Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2005.
|
Σειρά: | Lecture Notes in Computer Science,
3803 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Authorization and Trust Enhanced Security for Distributed Applications
- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies
- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior
- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry
- Auditable Anonymous Delegation
- A Robust Double Auction Protocol Based on a Hybrid Trust Model
- VTrust: A Trust Management System Based on a Vector Model of Trust
- Analysis and Modelling of Trust in Distributed Information Systems
- EPAL Based Privacy Enforcement Using ECA Rules
- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies
- Protection of Relationships in XML Documents with the XML-BB Model
- EISA – An Enterprise Application Security Solution for Databases
- Event Detection in Multilevel Secure Active Databases
- Key Management for Multicast Fingerprinting
- A Key Reshuffling Scheme for Wireless Sensor Networks
- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks
- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks
- Detecting ARP Spoofing: An Active Technique
- Episode Based Masquerade Detection
- A Game-Theoretic Approach to Credit Card Fraud Detection
- Modifications of SHA-0 to Prevent Attacks
- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes
- On Broadcast Encryption with Random Key Pre-distribution Schemes
- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field
- SPEAR: Design of a Secured Peer-to-Peer Architecture
- A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security
- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches
- A Transparent End-to-End Security Solution.