Advertisement

New Approaches for Security, Privacy and Trust in Complex Environments

Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa

  • Hein Venter
  • Mariki Eloff
  • Les Labuschagne
  • Jan Eloff
  • Rossouw von Solms

Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 232)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Digital Forensics

  3. Human-Computer Interaction I

    1. Christer Magnusson, Josef Molvidsson, Sven Zetterqvist
      Pages 25-35
    2. Almut Herzog, Nahid Shahmehri
      Pages 37-48
  4. Computer-Based Trust

    1. Nicolai Kuntze, Andreas U. Schmidt
      Pages 49-60
    2. Luiz Fernando Rust C. Carmo, Breno G. de Oliveira, Augusto C. Braga
      Pages 61-72
  5. Information Security Management I

    1. Rose-Mharie Åhlfeldt, Paolo Spagnoletti, Guttorm Sindre
      Pages 73-84
    2. Andreas Ekclhart, Stefan Fenz, Gernot Goluch, Edgar Weippl
      Pages 85-95
  6. Network Security I

    1. J. G. Alfaro, F. Cuppens, N. Cuppens-Boulahia
      Pages 97-108
  7. Information Security Management II

    1. Natsuko Hikage, Yuko Murayama, Carl Hauser
      Pages 121-132
    2. Mikko Siponen, Seppo Pahnila, Adam Mahmood
      Pages 133-144
  8. Network Security II

    1. Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, Jens B. Schmitt
      Pages 145-156
  9. Access Control I

    1. Liesje Demuynck, Bart De Decker, Wouter Joosen
      Pages 169-180
    2. Christian J. Eibl, S H Basie von Solms, Sigrid Schubert
      Pages 181-192
  10. Human-Computer Interaction II

    1. T Steyn, H A Kruger, L Drevin
      Pages 193-203
    2. S. M. Furnell, D. Katsabas, P. S. Dowland, F. Reid
      Pages 205-216
  11. Intrusion Detection Systems

    1. A. M. Rossudowski, H. S. Venter, J. H. P. Eloff
      Pages 217-228
    2. Vrizlynn L. Thing, Morris Sloman, Naranker Dulay
      Pages 229-240
  12. Access Control II

    1. Srijith K. Nair, Mohammad T. Dashti, Bruno Crispo, Andrew S. Tanenbaum
      Pages 241-252
    2. Sevasti Karatzouni, Nathan Clarke
      Pages 253-263
  13. Information Privacy I

  14. Access Control III

    1. Evangelos Kotsovinos, Ingo Friese, Martin Kurze, Jörg Heuer
      Pages 289-300
    2. Yuri Demchenko, Leon Gommans, Cees de Laat
      Pages 301-312
  15. Information Privacy II

    1. Claudio Agostino Ardagna, Marco Crcmonini, Ernesto Damiani, Sabrina De Vimercati, Pierangela Samarati
      Pages 313-324
    2. Jan Zibuschka, Lothar Fritsch, Mike Radmacher, Tobias Scherner, Kai Rannenberg
      Pages 325-336
  16. Access Control IV

    1. Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
      Pages 337-348
    2. Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia
      Pages 349-360
  17. Security Services

    1. Nicolai Kuntze, Andreas U. Schmidt, Christian Hett
      Pages 361-372
    2. Håvard Johansen, Dag Johansen, Robbert van Renesse
      Pages 373-384
  18. Access Control V

    1. E. Damiani, S. De Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati
      Pages 385-396
    2. Jan Kolter, Rolf Schillinger, Günther Pernul
      Pages 397-408
  19. Trust and Intrusion Detection Systems

    1. Andriy Panchenko, Lexi Pimenidis
      Pages 409-420
    2. Zhuowei Li, Amitabha Das, Jianying Zhou
      Pages 421-432
  20. Keynote paper

  21. IFIP WG 9.7/11.7 — IT Missue and the Law & the NoE “Future of Identity in the Information Society” (FIDIS) — Workshop on Security and Control of Identity in Society

  22. IFIF WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Managable Information Security

    1. Nicholas Tate, Sharman Lichtenstein, Matthew J. Warren
      Pages 473-478
    2. Tatjana Welzer, Marko Hölbl’, Ana Habjanič, Boštjan Brumen, Marjan Druzovec
      Pages 479-484
    3. Ronald C Dodge, Corey Bertram, Daniel Ragsdale
      Pages 485-490
  23. Back Matter
    Pages 497-498

About these proceedings

Introduction

International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit www.springer.com.

 

For more information about IFIP, please visit www.ifip.org.

Keywords

Access Control Computer-Based Trust Digital Forensics Firewall Human Computer Interaction Information Security Management Intrusion Detection Systems Network Security Radio-Frequency Identification (RFID) data security identity management networks privacy

Editors and affiliations

  • Hein Venter
    • 1
  • Mariki Eloff
    • 2
  • Les Labuschagne
    • 3
  • Jan Eloff
    • 1
  • Rossouw von Solms
    • 4
  1. 1.University of PretoriaSouth Africa
  2. 2.University of South AfricaSouth Africa
  3. 3.University of JohannesburgSouth Africa
  4. 4.Nelson Mandela Metropolitan UniversitySouth Africa

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-72367-9
  • Copyright Information International Federation for Information Processing 2007
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-72366-2
  • Online ISBN 978-0-387-72367-9
  • Series Print ISSN 1571-5736
  • Buy this book on publisher's site