Amazon cover image
Image from Amazon.com

Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings / Sushil Jajodia, Chandan Mazumdar (eds.).

By: (1st : ICISS (Conference) (1st : 2005 : Kolkata, India)Contributor(s): Jajodia, Sushil | Mazumdar, ChandanMaterial type: TextTextPublisher number: 11593980Series: Serienbezeichnung | Lecture notes in computer science ; 3803.Publication details: Berlin : Springer, ©2005. Description: 1 online resource (xi, 342 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540324225; 3540324224; 3540307060; 9783540307068Other title: ICISS 2005Subject(s): Computer security -- Congresses | Computers -- Access control -- Congresses | Sécurité informatique -- Congrès | Ordinateurs -- Accès -- Contrôle -- Congrès | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Informatique | Computer security | Computers -- Access control | Anwendungssystem | Authentifikation | Computersicherheit | Datensicherung | Eindringerkennung | Informationssystem | Verteiltes SystemGenre/Form: Electronic books. | Conference papers and proceedings. | Kalkutta (2005) | Kongress. Additional physical formats: Print version:: Information systems security.DDC classification: 005.8 LOC classification: QA76.9.A25 | I5543 2005ebOther classification: 54.62 Online resources: Click here to access online
Contents:
Authorization and trust enhanced security for distributed applications / Vijay Varadharajan -- Toward exploiting location-based and video information in negotiated access control policies / Ernesto Damiani [and others] -- Understanding mutable Internet pathogens, or how I learned to stop worrying and love parastitic behavior / Kevin R.B. Butler, Patrick D. McDaniel -- Building India as the destination for secure software development -- next wave of opportunities of the ICT industry / Prem Chand -- Auditable anaonymous delegation / Bruce Christianson [and others] -- A robust double auction protocol based on a hybrid trust model / JungHoon Ha [and others] -- VTrust: a trust management system based on a vector model of trust / Indrajit Ray [and others] -- Analysis and modelling of trust in distributed information systems / Weiliang Zhao [and others] -- EPAL based privacy enforcement using ECA rules / Jaijit Bhattacharya, S.K. Gupta -- An attribute graph based approach to map local access control policies to credential based access control policies / Janice Warner [and others] -- Protection of relationship in XML documents with the XML-BB model / Frédéric Cuppens [and others] -- EISA -- an enterprise application security solution for databases / V. Radha, N. Hemanth Kumar -- Event detection in multilevel secure active databases / Indrakshi Ray, Wei Huang -- Key management for multicast fingerprinting / Jian Wang [and others] -- A key reshuffling scheme for wireless sensor networks / Ashok Kumar Das -- CCMEA: customized cellular message encryption algorithm for wireless networks / Debdeep Mukhopadhyay [and others] -- A hybrid design of key pre-distribution scheme for wireless sensor networks / Dibyendu Chakrabarti [and others] -- Detecting ARP spoofing: an active technique / Vivek Ramachandran, Sukumar Nandi -- Episode based masquerade detection / Subrat Kumar Dash [and others] -- Modifications of SHA-0 to prevent attacks / Roshni Chatterjee [and others] -- How to solve key escrow and identity revocation in identity-based encryption schemes / JoongHyo Oh [and others] -- On broadcast encryption with random key pre-distribution schemes / Mahalingam Ramkumar -- A framework for examining skill specialization, gender inequity, and career advancement in the information security field / Sharmistha Bagchi-Sen [and others] -- SPEAR: design of a secured peer-to-peer architecture / Jaydev Misra [and others] -- A web-enabled enterprise security management framework based on a unified model of enterprise information system security / Anirban Sengupta [and others] -- Development of a comprehensive intrusion detection system -- challenges and approaches / N. Subramanian [and others] -- A transparent end-to-end security solution / Shince Thomas [and others].
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

"The 1st International Conference on Information Systems Security (ICISS 2005) ... at Jadavpur University, Kolkata, India."--Preface.

Includes bibliographical references and index.

Authorization and trust enhanced security for distributed applications / Vijay Varadharajan -- Toward exploiting location-based and video information in negotiated access control policies / Ernesto Damiani [and others] -- Understanding mutable Internet pathogens, or how I learned to stop worrying and love parastitic behavior / Kevin R.B. Butler, Patrick D. McDaniel -- Building India as the destination for secure software development -- next wave of opportunities of the ICT industry / Prem Chand -- Auditable anaonymous delegation / Bruce Christianson [and others] -- A robust double auction protocol based on a hybrid trust model / JungHoon Ha [and others] -- VTrust: a trust management system based on a vector model of trust / Indrajit Ray [and others] -- Analysis and modelling of trust in distributed information systems / Weiliang Zhao [and others] -- EPAL based privacy enforcement using ECA rules / Jaijit Bhattacharya, S.K. Gupta -- An attribute graph based approach to map local access control policies to credential based access control policies / Janice Warner [and others] -- Protection of relationship in XML documents with the XML-BB model / Frédéric Cuppens [and others] -- EISA -- an enterprise application security solution for databases / V. Radha, N. Hemanth Kumar -- Event detection in multilevel secure active databases / Indrakshi Ray, Wei Huang -- Key management for multicast fingerprinting / Jian Wang [and others] -- A key reshuffling scheme for wireless sensor networks / Ashok Kumar Das -- CCMEA: customized cellular message encryption algorithm for wireless networks / Debdeep Mukhopadhyay [and others] -- A hybrid design of key pre-distribution scheme for wireless sensor networks / Dibyendu Chakrabarti [and others] -- Detecting ARP spoofing: an active technique / Vivek Ramachandran, Sukumar Nandi -- Episode based masquerade detection / Subrat Kumar Dash [and others] -- Modifications of SHA-0 to prevent attacks / Roshni Chatterjee [and others] -- How to solve key escrow and identity revocation in identity-based encryption schemes / JoongHyo Oh [and others] -- On broadcast encryption with random key pre-distribution schemes / Mahalingam Ramkumar -- A framework for examining skill specialization, gender inequity, and career advancement in the information security field / Sharmistha Bagchi-Sen [and others] -- SPEAR: design of a secured peer-to-peer architecture / Jaydev Misra [and others] -- A web-enabled enterprise security management framework based on a unified model of enterprise information system security / Anirban Sengupta [and others] -- Development of a comprehensive intrusion detection system -- challenges and approaches / N. Subramanian [and others] -- A transparent end-to-end security solution / Shince Thomas [and others].

Print version record.

Other editions of this work

Other editions
Information Systems Security : ©2011
Information systems security :

Powered by Koha