|Listed in category:
Have one to sell?

Trusted Information: The New Decade Challenge by Michel Dupuy (English) Hardcove

Condition:
Brand New
3 available
Price:
US $241.70
ApproximatelyS$ 324.88
Postage:
Free Economy Shipping. See detailsfor shipping
Located in: Fairfield, Ohio, United States
Delivery:
Estimated between Sat, 29 Jun and Thu, 11 Jul to 43230
Estimated delivery dates - opens in a new window or tab include seller's handling time, origin ZIP Code, destination ZIP Code and time of acceptance and will depend on shipping service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Buyer pays for return shipping. See details- for more information about returns
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)

Shop with confidence

eBay Premium Service
Trusted seller, fast shipping, and easy returns. 

Seller information

Registered as a Business Seller
Seller assumes all responsibility for this listing.
eBay item number:386706824814
Last updated on May 19, 2024 21:53:26 SGTView all revisionsView all revisions

Item specifics

Condition
Brand New: A new, unread, unused book in perfect condition with no missing or damaged pages. See all condition definitionsopens in a new window or tab
ISBN-13
9780792373896
Book Title
Trusted Information
ISBN
9780792373896
Subject Area
Computers, Business & Economics
Publication Name
Trusted Information : the New Decade Challenge
Item Length
9.2 in
Publisher
Springer
Subject
Leadership, Security / Cryptography, Security / General, Strategic Planning
Publication Year
2001
Series
Ifip Advances in Information and Communication Technology Ser.
Type
Textbook
Format
Hardcover
Language
English
Author
Pierre Paradinas
Item Width
6.1 in
Item Weight
68.8 Oz
Number of Pages
Xviii, 490 Pages

About this product

Product Information

Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec'01 is the first of this decade (and century) and it will be devoted to "Trusted Information - the New Decade Challenge" This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management. The year 2001 is a double anniversary. First, fifteen years ago, the first IFIP/Sec was held in France (IFIP/Sec'86, Monte-Carlo) and 2001 is also the anniversary of smart card technology. Smart cards emerged some twenty years ago as an innovation and have now become pervasive information devices used for highly distributed secure applications. These cards let millions of people carry a highly secure device that can represent them on a variety of networks. To conclude, we hope that the rich "menu" of conference papers for this IFIP/Sec conference will provide valuable insights and encourage specialists to pursue their work in trusted information.

Product Identifiers

Publisher
Springer
ISBN-10
0792373898
ISBN-13
9780792373896
eBay Product ID (ePID)
1942214

Product Key Features

Author
Pierre Paradinas
Publication Name
Trusted Information : the New Decade Challenge
Format
Hardcover
Language
English
Subject
Leadership, Security / Cryptography, Security / General, Strategic Planning
Publication Year
2001
Series
Ifip Advances in Information and Communication Technology Ser.
Type
Textbook
Subject Area
Computers, Business & Economics
Number of Pages
Xviii, 490 Pages

Dimensions

Item Length
9.2 in
Item Width
6.1 in
Item Weight
68.8 Oz

Additional Product Features

LCCN
2001-029733
Intended Audience
Scholarly & Professional
Series Volume Number
65
Number of Volumes
1 Vol.
Lc Classification Number
Hd30.28
Table of Content
eSociety.- PyTHIA: Towards Anonymity in Authentication.- Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?.- Internet Anonymity: Problems and Solutions.- TTP Management and PKI.- Reducing Certificate Revocation Cost using NPKI.- The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems.- Smart Card.- Is the Performance of Smart Card Crytographic Functions the Real Bottleneck?.- Modelling Audit Security for Smart-Card Payment Schemes with UML-Sec.- Security Protocols.- Strong Forward Security.- Secret Sharing and Visual Cryptography Schemes.- A Two-level Time-Stamping System.- Security Analysis of the Cliques Protocols Suites: First Results.- Secure Workflow Environment.- A Secure Workflow System for Dynamic Collaboration.- On Securely Scheduling a Meeting.- Modeling and Analyzing Separation of Duties in Workflow Environments.- Secure Group Communications.- Group Security Association (GSA) Management in IP Multicast.- Communication-Efficient Group Key Agreement.- Security Policies.- Going Beyond MAC and DAC Using Mobile Policies.- An Access Control Model for Data Archives.- Risk Management.- Checklist-Based Risk Analysis with Evidential Reasoning.- Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis.- The Security Model to Combine the Corporate and Information Security.- Design Criteria to Classified Information Systems Numerically.- Network Security and Intrusion Detection.- Deception: A Tool and Curse for Security Management.- A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection.- ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection.- Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.- Trusted Platforms.- An Efficient Software Protection Scheme.- Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs.- Trusted System Design and Management.- Security Concerns for Contemporary Development Practices.- A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS.- Redefining Information Systems Security: Viable Information Systems.- Extended Description Techniques for Security Engineering.
Copyright Date
2001
Dewey Decimal
005.8
Dewey Edition
21
Illustrated
Yes

Item description from the seller

grandeagleretail

grandeagleretail

98.3% positive feedback
2.7M items sold
Usually responds within 24 hours

Detailed Seller Ratings

Average for the last 12 months

Accurate description
4.9
Reasonable shipping cost
5.0
Shipping speed
4.9
Communication
4.9

Seller feedback (1,024,905)

9***9 (3720)- Feedback left by buyer.
Past month
Verified purchase
fast shipping!
3***m (1078)- Feedback left by buyer.
Past month
Verified purchase
Excellent Seller! A++
-***t (585)- Feedback left by buyer.
Past month
Verified purchase
Book arrigved in record time, surprise. Thaks. Great info, very different - photos to compare various types of conifers for good ID.