The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.
Author(s): Stephan Riebach, Erwin P. Rathgeb, Birger Toedtmann (auth.), Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou (eds.)
Series: Lecture Notes in Computer Science 3439 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 428
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Computers and Society; Management of Computing and Information Systems; Information Storage and Retrieval
Front Matter....Pages -
Risk Assessment of Production Networks Using Honeynets – Some Practical Experience....Pages 1-12
POSSET – Policy-Driven Secure Session Transfer....Pages 13-24
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach....Pages 25-35
Robust Routing in Malicious Environment for Ad Hoc Networks....Pages 36-47
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation....Pages 48-60
Tracing Traitors by Guessing Secrets. The q -Ary Case....Pages 61-73
Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications....Pages 74-84
Countermeasures for Preventing Comb Method Against SCA Attacks....Pages 85-96
An Email Worm Vaccine Architecture....Pages 97-108
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model....Pages 109-120
Security On-demand Architecture with Multiple Modules Support....Pages 121-131
Measuring Resistance to Social Engineering....Pages 132-143
Conformance Checking of RBAC Policy and its Implementation....Pages 144-155
A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications....Pages 156-167
A Task-Oriented Access Control Model for WfMS....Pages 168-177
A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection....Pages 178-191
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks....Pages 192-203
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures....Pages 204-216
Model Redundancy vs. Intrusion Detection....Pages 217-229
An Open Approach for Designing Secure Electronic Immobilizers....Pages 230-242
An Empirical Study on the Usability of Logout in a Single Sign-on System....Pages 243-254
Secure Software Delivery and Installation in Embedded Systems....Pages 255-267
A Restricted Multi-show Credential System and Its Application on E-Voting....Pages 268-279
Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks....Pages 280-292
Using Trust for Restricted Delegation in Grid Environments....Pages 293-301
Computer Vulnerability Evaluation Using Fault Tree Analysis....Pages 302-313
An Identity-Based Grid Security Infrastructure Model....Pages 314-325
Towards Multilateral-Secure DRM Platforms....Pages 326-337
Hiding Data in Binary Images....Pages 338-349
Performance Analysis of CDMA-Based Watermarking with Quantization Scheme....Pages 350-361
Protecting Mass Data Basing on Small Trusted Agent....Pages 362-373
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes....Pages 374-385
Token-Controlled Public Key Encryption....Pages 386-397
A New Class of Codes for Fingerprinting Schemes....Pages 398-409
t -Out-of- n String/Bit Oblivious Transfers Revisited....Pages 410-421
Back Matter....Pages -