The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP),focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government,...Themoreour societyrelies on electronicforms ofcommunication,themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence,researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines,organisationsandcountries,todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering,mobileagentsecurity,e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies,one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion,and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website:http://www.ifip.at.org/. Finally,wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers,whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety,willprovea drivingforce for futureconferencestocome.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Preface. Acknowledgements. Part 1: Reviewed Papers. 1. A Role?Based Specification of the SET Payment Transaction Protocol; H. Sakurada, Y. Tsukada. 2. Information Security: Mutual Authentication in E-Commerce; S.H. Von Solms, M.V. Kisimov. 3. Software-Based Receipt-Freeness in On-Line Elections; E. Magkos, et al. 4. ID-Based Structured Multisignature Schemes; Chih-Yin Lin, et al. 5. Probabilistic Relations for the Solitaire Keystream Generator; M. Pudovkina. 6. Hazard Analysis for Security Protocol Requirements; N. Foster, J. Jacob. 7. Securing RMI Communication; V. Naessens, et al. 8. Secure Java Development with UML; J. Jürgens. 9. Security Through Aspect-Oriented Programming; B. de Win, et al. 10. Extending a Campus Network with Remote Bubbles using IPsec; A. Bonnet, M. Lobelle. 11. Combining World Wide Web and Wireless Security; J. Claessens, et al. 12. On Mobile Agent Based Transactions in Moderately Hostile Environments; N. Borselius, et al. 13. SPARTA, A Mobile Agent Based Intrusion Detection System; C. Kriigel, et al. Part 2: Invited Paper. 1. Trust Domain Infrastructure Security Certification; P. van Dijken. Author Index.
Book by None
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 17,08 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 17,08 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 971314-n
Quantità: Più di 20 disponibili
Da: Best Price, Torrance, CA, U.S.A.
Condizione: New. SUPER FAST SHIPPING. Codice articolo 9780792375586
Quantità: 2 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9780792375586_new
Quantità: Più di 20 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: New. Codice articolo 971314-n
Quantità: Più di 20 disponibili
Da: moluna, Greven, Germania
Gebunden. Condizione: New. Preface. Acknowledgements. Part 1: Reviewed Papers. 1. A Role?Based Specification of the SET Payment Transaction Protocol H. Sakurada, Y. Tsukada. 2. Information Security: Mutual Authentication in E-Commerce S.H. Von Solms, M.V. Kisimov. 3. Software-B. Codice articolo 458442075
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition. Codice articolo 971314
Quantità: Più di 20 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: As New. Unread book in perfect condition. Codice articolo 971314
Quantità: Più di 20 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. 220. Codice articolo 263066968
Quantità: 4 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Feb2416190184581
Quantità: Più di 20 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. Print on Demand pp. 220 Illus. Codice articolo 5862279
Quantità: 4 disponibili