Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Security and Cryptology ;
4332 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Invited Papers
- Privacy in the Electronic Society
- A Data Sharing Agreement Framework
- Password Exhaustion: Predicting the End of Password Usefulness
- Network Monitoring for Security and Forensics
- Data and Application Security
- Fairness Strategy for Multilevel Secure Concurrency Control Protocol
- Optimistic Anonymous Participation in Inter-organizational Workflow Instances
- O2O: Virtual Private Organizations to Manage Security Policy Interoperability
- Privacy Preserving Web-Based Email
- Access Control
- Context-Aware Provisional Access Control
- LRBAC: A Location-Aware Role-Based Access Control Model
- Extending Context Descriptions in Semantics-Aware Access Control
- Specification and Realization of Access Control in SPKI/SDSI
- Key Management and Security in Wireless Networks
- Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack
- An Efficient Key Assignment Scheme for Access Control in a Hierarchy
- Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers
- Secure Data Management in Reactive Sensor Networks
- Threat Analysis, Detection and Recovery
- Security Ontology: Simulating Threats to Corporate Assets
- Two-Stage Credit Card Fraud Detection Using Sequence Alignment
- New Malicious Code Detection Using Variable Length n-grams
- A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes
- Cryptography and Encryption
- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack
- A Partial Image Encryption Method with Pseudo Random Sequences
- High Capacity Lossless Data Hiding
- An Implementation and Evaluation of Online Disk Encryption for Windows Systems
- Short Papers and Research Reports
- Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract)
- A Survey of Control-Flow Obfuscations
- Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments
- Secure Itineraries Framework for Mobile Agent Systems
- Malafide Intension Based Detection of Privacy Violation in Information System
- Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report)
- Towards a Formal Specification Method for Enterprise Information System Security
- Recent Research on Privacy Preserving Data Mining.