E-Book, Englisch, Band 232, 498 Seiten
Reihe: IFIP Advances in Information and Communication Technology
Venter / Eloff / Labuschagne New Approaches for Security, Privacy and Trust in Complex Environments
1. Auflage 2007
ISBN: 978-0-387-72367-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
E-Book, Englisch, Band 232, 498 Seiten
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-0-387-72367-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This modern environment challenges the whole information security research community to focus on interdisciplinary and holistic approaches, while retaining the benefit of previous research efforts. This volume includes papers offering research contributions that focus both on access control in complex environments as well as other aspecs of computer security and privacy.
Autoren/Hrsg.
Weitere Infos & Material
1;Foreword;6
2;Organization;8
3;Table of Contents;12
4;FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints;17
5;Digital Forensic Readiness as a Component of Information Security Best Practice;29
6;Value creation and Return On Security Investments ( ROSI);41
7;Usability and Security of Personal Firewalls;52
8;Trusted Ticket Systems and Applications;64
9;Trust Evaluation for Web Applications based on Behavioral Analysis;76
10;Improving the Information Security Model by using TFI;88
11;Ontological Mapping of Common Criteria's Security Assurance Requirements;100
12;Management of Exceptions on Access Control Policies;111
13;Security Analysis of Two Ultra- Lightweight RFID Authentication Protocols;123
14;Exploratory survey on an evaluation model for a sense of security;135
15;Employees' Adherence to Information Security Policies: An Empirical Study;147
16;Phishing in the Wireless: Implementation and Analysis;159
17;Secure Path- Key Revocation for Symmetric Key Pre- distribution Schemes in Sensor Networks;171
18;A Credential-Based System for the Anonymous Delegation of Rights;183
19;Development and Application of a Proxy Server for Transparently, Digitally Signing E- Learning Content;195
20;Identity Theft - Empirical evidence from a Phishing exercise;207
21;A practical usability evaluation of security features in end- user applications;218
22;Personal Anomaly- based Intrusion Detection Smart Card Using Behavioural Analysis;230
23;A Survey of Bots Used for Distributed Denial of Service Attacks;242
24;A Hybrid PKI- IBC Based Ephemerizer System;254
25;Keystroke Analysis for Thumb-based Keyboards on Mobile Devices;266
26;Security Remarks on a Convertible Nominative Signature Scheme;277
27;Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions;288
28;A role- based architecture for seamless identity management and effective task separation;300
29;Extending Role Based Access Control Model for Distributed Multidomain Applications;312
30;A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy;324
31;Enabling Privacy of Real- Life LBS;336
32;Crafting Web Counters into Covert Channels;348
33;OPA : Onion Policy Administration Model - Another approach to manage rights in DRM;360
34;Non-Repudiation in Internet Telephony;372
35;FirePatch: Secure and Time- Critical Dissemination of Software Patches;384
36;An Experimental Evaluation of Multi- key Strategies for Data Outsourcing;396
37;Building a Distributed Semantic- aware Security Architecture;408
38;Using Trust to Resist Censorship in the Presence of Collusion;420
39;Evaluating the Effects of Model Generalization on Intrusion Detection Performance;432
40;Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM;444
41;Covert Identity Information in Direct Anonymous Attestation ( DAA);454
42;Safeguarding Personal Data using Rights Management in Distributed Applications;460
43;Identification Now and in the Future: Social Grant Distribution Process in South Africa;468
44;Hard- drive Disposal and Identity Fraud;471
45;An analysis of security and privacy issues relating to RFID enabled ePassports;477
46;Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework;483
47;Teaching of Information Security in the "Health Care and Nursing" Postgraduate program;489
48;Remote Virtual Information Assurance Network;495
49;Certifying the Computer Security Professional Using the Project Management Institute's PMP Model;501
50;Author Index;507




