New Approaches for Security, Privacy and Trust in Complex Environments

Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa

ISBN: 978-0-387-72366-2 (Print) 978-0-387-72367-9 (Online)

Table of contents (46 chapters)

previous Page of 3
  1. Front Matter

    Pages I-XV

  2. Digital Forensics

    1. No Access

      Book Chapter

      Pages 1-12

      FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints

    2. No Access

      Book Chapter

      Pages 13-24

      Digital Forensic Readiness as a Component of Information Security Best Practice

  3. Human-Computer Interaction I

    1. No Access

      Book Chapter

      Pages 25-35

      Value creation and Return On Security Investments (ROSI)

    2. No Access

      Book Chapter

      Pages 37-48

      Usability and Security of Personal Firewalls

  4. Computer-Based Trust

    1. No Access

      Book Chapter

      Pages 49-60

      Trusted Ticket Systems and Applications

    2. No Access

      Book Chapter

      Pages 61-72

      Trust Evaluation for Web Applications based on Behavioral Analysis

  5. Information Security Management I

    1. No Access

      Book Chapter

      Pages 73-84

      Improving the Information Security Model by using TFI

    2. No Access

      Book Chapter

      Pages 85-95

      Ontological Mapping of Common Criteria’s Security Assurance Requirements

  6. Network Security I

    1. No Access

      Book Chapter

      Pages 97-108

      Management of Exceptions on Access Control Policies

    2. No Access

      Book Chapter

      Pages 109-120

      Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols

  7. Information Security Management II

    1. No Access

      Book Chapter

      Pages 121-132

      Exploratory survey on an Evaluation Model for a Sense of Security

    2. No Access

      Book Chapter

      Pages 133-144

      Employees’ Adherence to Information Security Policies: An Empirical Study

  8. Network Security II

    1. No Access

      Book Chapter

      Pages 145-156

      Phishing in the Wireless: Implementation and Analysis

    2. No Access

      Book Chapter

      Pages 157-168

      Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks

  9. Access Control I

    1. No Access

      Book Chapter

      Pages 169-180

      A Credential-Based System for the Anonymous Delegation of Rights

    2. No Access

      Book Chapter

      Pages 181-192

      Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content

  10. Human-Computer Interaction II

    1. No Access

      Book Chapter

      Pages 193-203

      Identity Theft — Empirical evidence from a Phishing Exercise

    2. No Access

      Book Chapter

      Pages 205-216

      A Practical Usability Evaluation of Security Features in End-User Applications

  11. Intrusion Detection Systems

    1. No Access

      Book Chapter

      Pages 217-228

      Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis

    2. No Access

      Book Chapter

      Pages 229-240

      A Survey of Bots Used for Distributed Denial of Service Attacks

previous Page of 3