Information Systems Security
Editat de Aditya Bagchi, Vijayalakshmi Atlurien Limba Engleză Paperback – 7 dec 2006
Preț: 326.48 lei
Preț vechi: 408.10 lei
-20% Nou
Puncte Express: 490
Preț estimativ în valută:
57.79€ • 67.36$ • 50.54£
57.79€ • 67.36$ • 50.54£
Carte tipărită la comandă
Livrare economică 21 ianuarie-04 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540689621
ISBN-10: 3540689621
Pagini: 404
Ilustrații: XVI, 384 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.61 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540689621
Pagini: 404
Ilustrații: XVI, 384 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.61 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Papers.- Privacy in the Electronic Society.- A Data Sharing Agreement Framework.- Password Exhaustion: Predicting the End of Password Usefulness.- Network Monitoring for Security and Forensics.- Data and Application Security.- Fairness Strategy for Multilevel Secure Concurrency Control Protocol.- Optimistic Anonymous Participation in Inter-organizational Workflow Instances.- O2O: Virtual Private Organizations to Manage Security Policy Interoperability.- Privacy Preserving Web-Based Email.- Access Control.- Context-Aware Provisional Access Control.- LRBAC: A Location-Aware Role-Based Access Control Model.- Extending Context Descriptions in Semantics-Aware Access Control.- Specification and Realization of Access Control in SPKI/SDSI.- Key Management and Security in Wireless Networks.- Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack.- An Efficient Key Assignment Scheme for Access Control in a Hierarchy.- Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers.- Secure Data Management in Reactive Sensor Networks.- Threat Analysis, Detection and Recovery.- Security Ontology: Simulating Threats to Corporate Assets.- Two-Stage Credit Card Fraud Detection Using Sequence Alignment.- New Malicious Code Detection Using Variable Length n-grams.- A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes.- Cryptography and Encryption.- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack.- A Partial Image Encryption Method with Pseudo Random Sequences.- High Capacity Lossless Data Hiding.- An Implementation and Evaluation of Online Disk Encryption for Windows Systems.- Short Papers and Research Reports.- Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract).- A Survey of Control-Flow Obfuscations.- Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments.- Secure Itineraries Framework for Mobile Agent Systems.- Malafide Intension Based Detection of Privacy Violation in Information System.- Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report).- Towards a Formal Specification Method for Enterprise Information System Security.- Recent Research on Privacy Preserving Data Mining.