日韩精品 中文字幕 动漫,91亚洲午夜一区,在线不卡日本v一区v二区丶,久久九九国产精品自在现拍

注冊(cè) | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全信息系統(tǒng)安全

信息系統(tǒng)安全

信息系統(tǒng)安全

定 價(jià):¥587.60

作 者: Aditya Bagchi 著
出版社: 廣東教育出版社
叢編項(xiàng):
標(biāo) 簽: 暫缺

購(gòu)買這本書可以去


ISBN: 9783540689621 出版時(shí)間: 2006-12-01 包裝: 平裝
開本: 頁(yè)數(shù): 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006.The 20 revised full papers and 5 short papers presented together with 4 invited papers and 3 ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security and are organized in topical sections on data and application security, access control, key management and security in wireless networks, threat analysis, detection and recovery, cryptography and encryption, as well as short papers and research reports.

作者簡(jiǎn)介

暫缺《信息系統(tǒng)安全》作者簡(jiǎn)介

圖書目錄

Invited Papers
 Privacy in the Electronic Society
 A Data Sharing Agreement Framework
 Password Exhaustion: Predicting the End of Password Usefulness
 Network Monitoring for Security and Forensics
Data and Application Security
 Fairness Strategy for Multilevel Secure Concurrency Control Protocol
 Optimistic Anonymous Participation in Inter-organizational Workflow Instances
 O2O: Virtual Private Organizations to Manage Security Policy Interoperability
 Privacy Preserving Web-Based Email
Access Control
 Context-Aware Provisional Access Control
 LRBAC: A Location-Aware Role-Based Access Control Model
 Extending Context Descriptions in Semantics-Aware Access Control
 Specification and Realization of Access Control in SPKI/SDSI
Key Management and Security in Wireless Networks
 Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack
 An Efficient Key Assignment Scheme for Access Control in a Hierarchy
 Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers
 Secure Data Management in Reactive Sensor Networks
Threat Analysis, Detection and Recovery
 Security Ontology: Simulating Threats to Corporate Assets
 Two-Stage Credit Card Fraud Detection Using Sequence Alignment
 New Malicious Code Detection Using Variable Length n-grams
 A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes
Cryptography and Encryption
 An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack
 A Partial Image Encryption Method with Pseudo Random Sequences
……
Short Papers and Research Reports
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) rgspecialties.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)