Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings / Sushil Jajodia, Chandan Mazumdar (eds.).
Contributor(s): Jajodia, Sushil | Mazumdar, Chandan.Material type: TextSeries: Springer.Lecture notes in computer science: 3803.Publisher: Berlin : Springer, c2005Description: 1 online resource (xi, 342 p.) : ill.ISBN: 9783540324225; 3540324224; 3540307060; 9783540307068; 6611404708; 9786611404703.Other title: ICISS 2005.Subject(s): Computer security -- Congresses | Computers -- Access control -- CongressesAdditional physical formats: Print version:: Information systems security.LOC classification: QA76.9.A25 | I5543 2005Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.9.A25 I5543 2005 (Browse shelf)||http://ezproxy.uttyler.edu:2048/login?url=http://dx.doi.org/10.1007/11593980||Available||ocn262681062|
"The 1st International Conference on Information Systems Security (ICISS 2005) ... at Jadavpur University, Kolkata, India."--Pref.
Includes bibliographical references and index.
Authorization and trust enhanced security for distributed applications / Vijay Varadharajan -- Toward exploiting location-based and video information in negotiated access control policies / Ernesto Damiani ... [et al.] -- Understanding mutable Internet pathogens, or how I learned to stop worrying and love parastitic behavior / Kevin R.B. Butler, Patrick D. McDaniel -- Building India as the destination for secure software development -- next wave of opportunities of the ICT industry / Prem Chand -- Auditable anaonymous delegation / Bruce Christianson ... [et al.] -- A robust double auction protocol based on a hybrid trust model / JungHoon Ha ... [et al.] -- VTrust: a trust management system based on a vector model of trust / Indrajit Ray ... [et al.] -- Analysis and modelling of trust in distributed information systems / Weiliang Zhao ... [et al.] -- EPAL based privacy enforcement using ECA rules / Jaijit Bhattacharya, S.K. Gupta -- An attribute graph based approach to map local access control policies to credential based access control policies / Janice Warner ... [et al.] -- Protection of relationship in XML documents with the XML-BB model / Frédéric Cuppens ... [et al.] -- EISA -- an enterprise application security solution for databases / V. Radha, N. Hemanth Kumar -- Event detection in multilevel secure active databases / Indrakshi Ray, Wei Huang -- Key management for multicast fingerprinting / Jian Wang ... [et al.] -- A key reshuffling scheme for wireless sensor networks / Ashok Kumar Das -- CCMEA: customized cellular message encryption algorithm for wireless networks / Debdeep Mukhopadhyay ... [et al.] -- A hybrid design of key pre-distribution scheme for wireless sensor networks / Dibyendu Chakrabarti ... [et al.] -- Detecting ARP spoofing: an active technique / Vivek Ramachandran, Sukumar Nandi -- Episode based masquerade detection / Subrat Kumar Dash ... [et al.] -- Modifications of SHA-0 to prevent attacks / Roshni Chatterjee ... [et al.] -- How to solve key escrow and identity revocation in identity-based encryption schemes / JoongHyo Oh ... [et al.] -- On broadcast encryption with random key pre-distribution schemes / Mahalingam Ramkumar -- A framework for examining skill specialization, gender inequity, and career advancement in the information security field / Sharmistha Bagchi-Sen ... [et al.] -- SPEAR: design of a secured peer-to-peer architecture / Jaydev Misra ... [et al.] -- A web-enabled enterprise security management framework based on a unified model of enterprise information system security / Anirban Sengupta ... [et al.] -- Development of a comprehensive intrusion detection system -- challenges and approaches / N. Subramanian ... [et al.] -- A transparent end-to-end security solution / Shince Thomas ... [et al.].
Description based on print version record.