Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings / Sushil Jajodia, Chandan Mazumdar (eds.).
Material type:
TextPublisher number: 11593980Series: Lecture notes in computer science ; 3803.Publication details: Berlin : Springer, ©2005.Description: 1 online resource (xi, 342 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783540324225
- 3540324224
- 3540307060
- 9783540307068
- ICISS 2005
- Computer security -- Congresses
- Computers -- Access control -- Congresses
- Sécurité informatique -- Congrès
- Ordinateurs -- Accès -- Contrôle -- Congrès
- COMPUTERS -- Internet -- Security
- COMPUTERS -- Networking -- Security
- COMPUTERS -- Security -- General
- Informatique
- Computer security
- Computers -- Access control
- Anwendungssystem
- Authentifikation
- Computersicherheit
- Datensicherung
- Eindringerkennung
- Informationssystem
- Verteiltes System
- 005.8 22
- QA76.9.A25 I5543 2005eb
- 54.62
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
"The 1st International Conference on Information Systems Security (ICISS 2005) ... at Jadavpur University, Kolkata, India."--Preface
Includes bibliographical references and index.
Authorization and trust enhanced security for distributed applications / Vijay Varadharajan -- Toward exploiting location-based and video information in negotiated access control policies / Ernesto Damiani [and others] -- Understanding mutable Internet pathogens, or how I learned to stop worrying and love parastitic behavior / Kevin R.B. Butler, Patrick D. McDaniel -- Building India as the destination for secure software development -- next wave of opportunities of the ICT industry / Prem Chand -- Auditable anaonymous delegation / Bruce Christianson [and others] -- A robust double auction protocol based on a hybrid trust model / JungHoon Ha [and others] -- VTrust: a trust management system based on a vector model of trust / Indrajit Ray [and others] -- Analysis and modelling of trust in distributed information systems / Weiliang Zhao [and others] -- EPAL based privacy enforcement using ECA rules / Jaijit Bhattacharya, S.K. Gupta -- An attribute graph based approach to map local access control policies to credential based access control policies / Janice Warner [and others] -- Protection of relationship in XML documents with the XML-BB model / Frédéric Cuppens [and others] -- EISA -- an enterprise application security solution for databases / V. Radha, N. Hemanth Kumar -- Event detection in multilevel secure active databases / Indrakshi Ray, Wei Huang -- Key management for multicast fingerprinting / Jian Wang [and others] -- A key reshuffling scheme for wireless sensor networks / Ashok Kumar Das -- CCMEA: customized cellular message encryption algorithm for wireless networks / Debdeep Mukhopadhyay [and others] -- A hybrid design of key pre-distribution scheme for wireless sensor networks / Dibyendu Chakrabarti [and others] -- Detecting ARP spoofing: an active technique / Vivek Ramachandran, Sukumar Nandi -- Episode based masquerade detection / Subrat Kumar Dash [and others] -- Modifications of SHA-0 to prevent attacks / Roshni Chatterjee [and others] -- How to solve key escrow and identity revocation in identity-based encryption schemes / JoongHyo Oh [and others] -- On broadcast encryption with random key pre-distribution schemes / Mahalingam Ramkumar -- A framework for examining skill specialization, gender inequity, and career advancement in the information security field / Sharmistha Bagchi-Sen [and others] -- SPEAR: design of a secured peer-to-peer architecture / Jaydev Misra [and others] -- A web-enabled enterprise security management framework based on a unified model of enterprise information system security / Anirban Sengupta [and others] -- Development of a comprehensive intrusion detection system -- challenges and approaches / N. Subramanian [and others] -- A transparent end-to-end security solution / Shince Thomas [and others].
Print version record.