Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings /
Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings /
ICISS 2005
Sushil Jajodia, Chandan Mazumdar (eds.).
- Berlin : Springer, ©2005.
- 1 online resource (xi, 342 pages) : illustrations
- Lecture notes in computer science, 3803 0302-9743 ; .
- Lecture notes in computer science ; 3803. .
"The 1st International Conference on Information Systems Security (ICISS 2005) ... at Jadavpur University, Kolkata, India."--Preface
Includes bibliographical references and index.
Authorization and trust enhanced security for distributed applications / Toward exploiting location-based and video information in negotiated access control policies / Understanding mutable Internet pathogens, or how I learned to stop worrying and love parastitic behavior / Building India as the destination for secure software development -- next wave of opportunities of the ICT industry / Auditable anaonymous delegation / A robust double auction protocol based on a hybrid trust model / VTrust: a trust management system based on a vector model of trust / Analysis and modelling of trust in distributed information systems / EPAL based privacy enforcement using ECA rules / An attribute graph based approach to map local access control policies to credential based access control policies / Protection of relationship in XML documents with the XML-BB model / EISA -- an enterprise application security solution for databases / Event detection in multilevel secure active databases / Key management for multicast fingerprinting / A key reshuffling scheme for wireless sensor networks / CCMEA: customized cellular message encryption algorithm for wireless networks / A hybrid design of key pre-distribution scheme for wireless sensor networks / Detecting ARP spoofing: an active technique / Episode based masquerade detection / Modifications of SHA-0 to prevent attacks / How to solve key escrow and identity revocation in identity-based encryption schemes / On broadcast encryption with random key pre-distribution schemes / A framework for examining skill specialization, gender inequity, and career advancement in the information security field / SPEAR: design of a secured peer-to-peer architecture / A web-enabled enterprise security management framework based on a unified model of enterprise information system security / Development of a comprehensive intrusion detection system -- challenges and approaches / A transparent end-to-end security solution / Vijay Varadharajan -- Ernesto Damiani [and others] -- Kevin R.B. Butler, Patrick D. McDaniel -- Prem Chand -- Bruce Christianson [and others] -- JungHoon Ha [and others] -- Indrajit Ray [and others] -- Weiliang Zhao [and others] -- Jaijit Bhattacharya, S.K. Gupta -- Janice Warner [and others] -- Frédéric Cuppens [and others] -- V. Radha, N. Hemanth Kumar -- Indrakshi Ray, Wei Huang -- Jian Wang [and others] -- Ashok Kumar Das -- Debdeep Mukhopadhyay [and others] -- Dibyendu Chakrabarti [and others] -- Vivek Ramachandran, Sukumar Nandi -- Subrat Kumar Dash [and others] -- Roshni Chatterjee [and others] -- JoongHyo Oh [and others] -- Mahalingam Ramkumar -- Sharmistha Bagchi-Sen [and others] -- Jaydev Misra [and others] -- Anirban Sengupta [and others] -- N. Subramanian [and others] -- Shince Thomas [and others].
9783540324225 3540324224 3540307060 9783540307068
10.1007/11593980 doi
11593980
978-3-540-30706-8 Springer http://www.springerlink.com
GBA620107 bnb 05,N48,0035 dnb
013389541 Uk
Computer security--Congresses.
Computers--Access control--Congresses.
Sécurité informatique--Congrès.
Ordinateurs--Accès--Contrôle--Congrès.
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Informatique.
Computer security.
Computers--Access control.
Anwendungssystem
Authentifikation
Computersicherheit
Datensicherung
Eindringerkennung
Informationssystem
Verteiltes System
Congress
Conference papers and proceedings.
Conference papers and proceedings.
Actes de congrès.
Kalkutta (2005)
Kongress.
QA76.9.A25 / I5543 2005eb
005.8
"The 1st International Conference on Information Systems Security (ICISS 2005) ... at Jadavpur University, Kolkata, India."--Preface
Includes bibliographical references and index.
Authorization and trust enhanced security for distributed applications / Toward exploiting location-based and video information in negotiated access control policies / Understanding mutable Internet pathogens, or how I learned to stop worrying and love parastitic behavior / Building India as the destination for secure software development -- next wave of opportunities of the ICT industry / Auditable anaonymous delegation / A robust double auction protocol based on a hybrid trust model / VTrust: a trust management system based on a vector model of trust / Analysis and modelling of trust in distributed information systems / EPAL based privacy enforcement using ECA rules / An attribute graph based approach to map local access control policies to credential based access control policies / Protection of relationship in XML documents with the XML-BB model / EISA -- an enterprise application security solution for databases / Event detection in multilevel secure active databases / Key management for multicast fingerprinting / A key reshuffling scheme for wireless sensor networks / CCMEA: customized cellular message encryption algorithm for wireless networks / A hybrid design of key pre-distribution scheme for wireless sensor networks / Detecting ARP spoofing: an active technique / Episode based masquerade detection / Modifications of SHA-0 to prevent attacks / How to solve key escrow and identity revocation in identity-based encryption schemes / On broadcast encryption with random key pre-distribution schemes / A framework for examining skill specialization, gender inequity, and career advancement in the information security field / SPEAR: design of a secured peer-to-peer architecture / A web-enabled enterprise security management framework based on a unified model of enterprise information system security / Development of a comprehensive intrusion detection system -- challenges and approaches / A transparent end-to-end security solution / Vijay Varadharajan -- Ernesto Damiani [and others] -- Kevin R.B. Butler, Patrick D. McDaniel -- Prem Chand -- Bruce Christianson [and others] -- JungHoon Ha [and others] -- Indrajit Ray [and others] -- Weiliang Zhao [and others] -- Jaijit Bhattacharya, S.K. Gupta -- Janice Warner [and others] -- Frédéric Cuppens [and others] -- V. Radha, N. Hemanth Kumar -- Indrakshi Ray, Wei Huang -- Jian Wang [and others] -- Ashok Kumar Das -- Debdeep Mukhopadhyay [and others] -- Dibyendu Chakrabarti [and others] -- Vivek Ramachandran, Sukumar Nandi -- Subrat Kumar Dash [and others] -- Roshni Chatterjee [and others] -- JoongHyo Oh [and others] -- Mahalingam Ramkumar -- Sharmistha Bagchi-Sen [and others] -- Jaydev Misra [and others] -- Anirban Sengupta [and others] -- N. Subramanian [and others] -- Shince Thomas [and others].
9783540324225 3540324224 3540307060 9783540307068
10.1007/11593980 doi
11593980
978-3-540-30706-8 Springer http://www.springerlink.com
GBA620107 bnb 05,N48,0035 dnb
013389541 Uk
Computer security--Congresses.
Computers--Access control--Congresses.
Sécurité informatique--Congrès.
Ordinateurs--Accès--Contrôle--Congrès.
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Informatique.
Computer security.
Computers--Access control.
Anwendungssystem
Authentifikation
Computersicherheit
Datensicherung
Eindringerkennung
Informationssystem
Verteiltes System
Congress
Conference papers and proceedings.
Conference papers and proceedings.
Actes de congrès.
Kalkutta (2005)
Kongress.
QA76.9.A25 / I5543 2005eb
005.8