Secure networking - CQRE (Secure) '99 : International Exhibition and Congress CQRE'99, usseldorf, Germany, November 30-December 2, 1999 : proceedings
| 000 | 00989camuu2200253 a 4500 | |
| 001 | 000001049563 | |
| 005 | 20000726104539 | |
| 008 | 991117s1999 nyua b 001 0 eng | |
| 010 | ▼a 99058804 | |
| 020 | ▼a 3540668004 (softcover : alk. paper) | |
| 040 | ▼a DLC ▼c CGU ▼d 244002 | |
| 049 | 0 | ▼l 151081553 |
| 050 | 0 0 | ▼a TK5105.59 ▼b .C67 1999 |
| 082 | 0 0 | ▼a 005.8 ▼2 21 |
| 090 | ▼a 005.8 ▼b C882s | |
| 111 | 2 | ▼a CQRE'99 ▼d (1999 : ▼c usseldorf, Germany) |
| 245 | 1 0 | ▼a Secure networking - CQRE (Secure) '99 : ▼b International Exhibition and Congress CQRE'99, usseldorf, Germany, November 30-December 2, 1999 : proceedings / ▼c Rainer Baumgart (ed.). |
| 260 | ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1999. | |
| 300 | ▼a ix, 258 p. : ▼b ill. ; ▼c 23 cm. | |
| 440 | 0 | ▼a Lecture notes in computer science ; ▼v 1740 |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Computer networks ▼x Security measures |
| 650 | 0 | ▼a Computer security |
| 700 | 1 | ▼a Baumgart, Rainer. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 C882s | 등록번호 121187027 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. 2 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 C882s | 등록번호 151081553 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 C882s | 등록번호 121187027 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 C882s | 등록번호 151081553 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
The CQRE [Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes. The unprecedented reliance on computer technology has transformed the previous technical side-issue "information security" to a management problem requiring decisions of strategic importance. Thus one of the main goals of the conference is to provide a platform for both technical specialists as well as decision makers from government, industry, commercial, and academic communities. The target of CQRE is to promote and stimulate dialogue between managers and experts, which seems to be necessary for providing secure information systems in the next millennium. Therefore CQRE consists of two parts: Part I mainly focuses on strategic issues of information security, while the focus of Part II is more technical in nature. This volume of the conference proceedings consists of the reviewed and invited contributions of the second part. The program committee considered 46 papers and selected only 15 for full presentation. For the participants’ convenience we have also included the notes of the invited lectures and short workshop talks in this volume.
The CQRE [Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes. The unprecedented reliance on computer technology has transformed the previous technical side-issue "information security" to a management problem requiring decisions of strategic importance. Thus one of the main goals of the conference is to provide a platform for both technical specialists as well as decision makers from government, industry, commercial, and academic communities. The target of CQRE is to promote and stimulate dialogue between managers and experts, which seems to be necessary for providing secure information systems in the next millennium. Therefore CQRE consists of two parts: Part I mainly focuses on strategic issues of information security, while the focus of Part II is more technical in nature. This volume of the conference proceedings consists of the reviewed and invited contributions of the second part. The program committee considered 46 papers and selected only 15 for full presentation. For the participants’ convenience we have also included the notes of the invited lectures and short workshop talks in this volume.
정보제공 :
목차
Risk Management.- Developing Electronic Trust Policies Using a Risk Management Model.- Security Design.- SECURE: A Simulation Tool for PKI Design.- Lazy Infinite-State Analysis of Security Protocols.- Electronic Payment.- Electronic Payments: Where Do We Go from Here?.- SmartCard Issues.- PCA: Jini-based Personal Card Assistant.- An X.509-Compatible Syntax for Compact Certificates.- Applications.- Secure and Cost Efficient Electronic Stamps.- Implementation of a Digital Lottery Server on WWW.- PKI-experiences (Workshop Notes).- Cert'eM: Certification System Based on Electronic Mail Service Structure.- A Method for Developing Public Key Infrastructure Models.- The Realities of PKI Inter-operability.- Mobile Security.- Mobile Security - An Overview of GSM, SAT and WAP.- Secure Transport of Authentication Data in Third Generation Mobile Phone Networks.- Cryptography.- Extending Wiener's Attack in the Presence of Many Decrypting Exponents.- Improving the Exact Security of Fiat-Shamir Signature Schemes.- Network Security (Workshop Notes).- On Privacy Issues of Internet Access Services via Proxy Servers.- Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2).- Key Recovery.- Auto-recoverable Auto-certifiable Cryptosystems.- Intrusion Detection.- A Distributed Intrusion Detection System Based on Bayesian Alarm Networks.- Interoperability.- Interoperability Characteristics of S/MIME Products.- The DEDICA Project: The Solution to the Interoperability Problems between the X.509 and EDIFACT Public Key Infrastructures.- Biometrics.- Multiresolution Analysis and Geometric Measures for Biometric Identification Systems.
정보제공 :
