Limit search to available items
Book Cover
E-book
Author ICISS (Conference) (1st : 2005 : Kolkata, India)

Title Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings / Sushil Jajodia, Chandan Mazumdar (eds.)
Published Berlin : Springer, [2005]
©2005
Online access available from:
Springer eBooks    View Resource Record  

Copies

Description 1 online resource (xi, 342 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 3803
Lecture notes in computer science ; 3803. 0302-9743
Contents Authorization and trust enhanced security for distributed applications / Vijay Varadharajan -- Toward exploiting location-based and video information in negotiated access control policies / Ernesto Damiani [and others] -- Understanding mutable Internet pathogens, or how I learned to stop worrying and love parastitic behavior / Kevin R.B. Butler, Patrick D. McDaniel -- Building India as the destination for secure software development -- next wave of opportunities of the ICT industry / Prem Chand -- Auditable anaonymous delegation / Bruce Christianson [and others] -- A robust double auction protocol based on a hybrid trust model / JungHoon Ha [and others] -- VTrust: a trust management system based on a vector model of trust / Indrajit Ray [and others] -- Analysis and modelling of trust in distributed information systems / Weiliang Zhao [and others] -- EPAL based privacy enforcement using ECA rules / Jaijit Bhattacharya, S.K. Gupta -- An attribute graph based approach to map local access control policies to credential based access control policies / Janice Warner [and others] -- Protection of relationship in XML documents with the XML-BB model / Frédéric Cuppens [and others] -- EISA -- an enterprise application security solution for databases / V. Radha, N. Hemanth Kumar -- Event detection in multilevel secure active databases / Indrakshi Ray, Wei Huang -- Key management for multicast fingerprinting / Jian Wang [and others] -- A key reshuffling scheme for wireless sensor networks / Ashok Kumar Das -- CCMEA: customized cellular message encryption algorithm for wireless networks / Debdeep Mukhopadhyay [and others] -- A hybrid design of key pre-distribution scheme for wireless sensor networks / Dibyendu Chakrabarti [and others] -- Detecting ARP spoofing: an active technique / Vivek Ramachandran, Sukumar Nandi -- Episode based masquerade detection / Subrat Kumar Dash [and others] -- Modifications of SHA-0 to prevent attacks / Roshni Chatterjee [and others] -- How to solve key escrow and identity revocation in identity-based encryption schemes / JoongHyo Oh [and others] -- On broadcast encryption with random key pre-distribution schemes / Mahalingam Ramkumar -- A framework for examining skill specialization, gender inequity, and career advancement in the information security field / Sharmistha Bagchi-Sen [and others] -- SPEAR: design of a secured peer-to-peer architecture / Jaydev Misra [and others] -- A web-enabled enterprise security management framework based on a unified model of enterprise information system security / Anirban Sengupta [and others] -- Development of a comprehensive intrusion detection system -- challenges and approaches / N. Subramanian [and others] -- A transparent end-to-end security solution / Shince Thomas [and others]
Notes "The 1st International Conference on Information Systems Security (ICISS 2005) ... at Jadavpur University, Kolkata, India."--Preface
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computer security -- Congresses.
Computers -- Access control -- Congresses.
Genre/Form Conference papers and proceedings.
Kalkutta (2005)
Kongress.
Conference papers and proceedings.
Form Electronic book
Author Jajodia, Sushil.
Mazumdar, Chandan.
LC no. 2005936358
ISBN 9783540324225
3540324224
3540307060
9783540307068
Other Titles ICISS 2005