Infrastructure Security Conference 2002 (InfraSec 2002) was created to promote security research and the development of practical solutions in the security of infrastructures – both government and commercial – such as the effective prevention of, detection of, reporting of, response to and recovery from security incidents. The conference, sponsored by the Datacard Group and Hewlett-Packard Laboratories, was held on October 1–3, 2002. Organizational support was provided by the Center for Cryptography, Computer and Network Security Center at the University of Wisconsin- Milwaukee. Organizing a conference is a major undertaking requiring the efforts of many individuals. The Conference President, Graham Higgins (Datacard Group), oversaw all arrangements for the conference, and the General Chair, Susan Thompson (Datacard Group), oversaw the local organization and registration. Local arrangements were directed by Jan Ward (Hewlett-Packard Laboratories) and Jamie Wilson (Datacard Group). Financial arrangements were managed by Natalie Churchill (Hewlett-Packard Laboratories). We wish to thank the organizers, without whose support this conference would not have been possible. This conference program included two keynote speakers: Bob Evans (Office of the e-Envoy) and Vic Maconachy (Department of Defense). The program committee considered 44 submissions of which 23 papers were accepted. Each submitted paper was reviewed by a minimum of three referees. These proceedings contain revised versions of the accepted papers. Revisions were not checked and the authors bear full responsibility for the content of their papers.
Author(s): John Armington, Purdy Ho, Paul Koznek, Richard Martinez (auth.), George Davida, Yair Frankel, Owen Rees (eds.)
Series: Lecture Notes in Computer Science 2437
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2002
Language: English
Pages: 340
Tags: Operating Systems; Management of Computing and Information Systems; Data Encryption; Computer Communication Networks; Database Management; Computers and Society
Biometric Authentication in Infrastructure Security....Pages 1-18
Denial of Access in Biometrics-Based Authentication Systems....Pages 19-29
A Novel Approach to Proactive Password Checking....Pages 30-39
Single Sign-On Architectures....Pages 40-58
Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information....Pages 59-72
How to Buy Better Testing Using Competition to Get the Most Security and Robustness for Your Dollar....Pages 73-87
Structured Risk Analysis....Pages 88-103
A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls....Pages 104-114
Authentication and Authorization of Mobile Clients in Public Data Networks....Pages 115-128
A Contemporary Foreword on GSM Security....Pages 129-144
Vulnerability Assessment Simulation for Information Infrastructure Protection....Pages 145-161
Pseudonymizing Unix Log Files....Pages 162-179
DPS : An Architectural Style for Development of Secure Software....Pages 180-198
A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping....Pages 199-213
Different Smartcard-Based Approaches to Physical Access Control....Pages 214-226
Authenticity and Provability — A Formal Framework....Pages 227-245
Protocol Engineering Applied to Formal Analysis of Security Systems....Pages 246-259
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems....Pages 260-275
Plausible Deniability Using Automated Linguistic Stegonagraphy....Pages 276-287
Virtual Software Tokens - A Practical Way to Secure PKI Roaming....Pages 288-302
Bit-Serial AOP Arithmetic Architectures over GF (2 m )....Pages 303-313
A Practical Distributed Authorization System for GARA....Pages 314-324
Design of a VPN Software Solution Integrating TCP and UDP Services....Pages 325-337