Emerging Trends in Information and Communication Security: International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006.

The 36 revised full papers presented were carefully reviewed and selected from some 180 submissions. The papers are organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.

Author(s): Andreas Pfitzmann (auth.), Günter Müller (eds.)
Series: Lecture Notes in Computer Science 3995 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 532
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Information Systems Applications (incl.Internet); Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Multilateral Security: Enabling Technologies and Their Evaluation....Pages 1-13
Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems....Pages 14-29
Optimized Workflow Authorization in Service Oriented Architectures....Pages 30-44
Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment....Pages 45-59
A P2P Content Authentication Protocol Based on Byzantine Agreement....Pages 60-72
Transitive Trust in Mobile Scenarios....Pages 73-85
An Open, PKI-Based Mobile Payment System....Pages 86-100
Secure Rejoining Scheme for Dynamic Sensor Networks....Pages 101-114
Developing Provable Secure M-Commerce Applications....Pages 115-129
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction....Pages 130-144
Privacy-Preserving Decision Tree Mining Based on Random Substitutions....Pages 145-159
Policy-Based Integration of User and Provider-Sided Identity Management....Pages 160-174
Privacy with Delegation of Rights by Identity Management....Pages 175-190
A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System....Pages 191-205
Revocable Anonymity....Pages 206-220
Low Latency Anonymous Communication – How Long Are Users Willing to Wait?....Pages 221-237
Security Engineering Using Problem Frames....Pages 238-253
SecTOOL – Supporting Requirements Engineering for Access Control....Pages 254-267
Possibilistic Information Flow Control in MAKS and Action Refinement....Pages 268-281
Toward a Framework for Forensic Analysis of Scanning Worms....Pages 282-297
A Comparison of Market Approaches to Software Vulnerability Disclosure....Pages 298-311
Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples....Pages 312-320
Allowing State Changes in Specifications....Pages 321-336
Field Access Analysis for Enforcing Access Control Policies....Pages 337-351
Controlling Access to Documents: A Formal Access Control Model....Pages 352-367
How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer’s Security....Pages 368-380
Secure End-to-End Transport over SCTP....Pages 381-395
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information....Pages 396-408
Filtering for Private Collaborative Benchmarking....Pages 409-422
On the Use of Word Networks to Mimicry Attack Detection....Pages 423-435
Simplifying Signature Engineering by Reuse....Pages 436-450
Redesign and Implementation of Evaluation Dataset for Intrusion Detection System....Pages 451-465
Requirements of Information Reductions for Cooperating Intrusion Detection Agents....Pages 466-480
Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age....Pages 481-493
Kleptographic Attacks on E-Voting Schemes....Pages 494-508
Visual Document Authentication Using Human-Recognizable Watermarks....Pages 509-521
Back Matter....Pages -