Limit this search to....

Information Security Practice and Experience: First International Conference, Ispec 2005, Singapore, April 11-14, 2005, Proceedings 2005 Edition
Contributor(s): Deng, Robert H. (Editor), Bao, Feng (Editor), Pang, Hweehwa (Editor)
ISBN: 3540255842     ISBN-13: 9783540255840
Publisher: Springer
OUR PRICE:   $52.24  
Product Type: Paperback - Other Formats
Published: April 2005
Qty:
Annotation:

This book constitutes the refereed proceedings of the First International Information Security Practice and Experience Conference, ISPEC 2005, held in Singapore in April 2005.

The 35 revised full papers presented were carefully reviewed and selected from more than 120 submissions. The papers are organized in topical sections on network security, cryptographic techniques, secure architectures, access control, intrusion detection, data security, and applications and case studies.

Additional Information
BISAC Categories:
- Computers | Computer Science
- Computers | Security - Cryptography
- Computers | Operating Systems - General
Dewey: 005.8
LCCN: 2005923658
Physical Information: 0.89" H x 6.14" W x 9.21" (1.35 lbs) 428 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission, reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.