The CQRE [Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes. The unprecedented reliance on computer technology has transformed the previous technical side-issue "information security" to a management problem requiring decisions of strategic importance. Thus one of the main goals of the conference is to provide a platform for both technical specialists as well as decision makers from government, industry, commercial, and academic communities. The target of CQRE is to promote and stimulate dialogue between managers and experts, which seems to be necessary for providing secure information systems in the next millennium. Therefore CQRE consists of two parts: Part I mainly focuses on strategic issues of information security, while the focus of Part II is more technical in nature. This volume of the conference proceedings consists of the reviewed and invited contributions of the second part. The program committee considered 46 papers and selected only 15 for full presentation. For the participants’ convenience we have also included the notes of the invited lectures and short workshop talks in this volume.
Author(s): Rainer Baumgart (auth.)
Series: Lecture Notes in Computer Science 1740
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1999
Language: English
Pages: 266
Tags: Computer Communication Networks; Data Encryption; Operating Systems; Management of Computing and Information Systems
Developing Electronic Trust Policies Using a Risk Management Model....Pages 1-16
SECURE: A Simulation Tool for PKI Design....Pages 17-29
Lazy Infinite-State Analysis of Security Protocols....Pages 30-42
Electronic Payments: Where Do We Go from Here?....Pages 43-63
PCA: Jini-based Personal Card Assistant....Pages 64-75
An X.509-Compatible Syntax for Compact Certificates....Pages 76-93
Secure and Cost Efficient Electronic Stamps....Pages 94-100
Implementation of a Digital Lottery Server on WWW....Pages 101-108
Cert’eM: Certification System Based on Electronic Mail Service Structure....Pages 109-118
A Method for Developing Public Key Infrastructure Models....Pages 119-126
The Realities of PKI Inter-operability....Pages 127-132
Mobile Security – An Overview of GSM, SAT and WAP....Pages 133-141
Secure Transport of Authentication Data in Third Generation Mobile Phone Networks....Pages 142-152
Extending Wiener’s Attack in the Presence of Many Decrypting Exponents....Pages 153-166
Improving the Exact Security of Fiat-Shamir Signature Schemes....Pages 167-182
On Privacy Issues of Internet Access Services via Proxy Servers....Pages 183-191
Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2)....Pages 192-203
Auto-recoverable Auto-certifiable Cryptosystems....Pages 204-218
A Distributed Intrusion Detection System Based on Bayesian Alarm Networks....Pages 219-228
Interoperability Characteristics of S/MIME Products....Pages 229-241
The DEDICA Project: The Solution to the Interoperability Problems between the X.509 and EDIFACT Public Key Infrastructures....Pages 242-250
Multiresolution Analysis and Geometric Measures for Biometric Identification Systems....Pages 251-258