New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa / edited by Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw von Solms.

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Venter, Hein (Editor), Eloff, Mariki (Editor), Labuschagne, Les (Editor), Eloff, Jan (Editor), Solms, Rossouw von (Editor)
Format: eBook
Language:English
Published: New York, NY : Springer US : Imprint: Springer, 2007.
Edition:1st ed. 2007.
Series:IFIP Advances in Information and Communication Technology, 232
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Digital Forensics
  • FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints
  • Digital Forensic Readiness as a Component of Information Security Best Practice
  • Human-Computer Interaction I
  • Value creation and Return On Security Investments (ROSI)
  • Usability and Security of Personal Firewalls
  • Computer-Based Trust
  • Trusted Ticket Systems and Applications
  • Trust Evaluation for Web Applications based on Behavioral Analysis
  • Information Security Management I
  • Improving the Information Security Model by using TFI
  • Ontological Mapping of Common Criteria’s Security Assurance Requirements
  • Network Security I
  • Management of Exceptions on Access Control Policies
  • Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
  • Information Security Management II
  • Exploratory survey on an Evaluation Model for a Sense of Security
  • Employees’ Adherence to Information Security Policies: An Empirical Study
  • Network Security II
  • Phishing in the Wireless: Implementation and Analysis
  • Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks
  • Access Control I
  • A Credential-Based System for the Anonymous Delegation of Rights
  • Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content
  • Human-Computer Interaction II
  • Identity Theft — Empirical evidence from a Phishing Exercise
  • A Practical Usability Evaluation of Security Features in End-User Applications
  • Intrusion Detection Systems
  • Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis
  • A Survey of Bots Used for Distributed Denial of Service Attacks
  • Access Control II
  • A Hybrid PKI-IBC Based Ephemerizer System
  • Keystroke Analysis for Thumb-based Keyboards on Mobile Devices
  • Information Privacy I
  • Security Remarks on a Convertible Nominative Signature Scheme
  • Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions
  • Access Control III
  • A Role-Based Architecture for Seamless Identity Management and Effective Task Separation
  • Extending Role Based Access Control Model for Distributed Multidomain Applications
  • Information Privacy II
  • A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy
  • Enabling Privacy of Real-Life LBS
  • Access Control IV
  • Crafting Web Counters into Covert Channels
  • OPA: Onion Policy Administration Model — Another approach to manage rights in DRM
  • Security Services
  • Non-Repudiation in Internet Telephony
  • FirePatch: Secure and Time-Critical Dissemination of Software Patches
  • Access Control V
  • An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing
  • Building a Distributed Semantic-aware Security Architecture
  • Trust and Intrusion Detection Systems
  • Using Trust to Resist Censorship in the Presence of Collusion
  • Evaluating the Effects of Model Generalization on Intrusion Detection Performance
  • Keynote paper
  • Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM
  • IFIP WG 9.7/11.7 — IT Missue and the Law & the NoE “Future of Identity in the Information Society” (FIDIS) — Workshop on Security and Control of Identity in Society
  • Covert Identity Information in Direct Anonymous Attestation (DAA)
  • Safeguarding Personal Data using Rights Management in Distributed Applications
  • Identification Now and in the Future: Social Grant Distribution Process in South Africa
  • Hard-drive Disposal and Identity Fraud
  • An analysis of security and privacy issues relating to RFID enabled ePassports
  • IFIF WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Managable Information Security
  • Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework
  • Teaching of Information Security in the “Health Care and Nursing” Postgraduate program
  • Remote Virtual Information Assurance Network
  • Certifying the Computer Security Professional Using the Project Management Institute’s PMP Model.