Synopses & Reviews
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.
Synopsis
The IT environment now includes novel, dynamic approaches such as mobility, wearability, ubiquity, ad hoc use, mind/body orientation, and business/ market orientation. This modern environment challenges the whole information security research community to focus on interdisciplinary and holistic approaches while retaining the benefit of previous research efforts. This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments". The papers in this have a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection, and network forensics.
Synopsis
This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIPISEC 2006) on "Security and Privacy in Dynamic Envir- ments" held in May 22-24 2006 in Karlstad, Sweden. The first IFIPISEC conference was arranged in May 1983 in Stockholm, Sweden, one year before TC- 1 1 was founded, with the active participation of the Swedish IT Security Community. The IFIPISEC conferences have since then become the flagship events of TC-11. We are very pleased that we succeeded with our bid to after 23 years hold the IFIPISEC conference again in Sweden. The IT environment now includes novel, dynamic approaches such as mobility, wearability, ubiquity, ad hoc use, mindhody orientation, and businesslmarket ori- tation. This modem environment challenges the whole information security research community to focus on interdisciplinary and holistic approaches whilst retaining the benefit of previous research efforts. Papers offering research contributions focusing on dynamic environments in addition to other aspects of computer security and privacy were solicited for submission to IFIPISEC 2006. We received 141 submissions which were all reviewed by at least three members of the international program committee.
Synopsis
This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments". The papers presented here place a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection, and network forensics.
Table of Contents
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy.- Ensuring Privacy for Buyer-Seller E-Commerce.- Authenticated Query Flooding in Sensor Networks.- A Framework for Web Services Trust.- Security-by-Ontology: A Knowledge-Centric Approach.- Analysis and Improvement of Anti-Phishing Schemes.- Protecting Web Services from DOS Attacks by SOAP Message Validation.- A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.- Sealed-Bid Micro Auctions.-Detecting Known and Novel Network Intrusions.-A Usability Study of Security Policy Management.- Utilizing the Common Criteria for Advanced Student Research Projects.- Click Passwords.- Secure Fast Handover in an Open Broadband Access Network Using Kerberos-Style Tickets.- Network Forensics on Packet Fingerprints.- Organizational Security Culture: More Than Just an End-User Phenomenon.-Value-Focused Assessment of Unformation Communication and Technology Security Awareness in an Academic Environment.- Practical Private Regular Expression Matching.