Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings

Front Cover
Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou
Springer Science & Business Media, Apr 5, 2005 - Business & Economics - 424 pages
The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Risk Assessment of Production Networks Using Honeynets Some Practical Experience
1
POSSET PolicyDriven Secure Session Transfer
13
A Novel Approach
25
Robust Routing in Malicious Environment for Ad Hoc Networks
36
Short Linkable Ring Signatures for EVoting ECash and Attestation
48
Tracing Traitors by Guessing Secrets The qAry Case
61
Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications
74
Countermeasures for Preventing Comb Method Against SCA Attacks
85
An Open Approach for Designing Secure Electronic Immobilizers
230
An Empirical Study on the Usability of Logout in a Single SignOn System
243
Secure Software Delivery and Installation in Embedded Systems
255
A Restricted Multishow Credential System and Its Application on EVoting
268
Using Recommendation Cards Approach for Building Trust in PeertoPeer Networks
280
Using Trust for Restricted Delegation in Grid Environments
293
Computer Vulnerability Evaluation Using Fault Tree Analysis
302
An IdentityBased Grid Security Infrastructure Model
314

An Email Worm Vaccine Architecture
97
Enforcing the Principle of Least Privilege with a StateBased Privilege Control Model
109
Security Ondemand Architecture with Multiple Modules Support
121
Measuring Resistance to Social Engineering
132
Conformance Checking of RBAC Policy and Its Implementation
144
A Practical Aspect Framework for Enforcing FineGrained Access Control in Web Applications
156
A TaskOriented Access Control Model for WfMS
168
A Brief ObservationCentric Analysis on AnomalyBased Intrusion Detection
178
Detection of Distributed Denial of Service Attacks Using Statistical Preprocessor and Unsupervised Neural
192
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
204
Model Redundancy vs Intrusion Detection
217
Towards MultilateralSecure DRM Platforms
326
Hiding Data in Binary Images
338
Performance Analysis of CDMABased Watermarking with Quantization Scheme
350
Protecting Mass Data Basing on Small Trusted Agent
362
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
374
TokenControlled Public Key Encryption
386
A New Class of Codes for Fingerprinting Schemes
398
tOutofn StringBit Oblivious Transfers Revisited
410
Author Index
422
Copyright

Other editions - View all

Common terms and phrases

About the author (2005)

Jianying Zhou holds an M.Sc. in computer science from the Chinese Academy of Sciences and a Ph.D. in information security from the University of London. Dr. Zhou is project manager at Kent Ridge Digital Labs in Singapore, where he leads an R&D team that develops network security technologies. He is actively involved in the academic world, serving on international conference committees and publishing papers for well-known journals.