16th Annual Computer Security Applications Conference (ACSAC '00)


Book Description

Annotation Forty-four papers from the December 2000 conference address challenges in the field of information security. The main areas of discussion are intrusion detection, security policy, public key infrastructure, access control, security architecture, e-commerce, and cryptography. Topics include extending Java for package-based access control, policy mediation for multi-enterprise environments, binding identities and attributes using digitally signed certificates, using operating system wrappers to increase the resiliency to commercial firewalls, calculating costs for quality of security service, and the Chinese Remainder Theorem and its application in a high-speed RSA crypto chip. No subject index. Annotation copyrighted by Book News, Inc., Portland, OR.




15th Annual Computer Security Applications Conference


Book Description

Proceedings of a December 1999 conference, with papers in sections on electronic commerce, system engineering, networks, security analysis, workflow, crypto, composition problems of component TOEs, security policy, and public infrastructures. Other subjects include information security education, mobile code, legal and technical responses to protecting US critical infrastructures, security architectures, middleware, and intrusion detection. Some specific topics are security policy coordination for heterogeneous information systems, user authentication in the Java platform, and relevancy analysis on the registry of Windows NT 4.0. Lacks a subject index. Annotation copyrighted by Book News, Inc., Portland, OR.







Data and Applications Security XIX


Book Description

The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was held August 7–10, 2005 at the University of Connecticut in Storrs, Connecticut.




Computer and Network Security


Book Description

In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning.




Encyclopedia of Information Science and Technology


Book Description

"This set of books represents a detailed compendium of authoritative, research-based entries that define the contemporary state of knowledge on technology"--Provided by publisher.




Handbook of Software Engineering and Knowledge Engineering


Book Description

This is the first handbook to cover comprehensively both software engineering and knowledge engineering OCo two important fields that have become interwoven in recent years. Over 60 international experts have contributed to the book. Each chapter has been written in such a way that a practitioner of software engineering and knowledge engineering can easily understand and obtain useful information. Each chapter covers one topic and can be read independently of other chapters, providing both a general survey of the topic and an in-depth exposition of the state of the art. Practitioners will find this handbook useful when looking for solutions to practical problems. Researchers can use it for quick access to the background, current trends and most important references regarding a certain topic. The handbook consists of two volumes. Volume One covers the basic principles and applications of software engineering and knowledge engineering. Volume Two will cover the basic principles and applications of visual and multimedia software engineering, knowledge engineering, data mining for software knowledge, and emerging topics in software engineering and knowledge engineering. Sample Chapter(s). Chapter 1.1: Introduction (97k). Chapter 1.2: Theoretical Language Research (97k). Chapter 1.3: Experimental Science (96k). Chapter 1.4: Evolutionary Versus Revolutionary (108k). Chapter 1.5: Concurrency and Parallelisms (232k). Chapter 1.6: Summary (123k). Contents: Computer Language Advances (D E Cooke et al.); Software Maintenance (G Canfora & A Cimitile); Requirements Engineering (A T Berztiss); Software Engineering Standards: Review and Perspectives (Y-X Wang); A Large Scale Neural Network and Its Applications (D Graupe & H Kordylewski); Software Configuration Management in Software and Hypermedia Engineering: A Survey (L Bendix et al.); The Knowledge Modeling Paradigm in Knowledge Engineering (E Motta); Software Engineering and Knowledge Engineering Issues in Bioinformatics (J T L Wang et al.); Conceptual Modeling in Software Engineering and Knowledge Engineering: Concepts, Techniques and Trends (O Dieste et al.); Rationale Management in Software Engineering (A H Dutoit & B Paech); Exploring Ontologies (Y Kalfoglou), and other papers. Readership: Graduate students, researchers, programmers, managers and academics in software engineering and knowledge engineering."




Security of Data and Transaction Processing


Book Description

Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area. Security of Data and Transaction Processing serves as an excellent reference, providing insight into some of the most challenging research issues in the field.




Information Security for Global Information Infrastructures


Book Description

IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings.