Muutke küpsiste eelistusi

Advances in Network and Distributed Systems Security: IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 2627, 2001, Leuven, Belgium 2002 ed. [Kõva köide]

Edited by , Edited by , Edited by , Edited by
Teised raamatud teemal:
  • Kõva köide
  • Hind: 141,35 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 166,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
Teised raamatud teemal:
The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP),focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government,...Themoreour societyrelies on electronicforms ofcommunication,themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence,researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines,organisationsandcountries,todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering,mobileagentsecurity,e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies,one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion,and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website:http://www.ifip.at.org/. Finally,wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers,whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety,willprovea drivingforce for futureconferencestocome.
Preface vii Acknowledgements ix Part One - Reviewed Papers A Role-Based Specification of the SET Payment Transaction Protocol 1(14) Hideki Sakurada Yasuyuki Tsukada Information Security: Mutual Authentication in E-Commerce 15(18) S.H. Von Solms M. V. Kisimov Software-Based Receipt-Freeness in On-Line Elections 33(12) Emmanouil Magkos Vassilios Chrissikopoulos Nikos Alexandris ID-Based Structured Multisignature Schemes 45(16) Chih-Yin Lin Tzong-Chen Wu Jing-Jang Hwang Probabilistic Relations for the Solitaire Keystream Generator 61(14) Marina Pudovkina Hazard Analysis for Security Protocol Requirements 75(18) Nathalie Foster Jeremy Jacob Securing RMI Communication 93(14) Vincent Naessens Bart Vanhaute Bart De Decker Secure Java Development with UML 107(18) Jan Jurjens Security Through Aspect-Oriented Programming 125(14) Bart De Win Bart Vanhaute Bart De Decker Extending a Campus Network with Remote Bubbles using IPsec 139(14) Aurelien Bonnet Marc Lobelle Combining World Wide Web and Wireless Security 153(20) Joris Claessens Bart Preneel Joos Vandewalle On Mobile Agent Based Transactions in Moderately Hostile Environments 173(14) Niklas Borselius Chris J. Mitchell Aaron Wilson SPARTA, A Mobile Agent Based Intrusion Detection System 187(14) Christopher Krugel Thomas Toth Engin Kirda Part Two - Invited Paper Shells Trust Domain Infrastructure Security Certification 201(2) Pieter van Dijken Author Index 203