8. Communications and Multimedia Security 2004: Windermere, The Lake District, UK
Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom
David Chadwick, Bart Preneel
Springer, IFIP 175, ISBN: 978-0-387-24485-3
Contents
Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols.
Jan Iwanik, Marek Klonowski, Miroslaw Kutylowski
1-15
Howard Chivers
17-29
Local Management of Credits and Debits in Mobile Ad Hoc Networks.
Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
31-45
An Overview of Security Issues and Techniques in Mobile Agents.
Mousa Alfalayleh, Ljiljana Brankovic
59-78
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography.
Konstantinos Markantonakis, Keith Mayes
79-95
Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile Networks.
Timothy W. van der Horst, Tore Sundelin, Kent E. Seamons, Charles D. Knutson
97-109
Weak Context Establishment Procedure for Mobility and Multi-Homing Management.
Vesa Torvinen, Jukka Ylitalo
111-123
Lieven Desmet, Bart Jacobs 0002, Frank Piessens, Wouter Joosen
125-130
Threat Modelling for Web Services Based Web Applications.
Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen
131-144
Threat Modelling for ASP.NET - Designing Secure Applications.
Rüidiger Grimm, Henrik Eichstädt
145-158
Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application.
Elisa Bertino, Danilo Bruschi, Stefano Franzoni, Igor Nai Fovino, Stefano Valtolina
159-171
Threat Modelling for Security Tokens in Web Applications.
Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelée, Bart Preneel
183-193
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder.
Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas
209-221
A System for End-to-End Authentication of Adaptive Multimedia Content.
Takashi Suzuki, Zulfikar Ramzan, Hiroshi Fujimoto, Craig Gentry, Takehiro Nakayama, Ravi Jain
237-249
Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure.
David W. Chadwick, Sassa Otenko, Von Welch
251-261
Five Non-Technical Pillars of Network Information Security Management.
Elmarie Kritzinger, Sebastiaan H. von Solms
277-287