1. ICISS 2005:
Kolkata,
India
Sushil Jajodia, Chandan Mazumdar (Eds.):
Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings.
Lecture Notes in Computer Science 3803 Springer 2005, ISBN 3-540-30706-0
- Vijay Varadharajan:
Authorization and Trust Enhanced Security for Distributed Applications.
1-20
- Ernesto Damiani, Marco Anisetti, Valerio Bellandi:
Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies.
21-35
- Kevin R. B. Butler, Patrick Drew McDaniel:
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.
36-48
- Prem Chand:
Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the ICT Industry.
49-65
- Bruce Christianson, Partha Das Chowdhury, James A. Malcolm:
Auditable Anonymous Delegation.
66-76
- JungHoon Ha, Jianying Zhou, Sang-Jae Moon:
A Robust Double Auction Protocol Based on a Hybrid Trust Model.
77-90
- Indrajit Ray, Sudip Chakraborty, Indrakshi Ray:
VTrust: A Trust Management System Based on a Vector Model of Trust.
91-105
- Weiliang Zhao, Vijay Varadharajan, George Bryan:
Analysis and Modelling of Trust in Distributed Information Systems.
106-119
- Jaijit Bhattacharya, S. K. Gupta:
EPAL Based Privacy Enforcement Using ECA Rules.
120-133
- Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala:
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.
134-147
- Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans:
Protection of Relationships in XML Documents with the XML-BB Model.
148-163
- V. Radha, N. Hemanth Kumar:
EISA - An Enterprise Application Security Solution for Databases.
164-176
- Indrakshi Ray, Wei Huang:
Event Detection in Multilevel Secure Active Databases.
177-190
- Jian Wang, Lein Harn, Hideki Imai:
Key Management for Multicast Fingerprinting.
191-204
- Ashok Kumar Das:
A Key Reshuffling Scheme for Wireless Sensor Networks.
205-216
- Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita Roy Chowdhury:
CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks.
217-227
- Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy:
A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks.
228-238
- Vivek Ramachandran, Sukumar Nandi:
Detecting ARP Spoofing: An Active Technique.
239-250
- Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari:
Episode Based Masquerade Detection.
251-262
- Vishal Vatsa, Shamik Sural, Arun K. Majumdar:
A Game-Theoretic Approach to Credit Card Fraud Detection.
263-276
- Roshni Chatterjee, Moiz A. Saifee, Dipanwita Roy Chowdhury:
Modifications of SHA-0 to Prevent Attacks.
277-289
- JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon:
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes.
290-303
- Mahalingam Ramkumar:
On Broadcast Encryption with Random Key Pre-distribution Schemes.
304-316
- Sharmistha Bagchi-Sen, JinKyu Lee, H. Raghav Rao, Shambhu J. Upadhyaya:
A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field .
317-321
- Jaydev Misra, Pinakpani Pal, Aditya Bagchi:
SPEAR: Design of a Secured Peer-to-Peer Architecture .
322-327
- Anirban Sengupta, Aniruddha Mukhopadhyay, Koel Ray, Aveek Guha Roy, Dipankar Aich, Mridul Sankar Barik, Chandan Mazumdar:
A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security .
328-331
- N. Subramanian, Pramod S. Pawar, Mayank Bhatnagar, Nihar S. Khedekar, Srinivas Guntupalli, N. Satyanarayana, V. K. Vijaykumar, Praveen D. Ampatt, Rajiv Ranjan, Prasad J. Pandit:
Development of a Comprehensive Intrusion Detection System - Challenges and Approaches.
332-335
- Shince Thomas, Devesh Misra, P. R. Lakshmi Eswari, N. Sarat Chandra Babu:
A Transparent End-to-End Security Solution.
336-339
Copyright © Sun Mar 14 23:08:06 2010
by Michael Ley (ley@uni-trier.de)