Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings / Sushil Jajodia, Chandan Mazumdar (eds.).
Material type:
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
e-Library
Electronic Book@IST |
EBook | Available |
"The 1st International Conference on Information Systems Security (ICISS 2005) ... at Jadavpur University, Kolkata, India."--Preface.
Includes bibliographical references and index.
Authorization and trust enhanced security for distributed applications / Vijay Varadharajan -- Toward exploiting location-based and video information in negotiated access control policies / Ernesto Damiani [and others] -- Understanding mutable Internet pathogens, or how I learned to stop worrying and love parastitic behavior / Kevin R.B. Butler, Patrick D. McDaniel -- Building India as the destination for secure software development -- next wave of opportunities of the ICT industry / Prem Chand -- Auditable anaonymous delegation / Bruce Christianson [and others] -- A robust double auction protocol based on a hybrid trust model / JungHoon Ha [and others] -- VTrust: a trust management system based on a vector model of trust / Indrajit Ray [and others] -- Analysis and modelling of trust in distributed information systems / Weiliang Zhao [and others] -- EPAL based privacy enforcement using ECA rules / Jaijit Bhattacharya, S.K. Gupta -- An attribute graph based approach to map local access control policies to credential based access control policies / Janice Warner [and others] -- Protection of relationship in XML documents with the XML-BB model / Frédéric Cuppens [and others] -- EISA -- an enterprise application security solution for databases / V. Radha, N. Hemanth Kumar -- Event detection in multilevel secure active databases / Indrakshi Ray, Wei Huang -- Key management for multicast fingerprinting / Jian Wang [and others] -- A key reshuffling scheme for wireless sensor networks / Ashok Kumar Das -- CCMEA: customized cellular message encryption algorithm for wireless networks / Debdeep Mukhopadhyay [and others] -- A hybrid design of key pre-distribution scheme for wireless sensor networks / Dibyendu Chakrabarti [and others] -- Detecting ARP spoofing: an active technique / Vivek Ramachandran, Sukumar Nandi -- Episode based masquerade detection / Subrat Kumar Dash [and others] -- Modifications of SHA-0 to prevent attacks / Roshni Chatterjee [and others] -- How to solve key escrow and identity revocation in identity-based encryption schemes / JoongHyo Oh [and others] -- On broadcast encryption with random key pre-distribution schemes / Mahalingam Ramkumar -- A framework for examining skill specialization, gender inequity, and career advancement in the information security field / Sharmistha Bagchi-Sen [and others] -- SPEAR: design of a secured peer-to-peer architecture / Jaydev Misra [and others] -- A web-enabled enterprise security management framework based on a unified model of enterprise information system security / Anirban Sengupta [and others] -- Development of a comprehensive intrusion detection system -- challenges and approaches / N. Subramanian [and others] -- A transparent end-to-end security solution / Shince Thomas [and others].
Print version record.
Other editions of this work
![]() |
Information Systems Security : ©2011 |
![]() |
Information systems security : |