did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540443094

Infrastructure Security: International Conference, Infrasec 2002, Bristol, Uk, October 1-3, 2002 Proceedings

by ; ;
  • ISBN13:

    9783540443094

  • ISBN10:

    3540443096

  • Format: Paperback
  • Copyright: 2002-10-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00 Save up to $80.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the Infrastructure Security Conference, InfraSec 2002, held in Bristol, UK in October 2002. The 23 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on biometrics; identification, authentication, and process; analysis process; mobile networks; vulnerability assessment and logs; systems design; formal methods; cryptographic techniques, and networks.

Table of Contents

Biometrics
Biometric Authentication in Infrastructure Security
1(18)
John Armington
Purdy Ho
Paul Koznek
Richard Martinez
Denial of Access in Biometrics-Based Authentication Systems
19(11)
Luciano Rila
Identification, Authentication, and Process
A Novel Approach to Proactive Password Checking
30(10)
Carlo Blundo
Paolo D'Arco
Alfredo De Santis
Clemente Galdi
Single Sign-On Architectures
40(19)
Jan De Clercq
Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information
59(14)
Marco Casassa Mont
Richard Brown
Analysis Process
How to Buy Better Testing (Using Competition to Get the Most Security and Robustness for Your Dollar)
73(15)
Stuart Schechter
Structured Risk Analysis
88(16)
Neil McEvoy
Andrew Whitcombe
A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls
104(11)
E.S. Siougle
V.C. Zorkadis
Mobile Networks
Authentication and Authorization of Mobile Clients in Public Data Networks
115(14)
Prakash Reddy
Venky Krishnan
Kan Zhang
Devaraj Das
A Contemporary Foreword on GSM Security
129(16)
Paulo S. Pagliusi
Vulnerability Assessment and Logs
Vulnerability Assessment Simulation for Information Infrastructure Protection
145(17)
HyungJong Kim
KyungHee Koh
DongHoon Shin
HongGeun Kim
Pseudonymizing Unix Log Files
162(18)
Ulrich Flegel
System Design
DPS: An Architectural Style for Development of Secure Software
180(19)
Pascal Fenkam
Harald Gall
Mehdi Jazayeri
Christopher Kruegel
A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping
199(15)
Matthias Enzmann
Thomas Kunz
Markus Schneider
Different Smartcard-Based Approaches to Physical Access Control
214(13)
Oscar Canovas
Antonio F. Gomez
Humberto Martinez
Gregorio Martinez
Formal Methods
Authenticity and Provability -- A Formal Framework
227(19)
Sigrid Gurgens
Peter Ochsenschlager
Carsten Rudolph
Protocol Engineering Applied to Formal Analysis of Security Systems
246(14)
Javier Lopez
Juan J. Ortega
Jose M. Troya
Cryptographic Techniques
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
260(16)
L. Chen
K. Harrison
D. Soldera
N.P. Smart
Plausible Deniability Using Automated Linguistic Stegonagraphy
276(12)
Mark Chapman
George Davida
Virtual Software Tokens -- A Practical Way to Secure PKI Roaming
288(15)
Taekyoung Kwon
Bit-Serial AOP Arithmetic Architectures over GF(2m)
303(11)
Hyun-Sung Kim
Kee-Young Yoo
Networks
A Practical Distributed Authorization System for GARA
314(11)
William A. Adamson
Olga Kornievskaia
Design of a VPN Software Solution Integrating TCP and UDP Services
325(14)
Javier Lopez
Jose A. Montenegro
Rodrigo Roman
Jorge Davila
Author Index 339

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program