Global Security, Safety, and Sustainability : 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings / edited by Hamid Jahankhani, Ali G. Hessami, Feng Hsu.
Tipo de material:
- texto
- computadora
- recurso en línea
- 9783642040627
- QA76.9.D35
Contenidos:
Resumen: This book constitutes the refereed proceedings of the 5th International Conference, ICGS3, held in London, UK, in September 2009. The 28 revised full papers presented together with 3 keynote papers were carefully reviewed and selected from many submissions. The two days conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors.
Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush! -- A Security Audit Framework for Security Management in the Enterprise -- Watermarking Spatial Data in Geographic Information Systems -- Situation Awareness in Systems of Systems Ad-Hoc Environments -- The Georgia’s Cyberwar -- The UK Government’s Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture -- Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions -- Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer’s Trust -- A Systems Framework for Sustainability -- Hybrid Genetic Algorithm for Travel Time Reliability of Optimal Path -- Geofencing in a Security Strategy Model -- Using Business Process Execution Language to Handle Evaluation Factors for Web Services Compositions -- The Significance of Security in Transmitting Clinical Data -- Security Concern over Earth Viewer Software Using Satellite Photo Service -- The People’s Republic of China – The Emerging Cyberpower -- Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation -- Neural Networks for Intrusion Detection Systems -- Exploitation of Secrets Injected in Java Midlets -- Biometrically Based Electronic Signatures for a Public Networked Environment -- Policy Translation and Reconciliation Techniques for the System-of-Systems Domain -- The Kido Botnet: Back to the Future -- Information Systems Security and Its Affiliation to Information Technology Risk Management -- A Sustainable Approach to Healing the World for Humanity and the Environment ... An Evolving Idea -- Hey – Get Off My Cloud! -- Static and Dynamic Analysis for Web Security in Generic Format.