Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Jajodia, Sushil (Επιμελητής έκδοσης), Mazumdar, Chandan (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3803
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Authorization and Trust Enhanced Security for Distributed Applications
  • Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies
  • Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior
  • Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry
  • Auditable Anonymous Delegation
  • A Robust Double Auction Protocol Based on a Hybrid Trust Model
  • VTrust: A Trust Management System Based on a Vector Model of Trust
  • Analysis and Modelling of Trust in Distributed Information Systems
  • EPAL Based Privacy Enforcement Using ECA Rules
  • An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies
  • Protection of Relationships in XML Documents with the XML-BB Model
  • EISA – An Enterprise Application Security Solution for Databases
  • Event Detection in Multilevel Secure Active Databases
  • Key Management for Multicast Fingerprinting
  • A Key Reshuffling Scheme for Wireless Sensor Networks
  • CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks
  • A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks
  • Detecting ARP Spoofing: An Active Technique
  • Episode Based Masquerade Detection
  • A Game-Theoretic Approach to Credit Card Fraud Detection
  • Modifications of SHA-0 to Prevent Attacks
  • How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes
  • On Broadcast Encryption with Random Key Pre-distribution Schemes
  • A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field
  • SPEAR: Design of a Secured Peer-to-Peer Architecture
  • A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security
  • Development of a Comprehensive Intrusion Detection System – Challenges and Approaches
  • A Transparent End-to-End Security Solution.