Cargando…

Information Systems Security First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Jajodia, Sushil (Editor ), Mazumdar, Chandan (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3803
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Authorization and Trust Enhanced Security for Distributed Applications
  • Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies
  • Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior
  • Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the ICT Industry
  • Auditable Anonymous Delegation
  • A Robust Double Auction Protocol Based on a Hybrid Trust Model
  • VTrust: A Trust Management System Based on a Vector Model of Trust
  • Analysis and Modelling of Trust in Distributed Information Systems
  • EPAL Based Privacy Enforcement Using ECA Rules
  • An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies
  • Protection of Relationships in XML Documents with the XML-BB Model
  • EISA - An Enterprise Application Security Solution for Databases
  • Event Detection in Multilevel Secure Active Databases
  • Key Management for Multicast Fingerprinting
  • A Key Reshuffling Scheme for Wireless Sensor Networks
  • CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks
  • A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks
  • Detecting ARP Spoofing: An Active Technique
  • Episode Based Masquerade Detection
  • A Game-Theoretic Approach to Credit Card Fraud Detection
  • Modifications of SHA-0 to Prevent Attacks
  • How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes
  • On Broadcast Encryption with Random Key Pre-distribution Schemes
  • A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field
  • SPEAR: Design of a Secured Peer-to-Peer Architecture
  • A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security
  • Development of a Comprehensive Intrusion Detection System - Challenges and Approaches
  • A Transparent End-to-End Security Solution.