Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress : TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France

Front Cover
Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wang
Springer Science & Business Media, Jul 27, 2004 - Computers - 548 pages

Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful.

Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Remediation Graphs for Security Patch Management
17
Contrasting Malicious Java Applets by Modifying the Java
46
Analyzing Network Management Effects with SPIN and cTLA
65
Formal Reasoning of Various Categories of Widely Exploited
83
Security in Globally Distributed Industrial Information Systems
119
A Case For Information Ownership in ERP Systems
135
Interactive Access Control for Web Services
150
Identitybased Key Infrastructures IKI
167
Trusted Computing Trusted Third Parties and Verified
290
Maille Authentication A Novel Protocol for Distributed
309
Supporting Endtoend Security across Proxies with Multiple
323
A ContentProtection Scheme for MultiLayered Reselling Structure
339
IPsec Clustering
367
Improving Secure Device Insertion in Home Adhoc Networks
380
Spam Filter Analysis
395
Collective Signature for Efficient Authentication of XML Documents
411

Dependable Security by Twisted Secret Sharing
193
A Language Driven IDS for Event and Alert Correlation
209
Installtime Vaccination of Windows Executables to Defend
225
Eigenconnections to Intrusion Detection
241
Watching the Webserver
259
A Longterm Trial of Keystroke Profiling using Digraph Trigraph
275
Updating Encrypted XML Documents on Untrusted Machines
425
Efficient Simultaneous Contract Signing
441
DHCP Authentication Using Certificates
456
Extending Systrace To Empower Applications
473
Fast Digital Certificate Revocation
489
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information