Normal view MARC view ISBD view

Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings / Sushil Jajodia, Chandan Mazumdar (eds.).

By: (1st : International Conference on Information Systems Security (1st : 2005 : Calcutta, India).
Contributor(s): Jajodia, Sushil | Mazumdar, Chandan.
Material type: TextTextSeries: Springer.Lecture notes in computer science: 3803.Publisher: Berlin : Springer, c2005Description: 1 online resource (xi, 342 p.) : ill.ISBN: 9783540324225; 3540324224; 3540307060; 9783540307068; 6611404708; 9786611404703.Other title: ICISS 2005.Subject(s): Computer security -- Congresses | Computers -- Access control -- CongressesAdditional physical formats: Print version:: Information systems security.LOC classification: QA76.9.A25 | I5543 2005Online resources: Click here to view this ebook.
Contents:
Authorization and trust enhanced security for distributed applications / Vijay Varadharajan -- Toward exploiting location-based and video information in negotiated access control policies / Ernesto Damiani ... [et al.] -- Understanding mutable Internet pathogens, or how I learned to stop worrying and love parastitic behavior / Kevin R.B. Butler, Patrick D. McDaniel -- Building India as the destination for secure software development -- next wave of opportunities of the ICT industry / Prem Chand -- Auditable anaonymous delegation / Bruce Christianson ... [et al.] -- A robust double auction protocol based on a hybrid trust model / JungHoon Ha ... [et al.] -- VTrust: a trust management system based on a vector model of trust / Indrajit Ray ... [et al.] -- Analysis and modelling of trust in distributed information systems / Weiliang Zhao ... [et al.] -- EPAL based privacy enforcement using ECA rules / Jaijit Bhattacharya, S.K. Gupta -- An attribute graph based approach to map local access control policies to credential based access control policies / Janice Warner ... [et al.] -- Protection of relationship in XML documents with the XML-BB model / Frédéric Cuppens ... [et al.] -- EISA -- an enterprise application security solution for databases / V. Radha, N. Hemanth Kumar -- Event detection in multilevel secure active databases / Indrakshi Ray, Wei Huang -- Key management for multicast fingerprinting / Jian Wang ... [et al.] -- A key reshuffling scheme for wireless sensor networks / Ashok Kumar Das -- CCMEA: customized cellular message encryption algorithm for wireless networks / Debdeep Mukhopadhyay ... [et al.] -- A hybrid design of key pre-distribution scheme for wireless sensor networks / Dibyendu Chakrabarti ... [et al.] -- Detecting ARP spoofing: an active technique / Vivek Ramachandran, Sukumar Nandi -- Episode based masquerade detection / Subrat Kumar Dash ... [et al.] -- Modifications of SHA-0 to prevent attacks / Roshni Chatterjee ... [et al.] -- How to solve key escrow and identity revocation in identity-based encryption schemes / JoongHyo Oh ... [et al.] -- On broadcast encryption with random key pre-distribution schemes / Mahalingam Ramkumar -- A framework for examining skill specialization, gender inequity, and career advancement in the information security field / Sharmistha Bagchi-Sen ... [et al.] -- SPEAR: design of a secured peer-to-peer architecture / Jaydev Misra ... [et al.] -- A web-enabled enterprise security management framework based on a unified model of enterprise information system security / Anirban Sengupta ... [et al.] -- Development of a comprehensive intrusion detection system -- challenges and approaches / N. Subramanian ... [et al.] -- A transparent end-to-end security solution / Shince Thomas ... [et al.].
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.9.A25 I5543 2005 (Browse shelf) http://ezproxy.uttyler.edu:2048/login?url=http://dx.doi.org/10.1007/11593980 Available ocn262681062

"The 1st International Conference on Information Systems Security (ICISS 2005) ... at Jadavpur University, Kolkata, India."--Pref.

Includes bibliographical references and index.

Authorization and trust enhanced security for distributed applications / Vijay Varadharajan -- Toward exploiting location-based and video information in negotiated access control policies / Ernesto Damiani ... [et al.] -- Understanding mutable Internet pathogens, or how I learned to stop worrying and love parastitic behavior / Kevin R.B. Butler, Patrick D. McDaniel -- Building India as the destination for secure software development -- next wave of opportunities of the ICT industry / Prem Chand -- Auditable anaonymous delegation / Bruce Christianson ... [et al.] -- A robust double auction protocol based on a hybrid trust model / JungHoon Ha ... [et al.] -- VTrust: a trust management system based on a vector model of trust / Indrajit Ray ... [et al.] -- Analysis and modelling of trust in distributed information systems / Weiliang Zhao ... [et al.] -- EPAL based privacy enforcement using ECA rules / Jaijit Bhattacharya, S.K. Gupta -- An attribute graph based approach to map local access control policies to credential based access control policies / Janice Warner ... [et al.] -- Protection of relationship in XML documents with the XML-BB model / Frédéric Cuppens ... [et al.] -- EISA -- an enterprise application security solution for databases / V. Radha, N. Hemanth Kumar -- Event detection in multilevel secure active databases / Indrakshi Ray, Wei Huang -- Key management for multicast fingerprinting / Jian Wang ... [et al.] -- A key reshuffling scheme for wireless sensor networks / Ashok Kumar Das -- CCMEA: customized cellular message encryption algorithm for wireless networks / Debdeep Mukhopadhyay ... [et al.] -- A hybrid design of key pre-distribution scheme for wireless sensor networks / Dibyendu Chakrabarti ... [et al.] -- Detecting ARP spoofing: an active technique / Vivek Ramachandran, Sukumar Nandi -- Episode based masquerade detection / Subrat Kumar Dash ... [et al.] -- Modifications of SHA-0 to prevent attacks / Roshni Chatterjee ... [et al.] -- How to solve key escrow and identity revocation in identity-based encryption schemes / JoongHyo Oh ... [et al.] -- On broadcast encryption with random key pre-distribution schemes / Mahalingam Ramkumar -- A framework for examining skill specialization, gender inequity, and career advancement in the information security field / Sharmistha Bagchi-Sen ... [et al.] -- SPEAR: design of a secured peer-to-peer architecture / Jaydev Misra ... [et al.] -- A web-enabled enterprise security management framework based on a unified model of enterprise information system security / Anirban Sengupta ... [et al.] -- Development of a comprehensive intrusion detection system -- challenges and approaches / N. Subramanian ... [et al.] -- A transparent end-to-end security solution / Shince Thomas ... [et al.].

Description based on print version record.

There are no comments for this item.

Log in to your account to post a comment.