SEC 2000:
Beijing,
China
Sihan Qing, Jan H. P. Eloff (Eds.):
Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China.
IFIP Conference Proceedings 175 Kluwer 2000, ISBN 0-7923-7914-4 @proceedings{DBLP:conf/sec/2000,
editor = {Sihan Qing and
Jan H. P. Eloff},
title = {Information Security for Global Information Infrastructures,
IFIP TC11 Fifteenth Annual Working Conference on Information
Security, August 22-24, 2000, Beijing, China},
booktitle = {SEC},
publisher = {Kluwer},
series = {IFIP Conference Proceedings},
volume = {175},
year = {2000},
isbn = {0-7923-7914-4},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Part one - Reviewed Papers
- Kai Rannenberg:
IT Security Certification and Criteria. Progress, Problems and Perspectives.
1-10
- Mariki M. Eloff, Sebastiaan H. von Solms:
Information Security: Process Evaluation and Product Evaluation.
11-18
- Helen L. Armstrong:
Managing Information Security in Healthcare - an Action Research Experience.
19-28
- Rossouw von Solms, Helen van de Haar:
From Trusted Information Security Controls to a Trusted Information Security Environment.
29-36
- Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis:
A Qualitative Approach to Information Availability.
37-48
- Sokratis K. Katsikas:
A Postgraduate Programme on Information and Communication Systems Security.
49-58
- Elmarie von Solms, Sebastiaan H. von Solms:
Information Security Management Through Measurement.
59-68
- Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng:
The Defense Framework for Large-scale Computer Network System.
69-78
- Wolfgang Eßmayr, Edgar Weippl:
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.
79-88
- Herbert Leitold, Peter Lipp, Andreas Sterbenz:
Independent Policy Oriented Layering of Security Services.
89-98
- Robert Willison:
Reducing Computer Fraud Through Situational Crime Prevention.
99-109
- Mikko T. Siponen:
Policies for Construction of Information Systems' Security Guidelines: Five Approaches.
111-120
- C. P. Louwrens, Sebastiaan H. von Solms:
"DNA-proofing" for Computer Systems - A New Approach to Computer Security?
121-129
- Costas Lambrinoudakis:
Using Smart Cards in an Educational Environment: Services and Security Features.
131-140
- Alida Liebenberg, Jan H. P. Eloff:
MASS: Model for an Auditing Security System.
141-150
- Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati:
Classifying Information for External Release.
151-160
- Yongge Wang:
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses.
161-170
- Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
CARDS: A Distributed System for Detecting Coordinated Attacks.
171-180
- Petar Horvatic, Jian Zhao, Niels J. Thorwirth:
Robust Audio Watermarking Based on Secure Spread Spectrum and Auditory Perception Model.
181-190
- Sun Yongxing, Wang Xinmei:
A Simple and Efficient Approach to Verfying Cryptographic Protocols.
191-199
- Wenling Wu, Dengguo Feng, Sihan Qing:
Power Analysis of RC6 and Serpent.
201-209
- Wang Mingsheng, Sihan Qing, Dengguo Feng:
A Simple Algorithm for Computing Several Sequences Synthesis.
211-220
- Claudia Eckert, Florian Erhard, Johannes Geiger:
GSFS - A New Group-Aware Cryptographic File System.
221-230
- Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer:
Robustness-Agile Encryptor for ATM Networks.
231-240
- Jinhui Chao, Kazuto Matsuo, Shigeo Tsujii:
Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties.
241-250
- Johann Großschädl:
A New Serial/Parallel Architecture for a Low Power Modular Multiplier.
251-260
- Haizhi Xu, Changwei Cui, Ying Lin, Tiejian Luo, Zhanqiu Dong:
Defending Against Null Calls Stream Attacks by Using a Double-Threshold Dynamic Filter.
261-270
- Steve Kremer, Olivier Markowitch:
A Multi-Party Non-Repudiation Protocol.
271-280
- Shaoquan Jiang, Dengguo Feng, Sihan Qing:
Analysis and Design of E-voting Protocol.
281-290
- Vladimir I. Gorodetski, Igor V. Kotenko, Victor A. Skormin:
Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community.
291-300
- Jussipekka Leiwo, Tuomas Aura, Pekka Nikander:
Towards Network Denial of Service Resistant Protocols.
301-310
- Elton Saul, Andrew Hutchison:
A Generic Graphical Specification Environment for Security Protocol Modelling.
311-320
- Rosanna Y. Chan, Jonathan C. Wong, Alex C. Chan:
Anonymous Electronic Voting System with Non-Transferable Voting Passes.
321-330
- Olivier Paul, Maryline Laurent:
Improving Packet Filters Management through Automatic and Dynamic Schemes.
331-340
- Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. Eloff:
A Context-Sensitive Access Control Model and Prototype Implementation.
341-350
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati:
Regulating Access To Semistructured Information on the Web.
351-360
- Gregory Neven, Frank Piessens, Bart De Decker:
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
361-370
- Michael Hitchens, Vijay Varadharajan:
Elements of a Language for Role-Based Access Control.
371-380
- Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Andrew S. Tanenbaum:
Disallowing Unauthorized State Changes of Distributed Shared Objects.
381-390
- Ian R. Greenshields, Zhihong Yang:
Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network.
391-400
- Mikko T. Siponen:
On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations.
401-410
- Matthew J. Warren, William Hutchinson:
Information Warfare: Fact or Fiction?
411-420
- Frans A. Lategan, Martin S. Olivier:
Enforcing Privacy by Withholding Private Information.
421-430
- Gregory J. Kirsch, Tim Tingkang Xia:
The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age.
431-440
- Les Labuschagne:
A Framework for Electronic Commerce Security.
441-450
- Feng Bao, Robert H. Deng, Jianying Zhou:
Electronic Payment Systems with Fair On-line Verification.
451-460
- Fangguo Zhang, Futai Zhang, Yumin Wang:
Fair Electronic Cash Systems with Multiple Banks.
461-470
- Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wong, Michael R. Lyu:
Securing Mobile Agents for Electronic Commerce: An Experiment.
471-480
- Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Diana Berbecaru, Antonio Lioy, Fabio Maino:
A Flexible Management Framework for Certificate Status Validation.
481-490
- Bart De Win, Jan Van den Bergh, Frank Matthijs, Bart De Decker, Wouter Joosen:
A Security Architecture for Electronic Commerce Applications.
491-500
Part Two - Invited Papers
- Yiqun Lisa Yin:
On the Development of the Advanced Encryption Standard.
503-504
- Xuejia Lai:
Public Key Infrastructure: Managing the e-Business Security.
505-505
Copyright © Sun Mar 14 23:23:59 2010
by Michael Ley (ley@uni-trier.de)