Skip to main content
  • Conference proceedings
  • © 2005

Information Security Practice and Experience

First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3439)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISPEC: International Conference on Information Security Practice and Experience

Conference proceedings info: ISPEC 2005.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (35 papers)

  1. Front Matter

  2. Network Security

    1. Risk Assessment of Production Networks Using Honeynets – Some Practical Experience

      • Stephan Riebach, Erwin P. Rathgeb, Birger Toedtmann
      Pages 1-12
    2. POSSET – Policy-Driven Secure Session Transfer

      • Philip Robinson, Christian Schaefer, Thomas Walter
      Pages 13-24
    3. Robust Routing in Malicious Environment for Ad Hoc Networks

      • Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh
      Pages 36-47
  3. Cryptographic Techniques I

    1. Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation

      • Patrick P. Tsang, Victor K. Wei
      Pages 48-60
    2. Tracing Traitors by Guessing Secrets. The q-Ary Case

      • Marcel Fernandez, Miguel Soriano, Josep Cotrina
      Pages 61-73
    3. Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications

      • Heejin Park, Sang Kil Park, Ki-Ryong Kwon, Dong Kyue Kim
      Pages 74-84
    4. Countermeasures for Preventing Comb Method Against SCA Attacks

      • Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
      Pages 85-96
  4. Secure Architecture I

    1. An Email Worm Vaccine Architecture

      • Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo
      Pages 97-108
    2. Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model

      • Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu
      Pages 109-120
    3. Security On-demand Architecture with Multiple Modules Support

      • Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Liang Bin
      Pages 121-131
    4. Measuring Resistance to Social Engineering

      • Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes
      Pages 132-143
  5. Access Control

    1. Conformance Checking of RBAC Policy and its Implementation

      • Frode Hansen, Vladimir Oleshchuk
      Pages 144-155
    2. A Task-Oriented Access Control Model for WfMS

      • Xu Liao, Li Zhang, Stephen C. F. Chan
      Pages 168-177
  6. Intrusion Detection

    1. Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks

      • Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari
      Pages 192-203
    2. Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures

      • Andre Adelsbach, Sebastian Gajek, Jörg Schwenk
      Pages 204-216
    3. Model Redundancy vs. Intrusion Detection

      • Zhuowei Li, Amitabha Das, Sabu Emmanuel
      Pages 217-229

Other Volumes

  1. Information Security Practice and Experience

About this book

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.

Keywords

  • DRM
  • Denial of Service
  • Information
  • Routing
  • Session
  • authentication
  • information security
  • installatioin
  • intrusion detection
  • network security
  • oblivious transfer
  • secure communications
  • security
  • systems security
  • trust

Editors and Affiliations

  • School of Information Systems, Singapore Management University, Singapore

    Robert H. Deng

  • Institute for Infocomm Research, Singapore

    Feng Bao

  • School of Information Systems, Singapore Management University,  

    HweeHwa Pang

  • Cryptography and Security Department Institute for Infocomm Research, Singapore

    Jianying Zhou

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions