did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780387723662

New Approaches for Security, Privacy and Trust in Complex Environments

by ; ; ; ;
  • ISBN13:

    9780387723662

  • ISBN10:

    0387723668

  • Format: Hardcover
  • Copyright: 2007-05-11
  • Publisher: Springer-Verlag New York Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $179.99 Save up to $146.58
  • Buy Used
    $134.99
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This modern environment challenges the whole information security research community to focus on interdisciplinary and holistic approaches, while retaining the benefit of previous research efforts. This volume includes papers offering research contributions that focus both on access control in complex environments as well as other aspecs of computer security and privacy.

Table of Contents

Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprintsp. 1
Digital Forensic Readiness as a Component of Information Security Best Practicep. 13
Human-Computer Interaction I
Value creation and Return on Security Investments (ROSI)p. 25
Usability and Security of Personal Firewallsp. 37
Computer-Based Trust
Trusted Ticket Systems and Applicationsp. 49
Trust Evaluation for Web Applications based on Behavioral Analysisp. 61
Information Security Management I
Improving the Information Security Model by using TFIp. 73
Ontological Mapping of Common Criteria's Security Assurance Requirementsp. 85
Network Security I
Management of Exceptions on Access Control Policiesp. 97
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocolsp. 109
Information Security Management II
Exploratory Survey on an Evaluation Model for a Sense of Securityp. 121
Employees' Adherence to Information Security Policies: An Empirical Studyp. 133
Network Security II
Phishing in the Wireless: Implementation and Analysisp. 145
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networksp. 157
Access Control I
A Credential-Based System for the Anonymous Delegation of Rightsp. 169
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Contentp. 181
Human-Computer Interaction II
Identity Theft - Empirical Evidence from a Phishing Exercisep. 193
A Practical Usability Evaluation of Security Features in End-User Applicationsp. 205
Intrusion Detection Systems
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysisp. 217
A Survey of Bots Used for Distributed Denial of Service Attacksp. 229
Access Control II
A Hybrid PKI-IBC Based Ephemerizer Systemp. 241
Keystroke Analysis for Thumb-based Keyboards on Mobile Devicesp. 253
Information Privacy I
Security Remarks on a Convertible Nominative Signature Schemep. 265
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactionsp. 277
Access Control III
A Role-Based Architecture for Seamless Identity Management and Effective Task Separationp. 289
Extending Role Based Access Control Model for Distributed Multidomain Applicationsp. 301
Information Privacy II
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracyp. 313
Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioningp. 325
Access Control IV
Crafting Web Counters into Covert Channelsp. 337
OPA: Onion Policy Administration Model - Another approach to manage rights in DRMp. 349
Security Services
Non-Repudiation in Internet Telephonyp. 361
FirePatch: Secure and Time-Critical Dissemination of Software Patchesp. 373
Access Control V
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcingp. 385
Building a Distributed Semantic-aware Security Architecturep. 397
Trust and Intrusion Detection Systems
Using Trust to Resist Censorship in the Presence of Collusionp. 409
Evaluating the Effects of Model Generalization on Intrusion Detection Performancep. 421
Keynote paper
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRMp. 433
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society
Covert Identity Information in Direct Anonymous Attestation (DAA)p. 443
Safeguarding Personal Data using Rights Management in Distributed Applicationsp. 449
Identification Now and in the Future: Social Grant Distribution Process in South Africap. 457
Hard-drive Disposal and Identity Fraudp. 461
An analysis of security and privacy issues relating to RFID enabled ePassportsp. 467
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Manageable Information Security
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Frameworkp. 473
Teaching of Information Security in the "Health Care and Nursing" Postgraduate programp. 479
Remote Virtual Information Assurance Networkp. 485
Certifying the Computer Security Professional Using the Project Management Institute's PMP Modelp. 491
Author Indexp. 497
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program