Privacy in Content Distribution Networks (English)
Free access
A framework description
- New search for: Hulsebosch, R. J.
- New search for: Hulsebosch, R. J.
In:
Security and Privacy in the Age of Uncertainty
10
;
435-440
;
2003
- Article/Chapter (Book) / Electronic Resource
-
Title:Privacy in Content Distribution Networks
-
Subtitle:A framework description
-
Contributors:Hulsebosch, R. J. ( author )
-
Published in:Security and Privacy in the Age of Uncertainty , 10 ; 435-440IFIP — The International Federation for Information Processing ; 122, 10 ; 435-440
-
Publisher:
- New search for: Springer US
-
Place of publication:Boston, MA
-
Publication date:2003-01-01
-
Size:6 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Trust Mediation for Distributed Information SystemsToone, Brian / Gertz, Michael / Devanbu, Premkumar et al. | 2003
- 13
-
Concerning Enterprise Network Vulnerability to HTTP TunnellingDaicos, C. / Knight, G. S. et al. | 2003
- 25
-
Providing Voice Privacy over Public Switched Telephone NetworksSharif, Mohamed / Wijesekera, Duminda et al. | 2003
- 37
-
A Multi-Party Non-Repudiation Protocol for Exchange of Different MessagesOnieva, Jose Antonio / Zhou, Jianying / Carbonell, Mildrey / Lopez, Javier et al. | 2003
- 49
-
Establishing Chain of Evidence as a Base for Non-Repudiation ServicesHwang, Jing-Jang / Shao, Min-Hua / Wu, Soushan et al. | 2003
- 61
-
Securing XML-Based Multimedia ContentDamiani, Ernesto / Capitani di Vimercati, Sabrina et al. | 2003
- 73
-
Secure Audit Logging with Tamper-Resistant HardwareChong, Cheun Ngen / Peng, Zhonghong / Hartel, Pieter H. et al. | 2003
- 85
-
PCMHoDCPark, HeeJae / Kim, Jong et al. | 2003
- 97
-
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile HandsetsClarke, N. L. / Furnell, S. M. / Lines, B. M. / Reynolds, P. L. et al. | 2003
- 109
-
Introducing PKI to Enhance Security in Future Mobile NetworksKambourakis, Georgios / Rouskas, Angelos / Gritzalis, Stefanos et al. | 2003
- 121
-
A Time Driven Methodology for Key Dimensioning in Multicast CommunicationsPietro, Roberto / Mancini, Luigi V. / Mei, Alessandro et al. | 2003
- 133
-
A Flexible Category-Based Collusion-Resistant Key Management Scheme for MulticastDuma, Claudiu / Shahmehri, Nahid / Lambrix, Patrick et al. | 2003
- 145
-
Content, Context, Process Analysis of is Security Policy FormationKaryda, Maria / Kokolakis, Spyros / Kiountouzis, Evangelos et al. | 2003
- 157
-
Integrating Security Into Systems DevelopmentEvertsson, Ulrika / Örthberg, Urban / Yngström, Louise et al. | 2003
- 169
-
Integrating Information Security into Corporate GovernanceThomson, Kerry-Lynn / Solms, Rossouw et al. | 2003
- 181
-
Building an Enterprise it Security Management SystemBelsis, Meletis A. / Smalov, Leonid et al. | 2003
- 193
-
Information Security Management System: Processes and ProductsEloff, M. M. / Eloff, J. H. P. et al. | 2003
- 205
-
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier AnalysisKnight, G. S. / Carosielli, L. et al. | 2003
- 217
-
E 2 xB: A Domain-Specific String Matching Algorithm for Intrusion DetectionAnagnostakis, K. G. / Antonatos, S. / Markatos, E. P. / Polychronakis, M. et al. | 2003
- 229
-
Intrusion Masking for Distributed Atomic OperationsYu, Meng / Liu, Peng / Zang, Wanyu et al. | 2003
- 241
-
Using Fuzzy System to Manage False Alarms in Intrusion DetectionPh. D. Shajari, Mehdi / Ghorbani, Ali A. et al. | 2003
- 253
-
An Experiment in Software Decoy DesignMichael, J. Bret / Fragkos, Georgios / Auguston, Mikhail et al. | 2003
- 265
-
