Skip to main content
  • Conference proceedings
  • © 2006

Emerging Trends in Information and Communication Security

International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3995)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ETRICS: International Conference on Emerging Trends in Information and Communication Security

Conference proceedings info: ETRICS 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

  2. Multilateral Security

  3. Security in Service-Oriented Computing

    1. Optimized Workflow Authorization in Service Oriented Architectures

      • Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemper
      Pages 30-44
    2. A P2P Content Authentication Protocol Based on Byzantine Agreement

      • Esther Palomar, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
      Pages 60-72
  4. Secure Mobile Applications

    1. Transitive Trust in Mobile Scenarios

      • Nicolai Kuntze, Andreas U. Schmidt
      Pages 73-85
    2. An Open, PKI-Based Mobile Payment System

      • Marko Hassinen, Konstantin Hyppönen, Keijo Haataja
      Pages 86-100
    3. Secure Rejoining Scheme for Dynamic Sensor Networks

      • Young-Sik Hwang, Seung-Wan Han, Taek-Yong Nam
      Pages 101-114
    4. Developing Provable Secure M-Commerce Applications

      • Holger Grandy, Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
      Pages 115-129
  5. Enterprise Privacy

    1. Privacy-Preserving Decision Tree Mining Based on Random Substitutions

      • Jim Dowd, Shouhuai Xu, Weining Zhang
      Pages 145-159
  6. Privacy, Identity, and Anonymity

    1. Privacy with Delegation of Rights by Identity Management

      • Sven Wohlgemuth, Günter Müller
      Pages 175-190
    2. Revocable Anonymity

      • Stefan Köpsell, Rolf Wendolsky, Hannes Federrath
      Pages 206-220
  7. Security Engineering

    1. Security Engineering Using Problem Frames

      • Denis Hatebur, Maritta Heisel, Holger Schmidt
      Pages 238-253
    2. SecTOOL – Supporting Requirements Engineering for Access Control

      • Steffen Kolarczyk, Manuel Koch, Klaus-Peter Löhr, Karl Pauls
      Pages 254-267

Other Volumes

  1. Emerging Trends in Information and Communication Security

Editors and Affiliations

  • Institut für Informatik und Gesellschaft, Abt. Telematik, Albert-Ludwigs-Universität Freiburg, Freiburg, Germany

    Günter Müller

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access