series Title: Lecture notes in computer science, 3439.
Responsibility: Robert H. Deng [and others] (eds.).
More information:

Abstract:

Annotation

This book constitutes the refereed proceedings of the First International Information Security Practice and Experience Conference, ISPEC 2005, held in Singapore in April 2005. The 35 revised full papers presented were carefully reviewed and selected from more than 120 submissions. The papers are organized in topical sections on network security, cryptographic techniques, secure architectures, access control, intrusion detection, data security, and applications and case studies.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/262677932> # Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "262677932" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/907746110#Place/new_york_ny> ; # New York, NY
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/907746110#Place/berlin> ; # Berlin
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/informatique> ; # Informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/securite_des_reseaux> ; # Sécurité des réseaux
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/eindringerkennung> ; # Eindringerkennung
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/reseaux_d_ordinateurs_securite_mesures> ; # Réseaux d'ordinateurs--Sécurité--Mesures
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/rechnernetz> ; # Rechnernetz
    schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/protection_de_l_information_informatique> ; # Protection de l'information (Informatique)
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/datensicherung> ; # Datensicherung
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/data_protection> ; # Data protection
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/systeme_cryptographique> ; # Système cryptographique
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/computersicherheit> ; # Computersicherheit
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/kryptosystem> ; # Kryptosystem
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/securite_des_donnees> ; # Sécurité des données
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/controle_d_acces> ; # Contrôle d'accès
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/securite_informatique> ; # Sécurité informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/907746110#Topic/elektronische_unterschrift> ; # Elektronische Unterschrift
    schema:bookEdition "1st ed." ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/74780855> ; # Robert H. Deng
    schema:creator <http://experiment.worldcat.org/entity/work/data/907746110#Meeting/ispec_2005_2005_singapore> ; # ISPEC 2005 (2005 : Singapore)
    schema:datePublished "2005" ;
    schema:description "Annotation"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/907746110> ;
    schema:genre "Kongress"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/907746110#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/59080871> ;
    schema:name "Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings"@en ;
    schema:productID "262677932" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/262677932#PublicationEvent/berlin_new_york_ny_springer_verlag_2005> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/907746110#Agent/springer_verlag> ; # Springer-Verlag
    schema:url <http://site.ebrary.com/id/10528390> ;
    schema:url <http://www.myilibrary.com?id=140248> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=183207> ;
    schema:url <http://www.springerlink.com/link.asp?id=xmr7vcw4qp7w> ;
    schema:url <http://www.springerlink.com/openurl.asp?genre=book&isbn=978-3-540-25584-0> ;
    schema:url <http://dx.doi.org/10.1007/b107167> ;
    schema:url <http://www.myilibrary.com?id=661140> ;
    schema:url <http://rave.ohiolink.edu/ebooks/ebc/11407959> ;
    schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-540-25584-0> ;
    schema:workExample <http://worldcat.org/isbn/9783540319795> ;
    schema:workExample <http://worldcat.org/isbn/9783540255840> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/262677932> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/907746110#Agent/springer_verlag> # Springer-Verlag
    a bgn:Agent ;
    schema:name "Springer-Verlag" ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/262677932> ; # Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
    schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/computersicherheit> # Computersicherheit
    a schema:Intangible ;
    schema:name "Computersicherheit"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/controle_d_acces> # Contrôle d'accès
    a schema:Intangible ;
    schema:name "Contrôle d'accès"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/eindringerkennung> # Eindringerkennung
    a schema:Intangible ;
    schema:name "Eindringerkennung"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/elektronische_unterschrift> # Elektronische Unterschrift
    a schema:Intangible ;
    schema:name "Elektronische Unterschrift"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/protection_de_l_information_informatique> # Protection de l'information (Informatique)
    a schema:Intangible ;
    schema:name "Protection de l'information (Informatique)"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/reseaux_d_ordinateurs_securite_mesures> # Réseaux d'ordinateurs--Sécurité--Mesures
    a schema:Intangible ;
    schema:name "Réseaux d'ordinateurs--Sécurité--Mesures"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/securite_des_donnees> # Sécurité des données
    a schema:Intangible ;
    schema:name "Sécurité des données"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/securite_des_reseaux> # Sécurité des réseaux
    a schema:Intangible ;
    schema:name "Sécurité des réseaux"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
    schema:name "Sécurité informatique"@en ;
    schema:name "Sécurité informatique"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/907746110#Topic/systeme_cryptographique> # Système cryptographique
    a schema:Intangible ;
    schema:name "Système cryptographique"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://viaf.org/viaf/74780855> # Robert H. Deng
    a schema:Person ;
    schema:familyName "Deng" ;
    schema:givenName "Robert H." ;
    schema:name "Robert H. Deng" ;
    .

<http://worldcat.org/isbn/9783540255840>
    a schema:ProductModel ;
    schema:isbn "3540255842" ;
    schema:isbn "9783540255840" ;
    .

<http://worldcat.org/isbn/9783540319795>
    a schema:ProductModel ;
    schema:isbn "3540319794" ;
    schema:isbn "9783540319795" ;
    .

<http://www.worldcat.org/oclc/59080871>
    a schema:CreativeWork ;
    rdfs:label "Information security practice and experience." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/262677932> ; # Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
    .

<http://www.worldcat.org/title/-/oclc/262677932>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/262677932> ; # Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
    schema:dateModified "2016-12-08" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.