Advances in network and distributed systems security : IFIP TC11 WG11.4 First Annual Working Conference on Network Security : November 26-27, 2001, Leuven, Belgium
| 000 | 01279camuu22003014a 4500 | |
| 001 | 000000767870 | |
| 005 | 20091125170524 | |
| 008 | 010920s2002 maua b 101 0 eng | |
| 010 | ▼a ?01050286 | |
| 015 | ▼a GBA1-67617 | |
| 020 | ▼a 0792375580 | |
| 040 | ▼a DLC ▼c DLC ▼d C#P ▼d UKM ▼d OHX ▼d 211009 | |
| 042 | ▼a pcc | |
| 049 | 1 | ▼l 121063066 ▼f 과학 |
| 050 | 0 0 | ▼a TK5105.59 ▼b .I39 2001 |
| 072 | 7 | ▼a TK ▼2 lcco |
| 082 | 0 0 | ▼a 005.8 ▼2 21 |
| 090 | ▼a 005.8 ▼b I237a | |
| 111 | 2 | ▼a IFIP TC11 WG11.4 Working Conference on Network Security ▼n (1st : ▼d 2001 : ▼c Leuven, Belgium) |
| 245 | 1 0 | ▼a Advances in network and distributed systems security : ▼b IFIP TC11 WG11.4 First Annual Working Conference on Network Security : November 26-27, 2001, Leuven, Belgium / ▼c edited by Bart de Decker ... [et al.]. |
| 260 | ▼a Boston : ▼b Kluwer Academic Publishers , ▼c c2002. | |
| 300 | ▼a xi, 202 p. : ▼b ill. ; ▼c 25 cm. | |
| 490 | 1 | ▼a International Federation for Information Processing |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Computer networks ▼x Security measures ▼x Congresses. |
| 700 | 1 | ▼a Decker, Bart de , ▼d 1958- |
| 830 | 0 | ▼a International Federation for Information Processing (Series) |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 I237a | 등록번호 121063066 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP),focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity.
Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e
government,....Themoreour societyrelies on electronicforms ofcommunication,themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence,researchonmethodsandtechniques toimprove network
security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines,organisationsandcountries,todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin
eering,mobileagentsecurity,e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies,one dealing withBelgium'sintentionto replacetheidentity card
ofitscitizensbyanelectronicversion,and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which
can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network
security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in
thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP
website:http://www.ifip.at.org/. Finally,wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers
andtotheauthorsandinvitedspeakers,whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety,willprovea
drivingforce for futureconferencestocome.
정보제공 :
목차
Preface. Acknowledgements. Part 1: Reviewed Papers. 1. A Role?Based Specification of the SET Payment Transaction Protocol; H. Sakurada, Y. Tsukada. 2. Information Security: Mutual Authentication in E-Commerce; S.H. Von Solms, M.V. Kisimov. 3. Software-Based Receipt-Freeness in On-Line Elections; E. Magkos, et al. 4. ID-Based Structured Multisignature Schemes; Chih-Yin Lin, et al. 5. Probabilistic Relations for the Solitaire Keystream Generator; M. Pudovkina. 6. Hazard Analysis for Security Protocol Requirements; N. Foster, J. Jacob. 7. Securing RMI Communication; V. Naessens, et al. 8. Secure Java Development with UML; J. Jurgens. 9. Security Through Aspect-Oriented Programming; B. de Win, et al. 10. Extending a Campus Network with Remote Bubbles using IPsec; A. Bonnet, M. Lobelle. 11. Combining World Wide Web and Wireless Security; J. Claessens, et al. 12. On Mobile Agent Based Transactions in Moderately Hostile Environments; N. Borselius, et al. 13. SPARTA, A Mobile Agent Based Intrusion Detection System; C. Kriigel, et al. Part 2: Invited Paper. 1. Trust Domain Infrastructure Security Certification; P. van Dijken. Author Index.
정보제공 :