A User Friendly Guard with Mobile Post-Release Access Control PolicyWilliams, Douglas E. / Fayad, Amgad / Jajodia, Sushil / Calle, Daniel et al. | 2003
- 277
-
Security Model for Health Care Computing and Communication SystemsKalam, Anas Abou / Deswarte, Yves et al. | 2003
- 289
-
Constrained Role-Based DelegationZhang, Longhua / Ahn, Gail-Joon et al. | 2003
- 301
-
CSAP — An Adaptable Security Module for the E-Government System WebocratDridi, Fredj / Fischer, Michael / Pernul, Günther et al. | 2003
- 313
-
Perceptions of Security Contributing to the Implementation of Secure ISTryfonas, Theodore / Kiountouzis, Evangelos et al. | 2003
- 325
-
New Directions on is Security MethodsSiponen, Mikko T. et al. | 2003
- 337
-
Secure Vickrey Auctions Without a Trusted Third PartyDecker, Bart / Neven, Gregory / Piessens, Frank et al. | 2003
- 349
-
Integrating Logics and Process Calculi for Cryptographic Protocol AnalysisPapa, Mauricio / Bremer, Oliver / Hale, John / Shenoi, Sujeet et al. | 2003
- 361
-
Flexible Delegation Security for Improved Distribution in Ubiquitous EnvironmentsKalogridis, Georgios / Yeun, Chan Yeob / Clemo, Gary et al. | 2003
- 373
-
Cooperative Defense Firewall ProtocolEl-Soudani, Magdi M. S. / Eissa, Mohamed A. et al. | 2003
- 385
-
How to turn a PIN into an Iron BeamLucks, Stefan / Weis, Ruediger et al. | 2003
- 397
-
World Framework for Security Benchmark ChangesJanczewski, Lech J. / Colarik, Andrew M. et al. | 2003
- 401
-
Information Security: Auditing the Behaviour of the EmployeeVroom, Cheryl / Solms, Rossouw et al. | 2003
- 405
-
Priorities in the Deployment of Network Intrusion Detection SystemsDobrucki, Marcin / Virtanen, Teemupekka et al. | 2003
- 409
-
Bridging the Gap between Risk Analysis and Security PoliciesGaunard, Paul / Dubois, Eric et al. | 2003
- 413
-
Framework and Architecture for Secure Mobile Business ApplicationsHaller, Jochen / Robinson, Philip / Walter, Thomas / Kilian-Kehr, Roger et al. | 2003
- 417
-
ISO 17799 and Australian Healthcare OrganisationsBrooks, W. J. / Warren, M. J. / Hutchinson, W. et al. | 2003
- 421
-
Statistical Disclosure AttacksDanezis, George et al. | 2003
- 427
-
On the Anonymity of Timed Pool MixesSerjantov, Andrei / Newman, Richard E. et al. | 2003
- 435
-
Privacy in Content Distribution NetworksHulsebosch, R. J. et al. | 2003
- 441
-
Security, Fault-Tolerance and Their Verification for Ambient SystemsHoepman, Jaap-Henk et al. | 2003
- 447
-
Hidden Layer Authentication Using Smart Card for WEP Based WLANsPikrammenos, Giannis / Sarkis, Ghassan / Soldatos, John / Anagnostopoulos, Vasilios et al. | 2003
- 453
-
PINPAS: a Tool for Power Analysis of SmartcardsHartog, J. / Verschuren, J. / Vink, E. / Vos, J. / Wiersma, W. et al. | 2003
- 459
-
Assessing Security in Energy-Efficient Sensor NetworksLaw, Yee Wei / Etalle, Sandro / Hartel, Pieter H. et al. | 2003
- 465
-
From Finite State Machines to Provably Correct Java Card AppletsHubbers, Engelbert / Oostdijk, Martijn / Poll, Erik et al. | 2003
- 471
-
Security Characteristics of E-Collaboration EnvironmentsHulsebosch, Bob / Goedvolk, Ernst-Jan / Janssen, Wil et al. | 2003
- 477
-
Roadmap for Securing Handheld DevicesVinayakray-Jani, Preetida et al. | 2003
- 483
-
Lawful Cyber Decoy PolicyMichael, James Bret / Wingfield, Thomas C. et al. | 2003
- 489
-
Electronic Signature as a Part of Information Society InfrastructurePaavilainen, Juhani / Stojakovic-Celustka, Suzana / Brechlerova, Dagmar et al. | 2003
- E1
-
Erratum to: Security and Privacy in the Age of UncertaintyGritzalis, Dimitris / Capitani di Vimercati, Sabrina / Samarati, Pierangela / Katsikas, Sokratis et al. | 2003