Cargando…

Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings /

This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully review...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Sekar, R. (Editor ), Pujari, Arun K. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:Security and Cryptology ; 5352
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Keynote Address
  • BitBlaze: A New Approach to Computer Security via Binary Analysis
  • Languages and Formal Methods
  • On the Decidability of Model-Checking Information Flow Properties
  • Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties
  • Implicit Flows: Can't Live with 'Em, Can't Live without 'Em
  • Protocols
  • A Robust Reputation Scheme for Decentralized Group Management Systems
  • Complexity of Checking Freshness of Cryptographic Protocols
  • Secure Internet Voting Based on Paper Ballots
  • Short Papers
  • A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)
  • A Framework for Trustworthy Service-Oriented Computing (Short Paper)
  • Revisiting Bluetooth Security (Short Paper)
  • A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper)
  • Keynote Address
  • Computing on Encrypted Data
  • Ongoing Research
  • Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators
  • Proxy Re-signature Schemes
  • Keynote Address
  • Fast Signature Matching Using Extended Finite Automaton (XFA)
  • Intrusion Detection
  • Real-Time Alert Correlation with Type Graphs
  • Incorporation of Application Layer Protocol Syntax into Anomaly Detection
  • A Parallel Architecture for Stateful, High-Speed Intrusion Detection
  • Biometrics, Forensics and Steganography
  • Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion
  • Audio Watermarking Based on Quantization in Wavelet Domain
  • Overwriting Hard Drive Data: The Great Wiping Controversy
  • Practical Applications
  • Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks
  • Privacy Management for Facebook
  • HyDRo - Hybrid Development of Roles
  • Keynote Address
  • The Enlightened Era of Enterprise Security (Invited Talk).