Preface | p. xi |
IFIP/Sec'03 Conference Committees | p. xiii |
IFIP/Sec'03 Workshop Program Committees | p. xvii |
Secure Networks and Distributed Systems | |
Trust Mediation for Distributed Information Systems | p. 1 |
Concerning Enterprise Network Vulnerability to HTTP Tunneling | p. 13 |
Providing Voice Privacy Over Public Switched Telephone Networks | p. 25 |
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages | p. 37 |
Establishing Chain of Evidence as a Base for Non-Repudiation Services | p. 49 |
Content Protection | |
Securing XML-based Multimedia Content | p. 61 |
Secure Audit Logging with Tamper-Resistant Hardware | p. 73 |
PCMHoDC | p. 85 |
Secure Multicast Communication and Secure Mobile Networks | |
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets | p. 97 |
Introducing PKI to Enhance Security in Future Mobile Networks | p. 109 |
A Time Driven Methodology for Key Dimensioning in Multicast Communications | p. 121 |
A Flexible Category-Based Collusion-Resistant Key Management Scheme for Multicast | p. 133 |
Security Management | |
Content, Context, Process Analysis of IS Security Policy Formation | p. 145 |
Integrating Security into Systems Development | p. 157 |
Integrating Information Security into Corporate Governance | p. 169 |
Building an Enterprise IT Security Management System | p. 181 |
Information Security Management System: Processes and Products | p. 193 |
Intrusion Prevention and Detection | |
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis | p. 205 |
E[superscript 2]xB: A Domain-Specific String Matching Algorithm for Intrusion Detection | p. 217 |
Intrusion Masking for Distributed Atomic Operations | p. 229 |
Using Fuzzy System to Manage False Alarms in Intrusion Detection | p. 241 |
An Experiment in Software Decoy Design | p. 253 |
Access Control Policies and Models | |
A User Friendly Guard with Mobile Post-Release Access Control Policy | p. 265 |
Security Model for Health Care Computing and Communication Systems | p. 277 |
Constrained Role-based Delegation | p. 289 |
Secure Information Systems | |
CSAP - An Adaptable Security Module for the E-Government System Webocrat | p. 301 |
Perceptions of Security Contributing to the Implementation of Secure IS | p. 313 |
New Directions on IS Security Methods | p. 325 |
Secure Vickrey Auctions without a Trusted Third Party | p. 337 |
Security Protocols | |
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis | p. 349 |
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments | p. 361 |
Cooperative Defense Firewall Protocol | p. 373 |
How to turn a PIN into an Iron Beam | p. 385 |
Workshop on Information Security Management | |
World Framework for Security Benchmark Changes | p. 397 |
Information Security: Auditing the Behaviour of the Employee | p. 401 |
Priorities in the Deployment of Network Intrusion Detection Systems | p. 405 |
Bridging the Gap between Risk Analysis and Security Policies | p. 409 |
Framework and Architecture for Secure Mobile Business Applications | p. 413 |
ISO 17799 and Australian Healthcare Organisations | p. 417 |
Workshop on Privacy and Anonymity in Network & Distributed Systems | |
Statistical Disclosure Attacks | p. 421 |
On the Anonymity of Timed Pool Mixes | p. 427 |
Privacy in Content Distribution Networks | p. 435 |
Workshop on Small Systems Security | |
Security, Fault-Tolerance and their Verification for Ambient Systems | p. 441 |
Hidden Layer Authentication using Smart Card for WEP-based Wlans | p. 447 |
Pinpas: A Tool for Power Analysis of Smartcards | p. 453 |
Assessing Security in Energy-Efficient Sensor Networks | p. 459 |
From Finite State Machines to Provably Correct Java Card Applets | p. 465 |
Security Characteristics of E-Collaboration Environments | p. 471 |
Roadmap for Securing Handheld Devices | p. 477 |
Workshop on Security and Control of IT in Society | |
Lawful Cyber Decoy Policy | p. 483 |
Electronic Signature as a part of Information Society Infrastructure | p. 489 |
Table of Contents provided by Ingram. All Rights Reserved. |