You are previewing Privacy Solutions and Security Frameworks in Information Protection.
O'Reilly logo
Privacy Solutions and Security Frameworks in Information Protection

Book Description

While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information.  Ensuring the trustworthiness and integrity is important in order for data to be used appropriately.Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Associate Editors
    2. List of Reviewers
  5. Preface
  6. Chapter 1: A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. TERRESTRIAL TRUNKED RADIO (TETRA) PUBLIC SAFETY NETWORKS
    4. 3. MANET ARCHITECTURE AND ROUTING
    5. 4. HIERARCHICAL ROUTING FOR MANET ORGANISATION
    6. CONCLUSION
  7. Chapter 2: A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis
    1. ABSTRACT
    2. 1 INTRODUCTION
    3. 2 HOW DOES THE EXPLOITS OCCUR THROUGH COMMENT SPAM?
    4. 3 EXISTING WORKS ON COMMENT SPAM DETECTION
    5. 4 COMMENT SPAM CHARACTERISTICS
    6. 5 SELF-SUPERVISED SPAM DETECTION ARCHITECTURE
    7. 6 CONCLUSION
  8. Chapter 3: A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications
    1. ABSTRACT
    2. INTRODUCTION
    3. ONLINE UPDATE MECHANISMS OF SHARED SECRETS
    4. STRUCTURE OF SECURITY PROTOCOLS EMPLOYING AN UPDATE MECHANISM
    5. DESYNCHRONISATION ATTACKS AGAINST UPDATE MECHANISMS
    6. REALISING THE PRESENTED DESYNCHRONISATION ATTACKS IN A SATELLITE COMMUNICATION SYSTEM
    7. CASE STUDY: NEW DESYNCHRONISATION ATTACKS AGAINST AN AUTHENTICATION PROTOCOL FOR MOBILE SATELLITE COMMUNICATIONS
    8. ANALYSIS OF THE CC PROTOCOL
    9. DESYNCHRONISATION ATTACK ON THE AUTHENTICATION PHASE
    10. DESYNCHRONISATION ATTACK ON THE MOBILE UPDATE PHASE
    11. A MUTUAL AUTHENTICATION PROTOCOL WITH RESYNCHRONISATION CAPABILITY
    12. REGISTRATION PHASE
    13. MOBILE AUTHENTICATION PHASE
    14. MOBILE UPDATE PHASE
    15. RESYNCHRONISATION PHASE
    16. SECURITY ANALYSIS OF THE PROPOSED PROTOCOL
    17. TRIGGERING THE RESYNCHRONISATION PROCESS
    18. REPLAY ATTACKS
    19. FORGING A RESYNCHRONISATION CHALLENGE
    20. DICTIONARY ATTACKS
    21. DESYNCHRONISATION ATTACKS
    22. CONCLUSION
  9. Chapter 4: Information Privacy
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. RESEARCH OBJECTIVES
    5. SURVEY METHOD
    6. DATA ANALYSIS METHODOLOGY
    7. RESULTS
    8. DISCUSSION
    9. POSSIBLE DEPENDENCE STRUCTURES
    10. CONCLUSION
  10. Chapter 5: User Perceptions of Security Technologies
    1. ABSTRACT
    2. MOTIVATION
    3. BACKGROUND
    4. RESEARCH METHODS
    5. RESULTS
    6. CONCLUSION
  11. Chapter 6: Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree
    1. ABSTRACT
    2. 1 INTRODUCTION
    3. 2 BACKGROUND
    4. 3 MODEL DEFINITION
    5. 4 PROPOSED SOLUTION
    6. 5 ANALYSIS
    7. 6 CONCLUSION
  12. Chapter 7: A Mark-Up Language for the Specification of Information Security Governance Requirements
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. DESIGN OF ESRML 2.0
    5. CONCLUSION AND FUTURE WORK
    6. APPENDIX
  13. Chapter 8: On the Security of Self-Certified Public Keys
    1. ABSTRACT
    2. INTRODUCTION
    3. GIRAULT’S SELF-CERTIFIED PUBLIC KEY SYSTEM
    4. INITIALIZATION PHASE
    5. REGISTRATION PHASE
    6. VERIFICATION PHASE
    7. CRYPTANALYSIS OF GIRAULT’S SYSTEM
    8. WEAKNESS ONE
    9. WEAKNESS TWO
    10. DISCUSSION AND CONCLUSION
  14. Chapter 9: Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. SMARTCARDS
    4. 3. ZERO-KNOWLEDGE PROTOCOLS
    5. 4. DESIGN AND IMPLEMENTATION OF AN AUTHENTICATION LIBRARY FOR JAVA CARD
    6. 5. CONCLUSION
  15. Chapter 10: E-Voting Risk Assessment
    1. ABSTRACT
    2. INTRODUCTION
    3. THREAT TREE OVERVIEW
    4. THREAT TREE DEVELOPMENT
    5. THREAT TREE DEVELOPMENT
    6. DISCUSSION
    7. CONCLUSION
  16. Chapter 11: Intrusion Detection Algorithm for MANET
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. INTRUDER IDENTIFICATION AND RESPONSE ALGORITHM FOR THE MODEL
    5. EXAMPLE ILLUSTRATING THE INTRUSION RESPONSE FRAMEWORK
    6. SIMULATION RESULTS
    7. CONCLUSION
  17. Chapter 12: An Integrated Security Governance Framework for Effective PCI DSS Implementation
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. PCI DSS
    4. 3. COMPLIANCE FRAMEWORKS FOR INFORMATION SECURITY
    5. 4. COMPARING COBIT, ITIL, ISO 27002, AND PCI DSS
    6. 5. INTEGRATED IS SECURITY GOVERNANCE MODEL
    7. 6. CONCLUSION
  18. Chapter 13: A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions
    1. ABSTRACT
    2. INTRODUCTION
    3. PRIVACY FRAMEWORK
    4. CONCLUSION AND FUTURE WORK
  19. Chapter 14: A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. USE-MISUSE CASE MODEL
    5. USE-MISUSE CASE MODELING PROCESS
    6. DISCUSSIONS AND COMPARISON OF THE PROPOSED MODEL WITH EXISTING PROPOSALS
    7. CONCLUSIONS AND FUTURE WORK
  20. Chapter 15: Evaluating the Quality and Usefulness of Data Breach Information Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. METHODOLOGY
    5. CREATING THE YARDSTICK BY WHICH TO EVALUATE DATA BREACH NOTIFICATION SYSTEMS
    6. FINDINGS: EVALUATING DATA BREACH NOTIFICATION SYSTEMS
    7. RECOMMENDATIONS
    8. CONTRIBUTIONS, LIMITATIONS AND FUTURE WORK
  21. Chapter 16: Wild-Inspired Intrusion Detection System Framework for High Speed Networks (φ|π) IDS Framework
    1. ABSTRACT
    2. INTRODUCTION
    3. (φ|π) FRAMEWORK SPECIFICATION
    4. WORK IN PROGRESS AND FUTURE WORK
  22. Compilation of References
  23. About the Contributors