Information Security Practice and Experience

First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings

  • Robert H. Deng
  • Feng Bao
  • HweeHwa Pang
  • Jianying Zhou
Conference proceedings ISPEC 2005

DOI: 10.1007/b107167

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3439)

Table of contents (35 papers)

  1. Front Matter
  2. Network Security

    1. Risk Assessment of Production Networks Using Honeynets – Some Practical Experience
      Stephan Riebach, Erwin P. Rathgeb, Birger Toedtmann
      Pages 1-12
    2. POSSET – Policy-Driven Secure Session Transfer
      Philip Robinson, Christian Schaefer, Thomas Walter
      Pages 13-24
    3. Robust Routing in Malicious Environment for Ad Hoc Networks
      Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh
      Pages 36-47
  3. Cryptographic Techniques I

    1. Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
      Patrick P. Tsang, Victor K. Wei
      Pages 48-60
    2. Tracing Traitors by Guessing Secrets. The q-Ary Case
      Marcel Fernandez, Miguel Soriano, Josep Cotrina
      Pages 61-73
    3. Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications
      Heejin Park, Sang Kil Park, Ki-Ryong Kwon, Dong Kyue Kim
      Pages 74-84
    4. Countermeasures for Preventing Comb Method Against SCA Attacks
      Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
      Pages 85-96
  4. Secure Architecture I

    1. An Email Worm Vaccine Architecture
      Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo
      Pages 97-108
    2. Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model
      Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu
      Pages 109-120
    3. Security On-demand Architecture with Multiple Modules Support
      Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Liang Bin
      Pages 121-131
    4. Measuring Resistance to Social Engineering
      Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes
      Pages 132-143
  5. Access Control

    1. Conformance Checking of RBAC Policy and its Implementation
      Frode Hansen, Vladimir Oleshchuk
      Pages 144-155
    2. A Task-Oriented Access Control Model for WfMS
      Xu Liao, Li Zhang, Stephen C. F. Chan
      Pages 168-177
  6. Intrusion Detection

    1. Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks
      Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari
      Pages 192-203
    2. Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
      Andre Adelsbach, Sebastian Gajek, Jörg Schwenk
      Pages 204-216
    3. Model Redundancy vs. Intrusion Detection
      Zhuowei Li, Amitabha Das, Sabu Emmanuel
      Pages 217-229

About these proceedings


The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.


DRM Denial of Service Information Routing Session authentication information security installatioin intrusion detection network security oblivious transfer secure communications security systems security trust

Editors and affiliations

  • Robert H. Deng
    • 1
  • Feng Bao
    • 2
  • HweeHwa Pang
    • 3
  • Jianying Zhou
    • 4
  1. 1.School of Information SystemsSingapore Management UniversitySingapore
  2. 2.Institute for Infocomm ResearchSingapore
  3. 3.School of Information SystemsSingapore Management University 
  4. 4.Cryptography and Security Department Institute for Infocomm ResearchSingapore

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-25584-0
  • Online ISBN 978-3-540-31979-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349