Buch, Englisch, Band 5185, 205 Seiten, Format (B × H): 155 mm x 235 mm
Buch, Englisch, Band 5185, 205 Seiten, Format (B × H): 155 mm x 235 mm
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-85734-1
Verlag: Springer-Verlag GmbH
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsmathematik und -statistik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Wirtschaftswissenschaften Betriebswirtschaft Management
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Informationsarchitektur
- Wirtschaftswissenschaften Wirtschaftswissenschaften Literatur für Manager
Weitere Infos & Material
Invited Lecture.- Biometrics – How to Put to Use and How Not at All?.- Trust.- A Map of Trust between Trading Partners.- Implementation of a TCG-Based Trusted Computing in Mobile Device.- A Model for Trust Metrics Analysis.- Authentication, Authorization and Access Control.- Patterns and Pattern Diagrams for Access Control.- A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications.- A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony.- Reputation Systems.- Multilateral Secure Cross-Community Reputation Systems for Internet Communities.- Fairness Emergence through Simple Reputation.- Combining Trust and Reputation Management for Web-Based Services.- Security Policies and Identity Management.- Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.- Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy.- BusiROLE: A Model for Integrating Business Roles into Identity Management.- Intrusion Detection and Applications of Game Theory to IT Security Problems.- The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset.- A Generic Intrusion Detection Game Model in IT Security.- On the Design Dilemma in Dining Cryptographer Networks.- Privacy.- Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing.- A User-Centric Protocol for Conditional Anonymity Revocation.- Preservation of Privacy in Thwarting the Ballot Stuffing Scheme.