Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended...

Full description

Bibliographic Details
Other Authors: Deng, Robert H. (Editor), Bao, Feng (Editor), Pang, HweeHwa (Editor), Zhou, Jianying (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2005, 2005
Edition:1st ed. 2005
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Network Security
  • Risk Assessment of Production Networks Using Honeynets – Some Practical Experience
  • POSSET – Policy-Driven Secure Session Transfer
  • Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach
  • Robust Routing in Malicious Environment for Ad Hoc Networks
  • Cryptographic Techniques I
  • Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
  • Tracing Traitors by Guessing Secrets. The q-Ary Case
  • Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications
  • Countermeasures for Preventing Comb Method Against SCA Attacks
  • Secure Architecture I
  • An Email Worm Vaccine Architecture
  • Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model
  • Security On-demand Architecture with Multiple Modules Support
  • Measuring Resistance to Social Engineering
  • Access Control
  • Conformance Checking of RBAC Policy and its Implementation
  • A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications
  • A Task-Oriented Access Control Model for WfMS
  • Intrusion Detection
  • A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection
  • Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks
  • Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
  • Model Redundancy vs. Intrusion Detection
  • Applications and Case Studies
  • An Open Approach for Designing Secure Electronic Immobilizers
  • An Empirical Study on the Usability of Logout in a Single Sign-on System
  • Secure Software Delivery and Installation in Embedded Systems
  • A Restricted Multi-show Credential System and Its Application on E-Voting
  • Secure ArchitectureII
  • Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks
  • Using Trust for Restricted Delegation in Grid Environments
  • Computer Vulnerability Evaluation Using Fault Tree Analysis
  • An Identity-Based Grid Security Infrastructure Model
  • Data Security
  • Towards Multilateral-Secure DRM Platforms
  • Hiding Data in Binary Images
  • Performance Analysis of CDMA-Based Watermarking with Quantization Scheme
  • Protecting Mass Data Basing on Small Trusted Agent
  • Cryptographic Techniques II
  • On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
  • Token-Controlled Public Key Encryption
  • A New Class of Codes for Fingerprinting Schemes
  • t-Out-of-n String/Bit Oblivious Transfers Revisited