iNetSec 2009 - Open Research Problems in Network Security
Springer Berlin (Verlag)
978-3-642-05436-5 (ISBN)
Dipl.-Informatiker Dogan Kesdogan arbeitete im Projekt des Kollegs 'Sicherheit in der Kommunikationstechnik' der gemeinnützigen Gottlieb Daimler- und Karl Benz-Stiftung und promovierte an der RWTH Aachen. Seit September 1998 arbeitet er bei einem bedeutenden Unternehmen der Kommunikationsbranche.
Involving Humans.- On the Design of Forgiving Biometric Security Systems.- Remotely Telling Humans and Computers Apart: An Unsolved Problem.- Web 2.0.- Leveraging Social Links for Trust and Privacy in Networks.- Open Problems in Web 2.0 User Content Sharing.- Protecting Resources.- Mitigating Drive-By Download Attacks: Challenges and Open Problems.- Context-Dependent Authentication and Access Control.- Pervasive Devices.- New Directions in RFID Security.- Tailored Security and Safety for Pervasive Computing.- Protocol Security.- Rational Protocols.- Security Issues for P2P-Based Voice- and Video-Streaming Applications.- Threshold Things That Think: Authorisation for Resharing.- Privacy.- Privacy Policies, Tools and Mechanisms of the Future.- Security and Privacy Preservation in Human-Involved Networks.- Discussing Anonymity Metrics for Mix Based Anonymity Approaches.
From the reviews:
"The iNetSec conference papers collected in this book focus on the discussion of open research problems. ... this review focuses on the papers selected in 2009. However, the contents of these papers are still very relevant. ... This conference provides a thought-provoking international platform for intellectuals interested in the network security problems of tomorrow." (Phoram Mehta, ACM Computing Reviews, August, 2010)| Erscheint lt. Verlag | 26.10.2009 |
|---|---|
| Reihe/Serie | IFIP Advances in Information and Communication Technology |
| Zusatzinfo | VIII, 169 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 950 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Schlagworte | Access Control • address space randomization • Anomaly Detection • anonymity metrics • authentication • Biometric • browser security • Buffer Overflow • captcha • code-injection • Design • drive-by download attacks • Fingerprinting • human-involved networks • implement • implementation • Intrusion Detection • machine learning • malicious code • Malware • Methodologies • network intrusion • Network Security • Pervasive Computing • privacy • RFID • RFID (Radio Frequency Identificatio) • security • security assessment • self organizing system • Web 2.0 |
| ISBN-10 | 3-642-05436-6 / 3642054366 |
| ISBN-13 | 978-3-642-05436-5 / 9783642054365 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich