SEC 2000:
Beijing,
China
Sihan Qing, Jan H. P. Eloff (Eds.):
Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China.
IFIP Conference Proceedings 175 Kluwer 2000, ISBN 0-7923-7914-4 BibTeX
@proceedings{DBLP:conf/sec/2000,
editor = {Sihan Qing and
Jan H. P. Eloff},
title = {Information Security for Global Information Infrastructures,
IFIP TC11 Fifteenth Annual Working Conference on Information
Security, August 22-24, 2000, Beijing, China},
booktitle = {SEC},
publisher = {Kluwer},
series = {IFIP Conference Proceedings},
volume = {175},
year = {2000},
isbn = {0-7923-7914-4},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Part one - Reviewed Papers
- Kai Rannenberg:
IT Security Certification and Criteria. Progress, Problems and Perspectives.
1-10 BibTeX
- Mariki M. Eloff, Sebastiaan H. von Solms:
Information Security: Process Evaluation and Product Evaluation.
11-18 BibTeX
- Helen L. Armstrong:
Managing Information Security in Healthcare - an Action Research Experience.
19-28 BibTeX
- Rossouw von Solms, Helen van de Haar:
From Trusted Information Security Controls to a Trusted Information Security Environment.
29-36 BibTeX
- Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis:
A Qualitative Approach to Information Availability.
37-48 BibTeX
- Sokratis K. Katsikas:
A Postgraduate Programme on Information and Communication Systems Security.
49-58 BibTeX
- Elmarie von Solms, Sebastiaan H. von Solms:
Information Security Management Through Measurement.
59-68 BibTeX
- Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng:
The Defense Framework for Large-scale Computer Network System.
69-78 BibTeX
- Wolfgang Eßmayr, Edgar Weippl:
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.
79-88 BibTeX
- Herbert Leitold, Peter Lipp, Andreas Sterbenz:
Independent Policy Oriented Layering of Security Services.
89-98 BibTeX
- Robert Willison:
Reducing Computer Fraud Through Situational Crime Prevention.
99-109 BibTeX
- Mikko T. Siponen:
Policies for Construction of Information Systems' Security Guidelines: Five Approaches.
111-120 BibTeX
- C. P. Louwrens, Sebastiaan H. von Solms:
"DNA-proofing" for Computer Systems - A New Approach to Computer Security?
121-129 BibTeX
- Costas Lambrinoudakis:
Using Smart Cards in an Educational Environment: Services and Security Features.
131-140 BibTeX
- Alida Liebenberg, Jan H. P. Eloff:
MASS: Model for an Auditing Security System.
141-150 BibTeX
- Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati:
Classifying Information for External Release.
151-160 BibTeX
- Yongge Wang:
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses.
161-170 BibTeX
- Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
CARDS: A Distributed System for Detecting Coordinated Attacks.
171-180 BibTeX
- Petar Horvatic, Jian Zhao, Niels J. Thorwirth:
Robust Audio Watermarking Based on Secure Spread Spectrum and Auditory Perception Model.
181-190 BibTeX
- Sun Yongxing, Wang Xinmei:
A Simple and Efficient Approach to Verfying Cryptographic Protocols.
191-199 BibTeX
- Wenling Wu, Dengguo Feng, Sihan Qing:
Power Analysis of RC6 and Serpent.
201-209 BibTeX
- Wang Mingsheng, Sihan Qing, Dengguo Feng:
A Simple Algorithm for Computing Several Sequences Synthesis.
211-220 BibTeX
- Claudia Eckert, Florian Erhard, Johannes Geiger:
GSFS - A New Group-Aware Cryptographic File System.
221-230 BibTeX
- Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer:
Robustness-Agile Encryptor for ATM Networks.
231-240 BibTeX
- Jinhui Chao, Kazuto Matsuo, Shigeo Tsujii:
Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties.
241-250 BibTeX
- Johann Großschädl:
A New Serial/Parallel Architecture for a Low Power Modular Multiplier.
251-260 BibTeX
- Haizhi Xu, Changwei Cui, Ying Lin, Tiejian Luo, Zhanqiu Dong:
Defending Against Null Calls Stream Attacks by Using a Double-Threshold Dynamic Filter.
261-270 BibTeX
- Steve Kremer, Olivier Markowitch:
A Multi-Party Non-Repudiation Protocol.
271-280 BibTeX
- Shaoquan Jiang, Dengguo Feng, Sihan Qing:
Analysis and Design of E-voting Protocol.
281-290 BibTeX
- Vladimir I. Gorodetski, Igor V. Kotenko, Victor A. Skormin:
Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community.
291-300 BibTeX
- Jussipekka Leiwo, Tuomas Aura, Pekka Nikander:
Towards Network Denial of Service Resistant Protocols.
301-310 BibTeX
- Elton Saul, Andrew Hutchison:
A Generic Graphical Specification Environment for Security Protocol Modelling.
311-320 BibTeX
- Rosanna Y. Chan, Jonathan C. Wong, Alex C. Chan:
Anonymous Electronic Voting System with Non-Transferable Voting Passes.
321-330 BibTeX
- Olivier Paul, Maryline Laurent:
Improving Packet Filters Management through Automatic and Dynamic Schemes.
331-340 BibTeX
- Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. Eloff:
A Context-Sensitive Access Control Model and Prototype Implementation.
341-350 BibTeX
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati:
Regulating Access To Semistructured Information on the Web.
351-360 BibTeX
- Gregory Neven, Frank Piessens, Bart De Decker:
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
361-370 BibTeX
- Michael Hitchens, Vijay Varadharajan:
Elements of a Language for Role-Based Access Control.
371-380 BibTeX
- Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Andrew S. Tanenbaum:
Disallowing Unauthorized State Changes of Distributed Shared Objects.
381-390 BibTeX
- Ian R. Greenshields, Zhihong Yang:
Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network.
391-400 BibTeX
- Mikko T. Siponen:
On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations.
401-410 BibTeX
- Matthew J. Warren, William Hutchinson:
Information Warfare: Fact or Fiction?
411-420 BibTeX
- Frans A. Lategan, Martin S. Olivier:
Enforcing Privacy by Withholding Private Information.
421-430 BibTeX
- Gregory J. Kirsch, Tim Tingkang Xia:
The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age.
431-440 BibTeX
- Les Labuschagne:
A Framework for Electronic Commerce Security.
441-450 BibTeX
- Feng Bao, Robert H. Deng, Jianying Zhou:
Electronic Payment Systems with Fair On-line Verification.
451-460 BibTeX
- Fangguo Zhang, Futai Zhang, Yumin Wang:
Fair Electronic Cash Systems with Multiple Banks.
461-470 BibTeX
- Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wong, Michael R. Lyu:
Securing Mobile Agents for Electronic Commerce: An Experiment.
471-480 BibTeX
- Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Diana Berbecaru, Antonio Lioy, Fabio Maino:
A Flexible Management Framework for Certificate Status Validation.
481-490 BibTeX
- Bart De Win, Jan Van den Bergh, Frank Matthijs, Bart De Decker, Wouter Joosen:
A Security Architecture for Electronic Commerce Applications.
491-500 BibTeX
Part Two - Invited Papers
Copyright © Sat May 16 23:37:19 2009
by Michael Ley (ley@uni-trier.de)