Global Security, Safety, and Sustainability

5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings

Editors:

ISBN: 978-3-642-04061-0 (Print) 978-3-642-04062-7 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Chapter

    Pages 1-8

    Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush!

  3. No Access

    Chapter

    Pages 9-17

    A Security Audit Framework for Security Management in the Enterprise

  4. No Access

    Chapter

    Pages 18-26

    Watermarking Spatial Data in Geographic Information Systems

  5. No Access

    Chapter

    Pages 27-34

    Situation Awareness in Systems of Systems Ad-Hoc Environments

  6. No Access

    Chapter

    Pages 35-42

    The Georgia’s Cyberwar

  7. No Access

    Chapter

    Pages 43-55

    The UK Government’s Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture

  8. No Access

    Chapter

    Pages 56-63

    Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions

  9. No Access

    Chapter

    Pages 64-75

    Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer’s Trust

  10. No Access

    Chapter

    Pages 76-94

    A Systems Framework for Sustainability

  11. No Access

    Chapter

    Pages 95-103

    Hybrid Genetic Algorithm for Travel Time Reliability of Optimal Path

  12. No Access

    Chapter

    Pages 104-111

    Geofencing in a Security Strategy Model

  13. No Access

    Chapter

    Pages 112-121

    Using Business Process Execution Language to Handle Evaluation Factors for Web Services Compositions

  14. No Access

    Chapter

    Pages 122-131

    The Significance of Security in Transmitting Clinical Data

  15. No Access

    Chapter

    Pages 132-137

    Security Concern over Earth Viewer Software Using Satellite Photo Service

  16. No Access

    Chapter

    Pages 138-144

    The People’s Republic of China – The Emerging Cyberpower

  17. No Access

    Chapter

    Pages 145-155

    Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation

  18. No Access

    Chapter

    Pages 156-165

    Neural Networks for Intrusion Detection Systems

  19. No Access

    Chapter

    Pages 166-173

    Exploitation of Secrets Injected in Java Midlets

  20. No Access

    Chapter

    Pages 174-182

    Biometrically Based Electronic Signatures for a Public Networked Environment

  21. No Access

    Chapter

    Pages 183-190

    Policy Translation and Reconciliation Techniques for the System-of-Systems Domain

previous Page of 2