Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
iNetSec 2009--open research problems in network security : IFIP WG 11.4 International Workshop
Camenisch J., Kesdogan D., Springer Publishing Company, Incorporated, New York, NY, 2009. 169 pp. Type: Book (978-3-642054-36-5)
Date Reviewed: Aug 30 2010

The iNetSec conference papers collected in this book focus on the discussion of open research problems. In other words, instead of discussing security holes and vulnerabilities in existing technologies, the papers presented here cover problems that are a few years away. As expected, most of them are propositions that require a shift in the current technology paradigm discussed in each paper.

This conference, first held in April 2009, tries to cover topics that are not usually seen at traditional conferences. Although the most recent event was held in March 2010, this review focuses on the papers selected in 2009. However, the contents of these papers are still very relevant.

The 14 papers are divided into six sections. The first section, about involving humans, covers the flaws in current biometric security systems and problems with identifying humans from computers on the Web. Section 2, on Web 2.0, contains a topic that is heavily discussed nowadays: leveraging social links for trust and privacy. The third section is about protecting resources. It covers challenges and open problems in mitigating drive-by download attacks, and includes a proposal for context-dependent authentication and access control. Section 4, about pervasive devices, includes new directions in radio frequency identification (RFID) security and tailored security, and safety for pervasive computing. The next section is on protocol security, including peer-to-peer (P2P)-based voice and video streaming applications, rational protocols, and authorization for re-sharing. The final section is on privacy. Topics covered include privacy policies, tools and mechanism of the future, security and privacy preservation in human-involved networks, and metrics for anonymous networks.

This conference provides a thought-provoking international platform for intellectuals interested in the network security problems of tomorrow.

Reviewer:  Phoram Mehta Review #: CR138346 (1107-0677)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (C.2.0 ... )
 
 
Conference Proceedings (A.0 ... )
 
 
Coding And Information Theory (E.4 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy