Information Security Practice and Experience

First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings

  • Robert H. Deng
  • Feng Bao
  • HweeHwa Pang
  • Jianying Zhou
Conference proceedings ISPEC 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3439)

Table of contents

  1. Front Matter
  2. Network Security

    1. Stephan Riebach, Erwin P. Rathgeb, Birger Toedtmann
      Pages 1-12
    2. Philip Robinson, Christian Schaefer, Thomas Walter
      Pages 13-24
    3. Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh
      Pages 36-47
  3. Cryptographic Techniques I

    1. Patrick P. Tsang, Victor K. Wei
      Pages 48-60
    2. Marcel Fernandez, Miguel Soriano, Josep Cotrina
      Pages 61-73
    3. Heejin Park, Sang Kil Park, Ki-Ryong Kwon, Dong Kyue Kim
      Pages 74-84
    4. Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
      Pages 85-96
  4. Secure Architecture I

    1. Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo
      Pages 97-108
    2. Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu
      Pages 109-120
    3. Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Liang Bin
      Pages 121-131
    4. Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes
      Pages 132-143
  5. Access Control

    1. Frode Hansen, Vladimir Oleshchuk
      Pages 144-155
    2. Xu Liao, Li Zhang, Stephen C. F. Chan
      Pages 168-177
  6. Intrusion Detection

    1. Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari
      Pages 192-203
    2. Andre Adelsbach, Sebastian Gajek, Jörg Schwenk
      Pages 204-216
    3. Zhuowei Li, Amitabha Das, Sabu Emmanuel
      Pages 217-229

About these proceedings

Introduction

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.

Keywords

DRM Denial of Service Information Routing Session authentication information security installatioin intrusion detection network security oblivious transfer secure communications security systems security trust

Editors and affiliations

  • Robert H. Deng
    • 1
  • Feng Bao
    • 2
  • HweeHwa Pang
    • 3
  • Jianying Zhou
    • 4
  1. 1.School of Information SystemsSingapore Management UniversitySingapore
  2. 2.Institute for Infocomm ResearchSingapore
  3. 3.School of Information SystemsSingapore Management University 
  4. 4.Cryptography and Security Department Institute for Infocomm ResearchSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/b107167
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-25584-0
  • Online ISBN 978-3-540-31979-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book