IFIP TC6 Open Digital Library

8. Communications and Multimedia Security 2004: Windermere, The Lake District, UK

Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom

David Chadwick, Bart Preneel

Springer, IFIP 175, ISBN: 978-0-387-24485-3



Contents

Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols.

Jan Iwanik, Marek Klonowski, Miroslaw Kutylowski

 1-15

Personal Attributes and Privacy - How to ensure that private attribute management is not subverted by datamining.

Howard Chivers

 17-29

Local Management of Credits and Debits in Mobile Ad Hoc Networks.

Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli

 31-45

How Secure are Current Mobile Operating Systems?

Tobias Murmann, Heiko Rossnagel

 47-58

An Overview of Security Issues and Techniques in Mobile Agents.

Mousa Alfalayleh, Ljiljana Brankovic

 59-78

A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography.

Konstantinos Markantonakis, Keith Mayes

 79-95

Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile Networks.

Timothy W. van der Horst, Tore Sundelin, Kent E. Seamons, Charles D. Knutson

 97-109

Weak Context Establishment Procedure for Mobility and Multi-Homing Management.

Vesa Torvinen, Jukka Ylitalo

 111-123

A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components.

Lieven Desmet, Bart Jacobs 0002, Frank Piessens, Wouter Joosen

 125-130

Threat Modelling for Web Services Based Web Applications.

Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen

 131-144

Threat Modelling for ASP.NET - Designing Secure Applications.

Rüidiger Grimm, Henrik Eichstädt

 145-158

Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application.

Elisa Bertino, Danilo Bruschi, Stefano Franzoni, Igor Nai Fovino, Stefano Valtolina

 159-171

Threat Modelling for Active Directory.

David Chadwick

 173-182

Threat Modelling for Security Tokens in Web Applications.

Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelée, Bart Preneel

 183-193

Analysis of the DVB Common Scrambling Algorithm.

Ralf-Philipp Weinmann, Kai Wirt

 195-207

An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder.

Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas

 209-221

Robust Visual Hashing Using JPEG 2000.

Roland Norcen, Andreas Uhl

 223-235

A System for End-to-End Authentication of Adaptive Multimedia Content.

Takashi Suzuki, Zulfikar Ramzan, Hiroshi Fujimoto, Craig Gentry, Takehiro Nakayama, Ravi Jain

 237-249

Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure.

David W. Chadwick, Sassa Otenko, Von Welch

 251-261

Secure Role Based Messaging.

David W. Chadwick, Graeme Lunt, Gansen Zhao

 263-275

Five Non-Technical Pillars of Network Information Security Management.

Elmarie Kritzinger, Sebastiaan H. von Solms

 277-287