feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_595126871
    Format: Online-Ressource (XI, 450 S.)
    Edition: Online-Ausg. Berlin [u.a.] Springer 2006 Springer lecture notes archive
    ISBN: 9783540474883
    Series Statement: Lecture notes in computer science 648
    Content: Access Control -- Towards security in an open systems federation -- Type-level access controls for distributed structurally object-oriented database systems -- On the Chinese Wall model -- Formal Methods -- Formal methods and automated tool for timing-channel identification in tcb source code -- Separating the specification and implementation phases in cryptology -- Formal specification of security requirements using the theory of normative positions -- Invited Talk -- Breaking the traditional computer security research barriers -- Authentication I -- Verification and modelling of authentication protocols -- KryptoKnight authentication and key distribution system -- Associating metrics to certification paths -- Distributed Systems -- An Object-Oriented view of fragmented data processing for fault and intrusion tolerance in distributed systems -- The development and testing of the identity-based conference key distribution system for the RHODOS distributed system -- Policy enforcement in stub autonomous domains -- Authentication II -- Freshness assurance of authentication protocols -- A formal framework for authentication -- Timely authentication in distributed systems -- Database Security -- Polyinstantiation for cover stories -- On transaction processing for multilevel secure replicated databases -- Security constraint processing in multilevel secure AMAC schemata -- System Architectures -- M2S: A machine for multilevel security -- GDoM a multilevel document manager -- Applications -- UEPS — A second generation electronic wallet -- A hardware design model for cryptographic algorithms -- ASAX: Software architecture and rule-based language for universal audit trail analysis.
    Content: This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes. .
    Note: Literaturangaben
    Additional Edition: ISBN 354056246X
    Additional Edition: ISBN 9783540562467
    Additional Edition: Druckausg. Computer security - ESORICS 92 Berlin : Springer, 1992 ISBN 354056246X
    Additional Edition: ISBN 038756246X
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Computersicherheit ; Computersicherheit ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1649296606
    Format: Online-Ressource
    ISBN: 9783540474883
    Series Statement: Lecture Notes in Computer Science 648
    Additional Edition: ISBN 9783540562467
    Additional Edition: Buchausg. u.d.T. Computer security - ESORICS 92 Berlin : Springer, 1992 ISBN 354056246X
    Additional Edition: ISBN 038756246X
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Computersicherheit ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV022167195
    ISBN: 354056246X , 038756246X
    Series Statement: Lecture notes in computer science ...
    Note: Ab 10 (2005) Einzelaufnahmen
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    RVK:
    Keywords: Datenbank ; Kryptologie ; Verteiltes System ; Computersicherheit ; Konferenzschrift
    Author information: Bertino, Elisa 1957-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_524970300
    Format: Online-Ressource , v.: digital
    Edition: Online-Ausg. Springer-11645
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9781402081439
    Series Statement: IFIP International Federation for Information Processing 147
    Content: Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful. "Security and Protection in Information Processing Systems" contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.
    Additional Edition: ISBN 9781402081422
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781475780161
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781402081422
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781475780154
    Language: English
    Keywords: Computersicherheit
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_749281995
    Format: Online-Ressource (X, 325 pp) , digital
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9783540452997
    Series Statement: Lecture Notes in Computer Science 1895
    Content: his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents
    Additional Edition: ISBN 9783540410317
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783662201756
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783540410317
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Author information: Gollmann, Dieter
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    gbv_1773878484
    Format: 1 Online-Ressource(X, 317 p.)
    Edition: 1st ed. 2004.
    ISBN: 9781402081477
    Series Statement: IFIP Advances in Information and Communication Technology 153
    Content: Enforcing High-Level Security Properties for Applets -- On-the-Fly Metadata Stripping for Embedded Java Operating Systems -- Privacy Issues in RFID Banknote Protection Schemes -- Smartcard-Based Anonymization -- Privacy Protecting Protocols for Revokable Digital Signatures -- Anonymous Services Using Smart Cards and Cryptography -- Efficient Countermeasures Against Power Analysis for Elliptic Curve Cryptosystems -- Smart-Card Implementation of Elliptic Curve Cryptography and DPA-Type Attacks -- Differential Power Analysis Model and Some Results -- Place and Route for Secure Standard Cell Design -- A Survey on Fault Attacks -- Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard -- Secure Network Card -- A Pattern Oriented Lightweight Middleware for Smartcards -- Card-Centric Framework - Providing I/O Resources for Smart Cards -- On The Security of the DeKaRT Primitive -- An Optimistic Fair Exchange Protocol for Trading Electronic Rights -- Accountable Ring Signatures: A Smart Card Approach -- Checking and Signing XML Documents on Java Smart Cards -- XML Agent on Smart Cards.
