Muutke küpsiste eelistusi

Secure and Trust Computing, Data Management, and Applications: 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Part I 2011 [Pehme köide]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 252 pages, kõrgus x laius: 235x155 mm, kaal: 416 g, XV, 252 p., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 186
  • Ilmumisaeg: 05-Jul-2011
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642223389
  • ISBN-13: 9783642223389
Teised raamatud teemal:
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 252 pages, kõrgus x laius: 235x155 mm, kaal: 416 g, XV, 252 p., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 186
  • Ilmumisaeg: 05-Jul-2011
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642223389
  • ISBN-13: 9783642223389
Teised raamatud teemal:
This book constitutes the refereed proceedings of the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, held in Loutraki, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations. The 29 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address various theories and practical applications of secure and trust computing and data management in future environments.
STA2011 - Security Track
Embedding High Capacity Covert Channels in Short Message Service (SMS)
1(10)
M. Zubair Rafique
Muhammad Khurram Khan
Khaled Alghatbar
Muddassar Farooq
A Framework for Detecting Malformed SMS Attack
11(10)
M. Zubair Rafique
Muhammad Khurram Khan
Khaled Alghathbar
Muddassar Farooq
A Metadata Model for Data Centric Security
21(8)
Benjmin Aziz
Shirley Crompton
Michael Wilson
SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements
29(8)
Benjamin Aziz
Alvaro Arenas
Michael Wilson
Self-keying Identification Mechanism for Small Devices
37(8)
Krzysztof Barczynski
Przemyslaw Blaskiewicz
Marek Klonowski
Miroslaw Kutylowski
A Software Architecture for Introducing Trust in Java-Based Clouds
45(9)
Siegfried Podesser
Ronald Toegl
A Network Data Abstraction Method for Data Set Verification
54(9)
Jaeik Cho
Kyuwon Choi
Taeshik Shon
Jongsub Moon
Efficient De-Fragmented Writeback for Journaling File System
63(8)
Seung-Ho Lim
Hyun Jin Choi
Jong Hyuk Park
IMS Session Management Based on Usage Control
71(8)
Giorgos Karopoulos
Fabio Martinelli
Using Counter Cache Coherence to Improve Memory Encryptions Performance in Multiprocessor Systems
79(9)
Zhang Yuanyuan
Gu Junzhong
Dynamic Combinatorial Key Pre-distribution Scheme for Heterogeneous Sensor Networks
88(8)
Bidi Ying
Dimitrios Makrakis
Hussein T. Mouftah
Wenjun Lu
Exclusion Based VANETs (EBV)
96(9)
Ahmad A. Al-Daraiseh
Mohammed A. Moharrum
Embedding Edit Distance to Allow Private Keyword Search in Cloud Computing
105(9)
Julien Bringer
Herve Chabanne
Efficient Secret Sharing Schemes
114(8)
Chunli Lv
Xiaoqi Jia
Jingqiang Lin
Jiwu Jing
Lijun Tian
Mingli Sun
Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion
122(8)
Lu Leng
Jiashu Zhang
Gao Chen
Muhammad Khurram Khan
Ping Bai
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications
130(9)
Cheonshik Kim
Dongkyoo Shin
Dongil Shin
Xinpeng Zhang
An Ontology Based Information Security Requirements Engineering Framework
139(8)
Azeddine Chikh
Muhammad Abulaish
Syed Irfan Nabi
Khaled Alghathbar
Simulating Malicious Users in a Software Reputation System
147(10)
Anton Borg
Martin Boldt
Bengt Carlsson
Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks
157(7)
Jongsung Kim
Jong Hyuk Park
Young-Gon Kim
The Method of Database Server Detection and Investigation in the Enterprise Environment
164(8)
Namheun Son
Keun-gi Lee
Sang Jun Jeon
Hyunji Chung
Sangjin Lee
Changhoon Lee
Sensitive Privacy Data Acquisition in the iPhone for Digital Forensic Analysis
172(15)
Jinhyung Jung
Chorong Jeong
Keunduk Byun
Sangjin Lee
STA2011 - Data Management Track
An Efficient Processing Scheme for Continuous Queries Involving RFID and Sensor Data Streams
187(6)
Jeongwoo Park
Kwangjae Lee
Wooseok Ryu
Joonho Kwon
Bonghee Hong
Smart Warehouse Modeling Using Re-recording Methodology with Sensor Tag
193(8)
Gwangsoo Lee
Wooseok Ryu
Bonghee Hong
Joonho Kwon
SIMOnt: A Security Information Management Ontology Framework
201(8)
Muhammad Abulaish
Syed Irfan Nabi
Khaled Alghathbar
Azeddine Chikh
Using Bloom Filters for Mining Top-k Frequent Itemsets in Data Streams
209(8)
Younghee Kim
Kyungsoo Cho
Jaeyeol Yoon
Ieejoon Kim
Ungmo Kim
An RSN Tool: A Test Dataset Generator for Evaluating RFID Middleware
217(8)
Wooseok Ryu
Joonho Kwon
Bonghee Hong
Design and Implementation of a Virtual Reader for Emulation of RFID Physical Reader
225(6)
Jiwan Lee
Jekwan Park
Wooseok Ryu
Bonghee Hong
Joonho Kwon
Adaptive Optimal Global Resource Scheduling for a Cloud-Based Virtualized Resource Pool
231(10)
Lingli Deng
Qing Yu
Jin Peng
Maximal Cliques Generating Algorithm for Spatial Co-location Pattern Mining
241(10)
Seung Kwan Kim
Younghee Kim
Ungmo Kim
Author Index 251