New Approaches for Security, Privacy and Trust in Complex Environments (Record no. 14764)

MARC details
000 -LEADER
fixed length control field 07025nam a22004935i 4500
001 - CONTROL NUMBER
control field 978-0-387-72367-9
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170628033338.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2007 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780387723679
-- 978-0-387-72367-9
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-0-387-72367-9
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Venter, Hein.
Relator term editor.
245 10 - TITLE STATEMENT
Title New Approaches for Security, Privacy and Trust in Complex Environments
Medium [electronic resource] :
Remainder of title Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa /
Statement of responsibility, etc edited by Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw Solms.
264 #1 -
-- Boston, MA :
-- Springer US,
-- 2007.
300 ## - PHYSICAL DESCRIPTION
Extent XVI, 498 p. 100 illus.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement IFIP International Federation for Information Processing,
International Standard Serial Number 1571-5736 ;
Volume number/sequential designation 232
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Digital Forensics -- FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints -- Digital Forensic Readiness as a Component of Information Security Best Practice -- Human-Computer Interaction I -- Value creation and Return On Security Investments (ROSI) -- Usability and Security of Personal Firewalls -- Computer-Based Trust -- Trusted Ticket Systems and Applications -- Trust Evaluation for Web Applications based on Behavioral Analysis -- Information Security Management I -- Improving the Information Security Model by using TFI -- Ontological Mapping of Common Criteria’s Security Assurance Requirements -- Network Security I -- Management of Exceptions on Access Control Policies -- Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols -- Information Security Management II -- Exploratory survey on an Evaluation Model for a Sense of Security -- Employees’ Adherence to Information Security Policies: An Empirical Study -- Network Security II -- Phishing in the Wireless: Implementation and Analysis -- Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks -- Access Control I -- A Credential-Based System for the Anonymous Delegation of Rights -- Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content -- Human-Computer Interaction II -- Identity Theft — Empirical evidence from a Phishing Exercise -- A Practical Usability Evaluation of Security Features in End-User Applications -- Intrusion Detection Systems -- Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis -- A Survey of Bots Used for Distributed Denial of Service Attacks -- Access Control II -- A Hybrid PKI-IBC Based Ephemerizer System -- Keystroke Analysis for Thumb-based Keyboards on Mobile Devices -- Information Privacy I -- Security Remarks on a Convertible Nominative Signature Scheme -- Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions -- Access Control III -- A Role-Based Architecture for Seamless Identity Management and Effective Task Separation -- Extending Role Based Access Control Model for Distributed Multidomain Applications -- Information Privacy II -- A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy -- Enabling Privacy of Real-Life LBS -- Access Control IV -- Crafting Web Counters into Covert Channels -- OPA: Onion Policy Administration Model — Another approach to manage rights in DRM -- Security Services -- Non-Repudiation in Internet Telephony -- FirePatch: Secure and Time-Critical Dissemination of Software Patches -- Access Control V -- An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing -- Building a Distributed Semantic-aware Security Architecture -- Trust and Intrusion Detection Systems -- Using Trust to Resist Censorship in the Presence of Collusion -- Evaluating the Effects of Model Generalization on Intrusion Detection Performance -- Keynote paper -- Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM -- IFIP WG 9.7/11.7 — IT Missue and the Law & the NoE “Future of Identity in the Information Society” (FIDIS) — Workshop on Security and Control of Identity in Society -- Covert Identity Information in Direct Anonymous Attestation (DAA) -- Safeguarding Personal Data using Rights Management in Distributed Applications -- Identification Now and in the Future: Social Grant Distribution Process in South Africa -- Hard-drive Disposal and Identity Fraud -- An analysis of security and privacy issues relating to RFID enabled ePassports -- IFIF WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Managable Information Security -- Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework -- Teaching of Information Security in the “Health Care and Nursing” Postgraduate program -- Remote Virtual Information Assurance Network -- Certifying the Computer Security Professional Using the Project Management Institute’s PMP Model.
520 ## - SUMMARY, ETC.
Summary, etc International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Systems and Data Security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Eloff, Mariki.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Labuschagne, Les.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Eloff, Jan.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Solms, Rossouw.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9780387723662
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title IFIP International Federation for Information Processing,
-- 1571-5736 ;
Volume number/sequential designation 232
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://dx.doi.org/10.1007/978-0-387-72367-9">http://dx.doi.org/10.1007/978-0-387-72367-9</a>
912 ## -
-- ZDB-2-SCS
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Central Library Central Library 28/06/2017 Springer EBook   E-37943 28/06/2017 28/06/2017 E-Book

Maintained by VTU Library