Infrastructure Security

International Conference, InfraSec 2002 Bristol, UK, October 1–3, 2002 Proceedings

  • George Davida
  • Yair Frankel
  • Owen Rees
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2437)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Biometrics

    1. John Armington, Purdy Ho, Paul Koznek, Richard Martinez
      Pages 1-18
  3. Identification, Authentication, and Process

    1. Carlo Blundo, Paolo D’Arco, Alfredo De Santis, Clemente Galdi
      Pages 30-39
    2. Jan De Clercq
      Pages 40-58
  4. Analysis Process

  5. Mobile Networks

    1. Prakash Reddy, Venky Krishnan, Kan Zhang, Devaraj Das
      Pages 115-128
    2. Paulo S. Pagliusi
      Pages 129-144
  6. Vulnerability Assessment and Logs

    1. HyungJong Kim, KyungHee Koh, DongHoon Shin, HongGeun Kim
      Pages 145-161
    2. Ulrich Flegel
      Pages 162-179
  7. System Design

    1. Pascal Fenkam, Harald Gall, Mehdi Jazayeri, Christopher Kruegel
      Pages 180-198
    2. Matthias Enzmann, Thomas Kunz, Markus Schneider
      Pages 199-213
    3. Óscar Cánovas, Antonio F. Gómez, Humberto Martínez, Gregorio Martínez
      Pages 214-226
  8. Formal Methods

    1. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
      Pages 227-245
    2. Javier Lopez, Juan J. Ortega, Jose M. Troya
      Pages 246-259
  9. Cryptographic Techniques

    1. L. Chen, K. Harrison, D. Soldera, N. P. Smart
      Pages 260-275
    2. Mark Chapman, George Davida2
      Pages 276-287

About these proceedings

Introduction

Infrastructure Security Conference 2002 (InfraSec 2002) was created to promote security research and the development of practical solutions in the security of infrastructures – both government and commercial – such as the effective prevention of, detection of, reporting of, response to and recovery from security incidents. The conference, sponsored by the Datacard Group and Hewlett-Packard Laboratories, was held on October 1–3, 2002. Organizational support was provided by the Center for Cryptography, Computer and Network Security Center at the University of Wisconsin- Milwaukee. Organizing a conference is a major undertaking requiring the efforts of many individuals. The Conference President, Graham Higgins (Datacard Group), oversaw all arrangements for the conference, and the General Chair, Susan Thompson (Datacard Group), oversaw the local organization and registration. Local arrangements were directed by Jan Ward (Hewlett-Packard Laboratories) and Jamie Wilson (Datacard Group). Financial arrangements were managed by Natalie Churchill (Hewlett-Packard Laboratories). We wish to thank the organizers, without whose support this conference would not have been possible. This conference program included two keynote speakers: Bob Evans (Office of the e-Envoy) and Vic Maconachy (Department of Defense). The program committee considered 44 submissions of which 23 papers were accepted. Each submitted paper was reviewed by a minimum of three referees. These proceedings contain revised versions of the accepted papers. Revisions were not checked and the authors bear full responsibility for the content of their papers.

Keywords

Authentication Information Internet authenticity authorization systems biometric identification biometrics communications protocols identity information infrastructure protection networks privacy risk analysis security architectures trust

Editors and affiliations

  • George Davida
    • 1
  • Yair Frankel
    • 2
  • Owen Rees
    • 3
  1. 1.University of Wisconsin-MilwaukeeMilwaukeeUSA
  2. 2.TechTegrity LLCWestfieldUSA
  3. 3.Hewlett-Packard LaboratoriesBristolUK

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-45831-X
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-44309-4
  • Online ISBN 978-3-540-45831-9
  • Series Print ISSN 0302-9743
  • About this book