Skip to main content

New Approaches for Security, Privacy and Trust in Complex Environments

Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa

  • Conference proceedings
  • © 2007

Access provided by Autonomous University of Puebla

Overview

  • Most up-to-date research on computer security and privacy
  • Covers a range of topics including digital forensics, access control, and human computer interaction
  • Includes supplementary material: sn.pub/extras

Part of the book series: IFIP Advances in Information and Communication Technology (IFIPAICT, volume 232)

Included in the following conference series:

Conference proceedings info: SEC 2007.

Buy print copy

Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

About this book

This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Security, Privacy and Trust in Complex Environments" held in Sandton, South Africa from 14 to 16 May 2007. The IFIP/SEC conferences are the flagship events of TC-11. In May 1995 South Africa for the first time hosted an IFIP/SEC conference in Cape Town. Now, twelve years later, we are very pleased to have succeeded in our bid to once again present the IFIP/SEC conference in South Africa. The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This modem environment challenges the whole information security research community to focus on interdisciplinary and holistic approaches, whilst retaining the benefit of previous research efforts. Papers offering research contributions that focus both on access control in complex environments and on other aspects of computer security and privacy were solicited for submission to IFIP/SEC 2007. A total of 107 submissions were received, which were all reviewed by at least three members of the international programme committee.

Similar content being viewed by others

Keywords

Table of contents (46 papers)

  1. Human-Computer Interaction I

  2. Computer-Based Trust

  3. Information Security Management I

  4. Network Security I

  5. Information Security Management II

  6. Network Security II

  7. Access Control I

  8. Human-Computer Interaction II

  9. Intrusion Detection Systems

Other volumes

  1. New Approaches for Security, Privacy and Trust in Complex Environments

Editors and Affiliations

  • University of Pretoria, South Africa

    Hein Venter, Jan Eloff

  • University of South Africa, South Africa

    Mariki Eloff

  • University of Johannesburg, South Africa

    Les Labuschagne

  • Nelson Mandela Metropolitan University, South Africa

    Rossouw Solms

Bibliographic Information

  • Book Title: New Approaches for Security, Privacy and Trust in Complex Environments

  • Book Subtitle: Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa

  • Editors: Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw Solms

  • Series Title: IFIP Advances in Information and Communication Technology

  • DOI: https://doi.org/10.1007/978-0-387-72367-9

  • Publisher: Springer New York, NY

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: IFIP International Federation for Information Processing 2007

  • Hardcover ISBN: 978-0-387-72366-2Published: 11 May 2007

  • Softcover ISBN: 978-1-4419-4433-7Published: 23 November 2010

  • eBook ISBN: 978-0-387-72367-9Published: 10 November 2007

  • Series ISSN: 1868-4238

  • Series E-ISSN: 1868-422X

  • Edition Number: 1

  • Number of Pages: XV, 498

  • Topics: Cryptology, Systems and Data Security

Publish with us