↓ Skip to main content

Trusted Information

Overview of attention for book
Cover of 'Trusted Information'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 PyTHIA: Towards Anonymity in Authentication
  3. Altmetric Badge
    Chapter 2 Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?
  4. Altmetric Badge
    Chapter 3 Internet Anonymity: Problems and Solutions
  5. Altmetric Badge
    Chapter 4 Reducing Certificate Revocation Cost using NPKI
  6. Altmetric Badge
    Chapter 5 The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems
  7. Altmetric Badge
    Chapter 6 Is the Performance of Smart Card Crytographic Functions the Real Bottleneck?
  8. Altmetric Badge
    Chapter 7 Modelling Audit Security for Smart-Card Payment Schemes with UML-Sec
  9. Altmetric Badge
    Chapter 8 Strong Forward Security
  10. Altmetric Badge
    Chapter 9 Secret Sharing and Visual Cryptography Schemes
  11. Altmetric Badge
    Chapter 10 A Two-level Time-Stamping System
  12. Altmetric Badge
    Chapter 11 Security Analysis of the Cliques Protocols Suites: First Results
  13. Altmetric Badge
    Chapter 12 A Secure Workflow System for Dynamic Collaboration
  14. Altmetric Badge
    Chapter 13 On Securely Scheduling a Meeting
  15. Altmetric Badge
    Chapter 14 Modeling and Analyzing Separation of Duties in Workflow Environments
  16. Altmetric Badge
    Chapter 15 Group Security Association (GSA) Management in IP Multicast
  17. Altmetric Badge
    Chapter 16 Communication-Efficient Group Key Agreement
  18. Altmetric Badge
    Chapter 17 Going Beyond MAC and DAC Using Mobile Policies
  19. Altmetric Badge
    Chapter 18 An Access Control Model for Data Archives
  20. Altmetric Badge
    Chapter 19 Checklist-Based Risk Analysis with Evidential Reasoning
  21. Altmetric Badge
    Chapter 20 Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis
  22. Altmetric Badge
    Chapter 21 The Security Model to Combine the Corporate and Information Security
  23. Altmetric Badge
    Chapter 22 Design Criteria to Classified Information Systems Numerically
  24. Altmetric Badge
    Chapter 23 Deception: A Tool and Curse for Security Management
  25. Altmetric Badge
    Chapter 24 A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection
  26. Altmetric Badge
    Chapter 25 ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection
  27. Altmetric Badge
    Chapter 26 Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework
  28. Altmetric Badge
    Chapter 27 An Efficient Software Protection Scheme
  29. Altmetric Badge
    Chapter 28 Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs
  30. Altmetric Badge
    Chapter 29 Security Concerns for Contemporary Development Practices
  31. Altmetric Badge
    Chapter 30 A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS
  32. Altmetric Badge
    Chapter 31 Redefining Information Systems Security: Viable Information Systems
  33. Altmetric Badge
    Chapter 32 Extended Description Techniques for Security Engineering
  34. Altmetric Badge
    Chapter 33 Erratum to: Trusted Information
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user
wikipedia
1 Wikipedia page

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
9 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Trusted Information
Published by
Springer US, January 2001
DOI 10.1007/b116847
ISBNs
978-0-7923-7389-6, 978-0-306-46998-5
Editors

Michel Dupuy, Pierre Paradinas

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 9 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 9 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 3 33%
Student > Bachelor 2 22%
Student > Postgraduate 1 11%
Student > Ph. D. Student 1 11%
Unknown 2 22%
Readers by discipline Count As %
Computer Science 4 44%
Business, Management and Accounting 1 11%
Decision Sciences 1 11%
Social Sciences 1 11%
Unknown 2 22%