    Content: Smart Card Research and Advanced Applications VI Edited by Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, and Anas Abou El Kalam In the Information Society, the smart card, or smart device with its processing power and link to its owner, will be the potential human representation or delegate in Ambient Intelligence (Pervasive Computing), where every appliance or computer will be connected, and where control and trust of the personal environment will be the next decade challenge. Smart card research is of increasing importance as the need for information security grows rapidly. Smart cards will play a very large role in ID management in secure systems. In many computer science areas, smart cards introduce new dimensions and opportunities. Disciplines like hardware design, operating systems, modeling systems, cryptography and distributed systems find new areas of applications or issues; smart cards also create new challenges for these domains. CARDIS, the IFIP Conference on Smart Card Research and Advanced Applications, gathers researchers and technologists who are focused in all aspects of the design, development, deployment, validation and application of smart cards or smart personal devices.This volume contains the 20 papers that have been selected by the CARDIS Program Committee for presentation at the 6th International Conference on Smart Card Research and Advanced Applications (CARDIS 2004), which was held in conjunction with the IFIP 18th World Computer Congress in Toulouse, France in August 2004 and sponsored by the International Federation for Information Processing (IFIP). With 20% of the papers coming from Asia, 20% from America, and 60% from Europe, the competition was particularly severe this year, with only 20 papers selected out of 45 very good submissions. Smart Card Research and Advanced Applications VI presents the latest advances in smart card research and applications, and will be essential reading for developers of smart cards and smart card applications, as well as for computer science researchers in computer architecture, computer security, and cryptography.
    Note: Description based upon print version of record , ""Contents""; ""Preface""; ""Acknowledgements""; ""ENFORCING HIGH-LEVEL SECURITY PROPERTIES FOR APPLETS""; ""ON-THE-FLY METADATA STRIPPING FOR EMBEDDED JAVA OPERATING SYSTEMS""; ""PRIVACY ISSUES IN RFID BANKNOTE PROTECTION SCHEMES""; ""SMARTCARD-BASED ANONYMIZATION""; ""PRIVACY PROTECTING PROTOCOLS FOR REVOKABLE DIGITAL SIGNATURES""; ""ANONYMOUS SERVICES USING SMART CARDS AND CRYPTOGRAPHY""; ""EFFICIENT COUNTERMEASURES AGAINST POWER ANALYSIS FOR ELLIPTIC CURVE CRYPTOSYSTEMS""; ""SMART-CARD IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY AND DPA-TYPE ATTACKS"" , ""DIFFERENTIAL POWER ANALYSIS MODEL AND SOME RESULTS""""PLACE AND ROUTE FOR SECURE STANDARD CELL DESIGN""; ""A SURVEY ON FAULT ATTACKS""; ""DIFFERENTIAL FAULT ANALYSIS ATTACK RESISTANT ARCHITECTURES FOR THE ADVANCED ENCRYPTION STANDARD*""; ""SECURE NETWORK CARD""; ""A PATTERN ORIENTED LIGHTWEIGHT MIDDLEWARE FOR SMARTCARDS""; ""CARD-CENTRIC FRAMEWORK - PROVIDING I/O RESOURCES FOR SMART CARDS""; ""ON THE SECURITY OF THE DEKART PRIMITIVE""; ""AN OPTIMISTIC FAIR EXCHANGE PROTOCOL FOR TRADING ELECTRONIC RIGHTS""; ""ACCOUNTABLE RING SIGNATURES: A SMART CARD APPROACH"" , ""CHECKING AND SIGNING XML DOCUMENTS ON JAVA SMART CARDS""""XML AGENT ON SMART CARDS""; ""INDEX OF CONTRIBUTORS""
    Additional Edition: ISBN 9781475780109
    Additional Edition: ISBN 9781402081460
    Additional Edition: ISBN 9781475780093
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781475780109
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781402081460
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781475780093
    Language: English
    Keywords: Chipkarte
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_1773878514
    Format: 1 Online-Ressource(XII, 313 p.)
    Edition: 1st ed. 2004.
