Information Security for Global Information Infrastructures (Google eBook)

Front Cover
Sihan Qing, Jan H.P. Eloff
Springer Science & Business Media, Jul 31, 2000 - Business & Economics - 509 pages
0 Reviews
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings.
  

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Progress Problems and Perspectives
1
Process Evaluation and Product Evaluation
11
Managing Information Security in Healthcare an Action Research Experience
19
From Trusted Information Security Controls to a Trusted Information Security Environment
29
A Qualitative Approach to Information Availability
37
A Postgraduate Programme on Information and Communication Systems Security
49
Information Security Management Through Measurement
59
The Defense Framework For Largescale Computer Network System
69
Analysis and Design of Evoting Protocol
281
Models of Agents Community
291
TOWARDS NETWORK DENIAL OF SERVICE RESISTANT PROTOCOLS
301
A Generic Graphical Specification Environment for Security Protocol Modelling
311
Anonymous Electronic Voting System with NonTransferable Voting Passes
321
Improving Packet Filters Management through Automatic and Dynamic Schemes
331
A Contextsensitive Access Control Model and Prototype Implementation
341
Regulating Access to Semistructured Information on the Web
351

An Approach to Unravel Enterprise Security Management Policies
79
Independent Policy Oriented Layering of Security Services
89
Reducing Computer Fraud Through Situational Crime Prevention
99
Five approaches
111
DNAproofing for computer systems a new approach to computer security?
121
Services and Security Features
131
Model for an Auditing Security System
141
CLASSIFYING INFORMATION FOR EXTERNAL RELEASE
151
Using Mobile Agent Results to Create HardtoDetect Computer Viruses
161
A DISTRIBUTED SYSTEM FOR DETECTING COORDINATED ATTACKS
171
Based on Secure Spread Spectrum and Auditory Perception Model
181
A Simple and Efficient Approach to Verifying Cryptographic Protocols
191
Power analysis of RC6 and SERPENT
201
A SIMPLE ALGORITHM FOR COMPUTING SEVERAL SEQUENCES SYNTHESIS
211
GSFSA NEW GROUPAWARE CRYPTOGRAPHIC FILE SYSTEM
221
RobustnessAgile Encryptor for ATM Networks
231
FAST CONSTRUCTION OF SECURE DISCRETE LOGARITHM PROBLEMS OVER JACOBIAN VARIETIES
241
A new serialparallel architecture for a low power modular multiplier
251
Defending Against Null Calls Stream Attacks by Using a DoubleThreshold Dynamic Filter
261
A MULTIPARTY NONREPUDIATION PROTOCOL
271
A Case Study
361
Elements of A Language for RoleBased Access Control
371
Disallowing Unauthorized State Changes of Distributed Shared Objects
381
Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network
391
The problems of descriptivism and nondescriptive foundations
401
Fact or Fiction?
411
ENFORCING PRIVACY BY WITHHOLDING PRIVATE INFORMATION
421
The Changing Roles of Patent and Copyright Protection for Software and Communication Technology In the Internet Age
431
A framework for electronic commerce security
441
Electronic Payment Systems with Fair Online Verification
451
Fair Electronic Cash Systems with Multiple Banks
461
An Experiment
471
A Flexible Management Framework for Certificate Status Validation
481
A security architecture for electronic commerce applications
491
Invited Papers
501
On the Development of the Advanced Encryption Standard
503
managing the eBusiness security
505
INDEX OF CONTRIBUTORS
507
Copyright

Common terms and phrases