注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络信息安全信息与计算安全新趋向/会议录

信息与计算安全新趋向/会议录

信息与计算安全新趋向/会议录

定 价:¥723.20

作 者: Günter Müller 著
出版社: 崇文书局(原湖北辞书出版社)
丛编项:
标 签: 暂缺

购买这本书可以去


ISBN: 9783540346401 出版时间: 2006-12-01 包装: 平装
开本: 页数: 字数:  

内容简介

  This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006.The 36 revised full papers presented were carefully reviewed and selected from around 180 submissions. The papers are organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.

作者简介

暂缺《信息与计算安全新趋向/会议录》作者简介

图书目录

Multilateral Security
 Multilateral Security: Enabling Technologies and Their Evaluation
 Do You Trust Your Recommendations? An Exploration of Securityand Privacy Issues in Recommender Systems
 Security in Service-Oriented Computing
 Optimized Workflow Authorization in Service Oriented Architectures
 Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment
 A P2P Content Authentication Protocol Based on Byzantine Agreement
Secure Mobile Applications
 Transitive Trust in Mobile Scenarios
 An Open, PKI-Based Mobile Payment System
 Secure Rejoining Scheme for Dynamic Sensor Networks
 Developing Provable Secure M-Commerce Applications
Enterprise Privacy
 An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
 Privacy-Preserving Decision Tree Mining Based on Random Substitutions
Privacy, Identity, and Anonymity
 Policy-Based Integration of User and Provider-Sided Identity Management
 Privacy with Delegation of Rights by Identity Management
 A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System
 Revocable Anonymity
 Low Latency Anonymous Communication - How Long Are Users Willing to Wait?
Security Engineering
 Security Engineering Using Problem Frames
 SEcTOOL - Supporting Requirements Engineering for Access Control
 Possibilistic Information Flow Control in MAKS and Action Refinement
 Toward a Framework for Forensic Analysis of Scanning Worms
 A Comparison of Market Approaches to Software Vulnerability Disclosure
 ……
Security Policies
Security and Protocls
Intrusion Detection
Perspectives of Cryptographic Security
Author Index

本目录推荐