    ISBN: 9781402081453
    Series Statement: IFIP Advances in Information and Communication Technology 148
    Content: Corporate Information Security Education -- Towards Corporate Information Security Obedience -- CIIP-RAM- A Security Risk Analysis Methodology for Critical Information Infrastructure Protection -- A Framework for Role-Based Monitoring of Insider Misuse -- Update/Patch Management Systems -- Investigating a Smart Technology -- Laboratory Support for Information Security Education -- An Holistic Approach to an International Doctoral Program -- A New Paradigm for Information Security Education at Doctoral Level -- Highly Qualified Information Security Personnel Training in Russia -- Doctor of Philosophy: It Security -- Doctoral Programme on ICS Security at the University of the Aegean -- An International Security Education Perspective -- DO Military Forces Need Ph.D.’s? -- A Doctoral Program with Specialization in Information Security -- A Security Model for Anonymous Credential Systems -- Private Information Storage with Logarithmic-Space Secure Hardware -- Taxonomy of Mixes and Dummy Traffic -- Identity Management for Self-Portrayal -- Privacy Preserving Online Reputation Systems -- A Risk-Driven Approach to Designing Privacy-Enhanced Secure Applications -- Privacy-Invasive Software in Filesharing Tools -- Infusing Privacy Norms in DRM.
    Content: This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that are currently particularly active in Security. The first one is the 10th IFIP Annual Working Conference on Information Security Management. It is organized by the IFIP WG 11. 1, which is itself dedicated to Information Security Management, i. e. , not only to the practical implementation of new security technology issued from recent research and development, but also and mostly to the improvement of security practice in all organizations, from multinational corporations to small enterprises. Methods and techniques are developed to increase personal awareness and education in security, analyze and manage risks, identify security policies, evaluate and certify products, processes and systems. Matt Warren, from Deakin University, Australia, who is the current Chair of WG 11. 1, acted as the Program Chair. The second workshop is organized by the IFIP WG 11. 8, dedicated to Information Security Education. This workshop is a follow-up of three issues of the World Conference on Information Security Education (WISE) that were also organized by WG 11. 8. The first WISE was organized by Louise Yngstrom in 1999 in Stockholm, and the next one, WISE’4, will be held in Moscow, Russia, 18-20 May 2005. This year, the workshop is aimed at developing a first draft of an international doctorate program allowing a specialization in IT Security.
    Note: Description based upon print version of record , ""Contents""; ""Preface""; ""10th IFIP WG 11.1 Annual Working Conference on Information Security Management Program Committees""; ""IFIP TC11 WG 11.8 � Information Security Education Workshiop Program Committees""; ""I-NetSec04 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems Program Committees""; ""PART ONE: 10th IFIP WG 11.1 Annual Working Conference on Information Security Management""; ""Corporate Information Security Education: Is Outcomes Based Education the Solution?""; ""Towards Corporate Information Security Obedience"" , ""CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection""""A Framework For Role-based Monitoring of Insider Misuse""; ""Update/Patch Management Systems: A Protocol Taxonomy with Security Implications""; ""Investigating a Smart Technology""; ""PART TWO: IFIP TC11 WG 11.8 � Information Security Education Workshop""; ""Laboratory Support for Information Security Education""; ""An Holistic Approach to an International Doctoral Program""; ""A New Paradigm for Information Security Education at Doctoral Level"" , ""Highly Qualified Information Security Personnel Training in Russia""""Doctor of Philosophy: IT Security""; ""Doctoral Programme on Information and Communication Systems Security at the University of the Aegean""; ""An International Security Perspective""; ""Do Military Forces Need Ph.D.s?""; ""A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach""; ""PART THREE: I-NetSec04 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems""; ""A Security Model for Anonymous Credential Systems"" , ""Private Information Storage with Logarithm-Space Secure Hardware""""Taxonomy of Mixes and Dummy Traffic""; ""Identity Management for Self-Portrayal""; ""Privacy Preserving Online Reputation Systems""; ""A Risk Driven Approach to Designing Privacy Enhanced Secure""; ""Privacy Invasive Software in File-Sharing Tools""; ""Infusing Privacy Norms in DRM � Incentives and Perspectives""
    Additional Edition: ISBN 9781475780147
    Additional Edition: ISBN 9781402081446
    Additional Edition: ISBN 9781475780130
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781475780147
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781402081446
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781475780130
    Language: English
    Keywords: Computersicherheit ; Datenschutz ; Ausbildung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_123035643
    Format: XI, 450 S. , graph. Darst. , 25 cm
    ISBN: 354056246X , 038756246X
    Series Statement: Lecture notes in computer science 648
    Note: Literaturangaben
    Additional Edition: Online-Ausg. Computer security - ESORICS 92 Berlin [u.a.] : Springer, 1992 ISBN 9783540474883
    Additional Edition: Erscheint auch als Online-Ausgabe Deswarte, Yves Computer Security - ESORICS 92 Berlin, Heidelberg : Springer Berlin Heidelberg, 1992 ISBN 9783540474883
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Computersicherheit ; Computersicherheit ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages