TY - BOOK AU - Jajodia,Sushil AU - Mazumdar,Chandan ED - ICISS (Conference) TI - Information systems security: first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings T2 - Lecture notes in computer science, SN - 9783540324225 AV - QA76.9.A25 I5543 2005eb U1 - 005.8 22 PY - 2005/// CY - Berlin PB - Springer KW - Computer security KW - Congresses KW - Computers KW - Access control KW - Sécurité informatique KW - Congrès KW - Ordinateurs KW - Accès KW - Contrôle KW - COMPUTERS KW - Internet KW - Security KW - bisacsh KW - Networking KW - General KW - Informatique KW - eclas KW - fast KW - Anwendungssystem KW - gnd KW - Authentifikation KW - Computersicherheit KW - Datensicherung KW - Eindringerkennung KW - Informationssystem KW - Verteiltes System KW - Congress KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf KW - Kalkutta (2005) KW - swd KW - Kongress N1 - "The 1st International Conference on Information Systems Security (ICISS 2005) ... at Jadavpur University, Kolkata, India."--Preface; Includes bibliographical references and index; Authorization and trust enhanced security for distributed applications; Vijay Varadharajan --; Toward exploiting location-based and video information in negotiated access control policies; Ernesto Damiani [and others] --; Understanding mutable Internet pathogens, or how I learned to stop worrying and love parastitic behavior; Kevin R.B. Butler, Patrick D. McDaniel --; Building India as the destination for secure software development -- next wave of opportunities of the ICT industry; Prem Chand --; Auditable anaonymous delegation; Bruce Christianson [and others] --; A robust double auction protocol based on a hybrid trust model; JungHoon Ha [and others] --; VTrust: a trust management system based on a vector model of trust; Indrajit Ray [and others] --; Analysis and modelling of trust in distributed information systems; Weiliang Zhao [and others] --; EPAL based privacy enforcement using ECA rules; Jaijit Bhattacharya, S.K. Gupta --; An attribute graph based approach to map local access control policies to credential based access control policies; Janice Warner [and others] --; Protection of relationship in XML documents with the XML-BB model; Frédéric Cuppens [and others] --; EISA -- an enterprise application security solution for databases; V. Radha, N. Hemanth Kumar --; Event detection in multilevel secure active databases; Indrakshi Ray, Wei Huang --; Key management for multicast fingerprinting; Jian Wang [and others] --; A key reshuffling scheme for wireless sensor networks; Ashok Kumar Das --; CCMEA: customized cellular message encryption algorithm for wireless networks; Debdeep Mukhopadhyay [and others] --; A hybrid design of key pre-distribution scheme for wireless sensor networks; Dibyendu Chakrabarti [and others] --; Detecting ARP spoofing: an active technique; Vivek Ramachandran, Sukumar Nandi --; Episode based masquerade detection; Subrat Kumar Dash [and others] --; Modifications of SHA-0 to prevent attacks; Roshni Chatterjee [and others] --; How to solve key escrow and identity revocation in identity-based encryption schemes; JoongHyo Oh [and others] --; On broadcast encryption with random key pre-distribution schemes; Mahalingam Ramkumar --; A framework for examining skill specialization, gender inequity, and career advancement in the information security field; Sharmistha Bagchi-Sen [and others] --; SPEAR: design of a secured peer-to-peer architecture; Jaydev Misra [and others] --; A web-enabled enterprise security management framework based on a unified model of enterprise information system security; Anirban Sengupta [and others] --; Development of a comprehensive intrusion detection system -- challenges and approaches; N. Subramanian [and others] --; A transparent end-to-end security solution; Shince Thomas [and others] UR - https://link.springer.com/10.1007/11593980 ER -