|
|
Showing 1 - 4 of
4 matches in All Departments
The working group WG 11.4 of IFIP ran an iNetSec conference a few
times in the past, sometimes together with IFIP security
conference, sometimes as a stand-alone workshop with a program
selected from peer-reviewed submissions. When we were elected to
chair WG 11.4 we asked ourselveswhether the security and also the
computer science community at large bene?ts from this workshop. In
particular, as there aremany (too many?) securityconferences, it
has become di?cult to keep up with the ?eld. After having talked to
many colleagues, far too many to list all of them here, we decided
to try a di?erent kind of workshop: one where people would attend
to discuss open research topics in our ?eld, as typically only
happens during the co?ee breaks of ordinary conferences.
Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe
open problems that they would like to discuss at the workshop, the
intent being that the author would be given 15 minutes to present
the topic and another 15 minutes for discussion. These abstracts
were then read by all members of the Program Committee and ranked
by them according to whether they thought
thiswouldleadtoaninterestingtalk and discussion. We then simply
selected the abstracts that got the best rankings. We were happy to
see this result in many really interesting talks and disc- sions in
the courseof the workshop.Ofcourse, these lively anddirect
discussions are almost impossible to achieve in a printed text.
Still, we asked the authors to distill the essence of these
discussions into full papers. The results are in your hand
The working group WG 11.4 of IFIP ran an iNetSec conference a few
times in the past, sometimes together with IFIP security
conference, sometimes as a stand-alone workshop with a program
selected from peer-reviewed submissions. When we were elected to
chair WG 11.4 we asked ourselveswhether the security and also the
computer science community at large bene?ts from this workshop. In
particular, as there aremany (too many?) securityconferences, it
has become di?cult to keep up with the ?eld. After having talked to
many colleagues, far too many to list all of them here, we decided
to try a di?erent kind of workshop: one where people would attend
to discuss open research topics in our ?eld, as typically only
happens during the co?ee breaks of ordinary conferences.
Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe
open problems that they would like to discuss at the workshop, the
intent being that the author would be given 15 minutes to present
the topic and another 15 minutes for discussion. These abstracts
were then read by all members of the Program Committee and ranked
by them according to whether they thought
thiswouldleadtoaninterestingtalk and discussion. We then simply
selected the abstracts that got the best rankings. We were happy to
see this result in many really interesting talks and disc- sions in
the courseof the workshop.Ofcourse, these lively anddirect
discussions are almost impossible to achieve in a printed text.
Still, we asked the authors to distill the essence of these
discussions into full papers. The results are in your hand
This book constitutes the thoroughly refereed post-conference
proceedings of the IFIP WG 11.4 International Workshop on Open
Problems in Network Security, iNetSec 2015, held in Zurich,
Switzerland, in October 2015. iNetSec is the main workshop of the
IFIP working group WG 11.4; its objective is to present and discuss
open problems and new research directions on all aspects related to
network security. The 9 revised full papers presented in this
volume were carefully reviewed and selected from 13 submissions.
They were organized in topical sections named: network security;
intrusion detection; anonymous communication; and cryptography.
Das Buch fuhrt den Leser in die grundlegenden Techniken und
Sicherheitsmodelle zum Schutz der Privatsphare ein und erlautert
deren Anwendung in offenen Umgebungen (insb. Internet). Folgende
Punkte kennzeichnen das Buch: - Kryptographie (Schutz der
Nachrichteninhalte) und deren Sicherheitsmodelle werden im
Zusammenhang mit der Anwendung (Schlusselverteilproblematik)
erlautert. - Schutz der Kommunikationsumstande (wer kommuniziert
von wo, wann, mit wem, wohin) wird erstmals mit einer umfassenden
Sicherheitsmodellierung dargestellt und der Zusammenhang mit der
Anwendung (Problematik bei der Gruppenbildung) aufgezeigt. - Der
probabilistische Schutz und die Stop-And-Go-MIXe werden analog zu
der asymmetrischen Kryptographie und komplexitatstheoretischen
Sicherheit eingefuhrt. - Die Leistungsfahigkeit der
Anonymisierungsverfahren und eine Pilotimplementierung werden
vorgestellt. Besonderer Vorzug des Buches ist daruber hinaus, dass
es auch fur den Nichtfachmann verstandlich geschrieben ist.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|