Security and Protection in Information Processing Systems (IFIP Advances in Information and Communication Technology v. 147 18th)

Security and Protection in Information Processing Systems (IFIP Advances in Information and Communication Technology v. 147 18th)

By: Yves Deswarte (editor), Sushil Jajodia (editor), Frederic Cuppens (editor), Lingyu Wang (editor)Hardback

1 - 2 weeks availability

Description

Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful. Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.

Create a review

Contents

An Abstract Reduction Model for Computer Security Risk.- Remediation Graphs for Security Patch Management.- Security Modelling for Risk Analysis.- Contrasting Malicious Java Applets by Modifying the Java Virtual Machine.- Fast Digital Certificate Revocation.- DHCP Authentication Using Certificates.- Updating Encrypted XML Documents on Untrusted Machines.- Maille Authentication - A Novel Protocol for Distributed Authentication.- Spam Filter Analysis.- An Asymetric Cryptography Secure Channel Protocol for Smart Cards.- Dependable Security by Twisted Secret Sharing.- Identity-based Key Infrastructures (IKI).- A Language Driven IDS for Event and Alert Correlation.- Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks.- Visualising Intrusions: Watching the Webserver

Product Details

  • publication date: 27/07/2004
  • ISBN13: 9781402081422
  • Format: Hardback
  • Number Of Pages: 562
  • ID: 9781402081422
  • weight: 1078
  • ISBN10: 1402081421
  • edition: 18th

Delivery Information

  • Saver Delivery: Yes
  • 1st Class Delivery: Yes
  • Courier Delivery: Yes
  • Store Delivery: Yes

Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly

Close