Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings /
This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully review...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2008.
|
Edición: | 1st ed. 2008. |
Colección: | Security and Cryptology ;
5352 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Keynote Address
- BitBlaze: A New Approach to Computer Security via Binary Analysis
- Languages and Formal Methods
- On the Decidability of Model-Checking Information Flow Properties
- Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties
- Implicit Flows: Can't Live with 'Em, Can't Live without 'Em
- Protocols
- A Robust Reputation Scheme for Decentralized Group Management Systems
- Complexity of Checking Freshness of Cryptographic Protocols
- Secure Internet Voting Based on Paper Ballots
- Short Papers
- A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)
- A Framework for Trustworthy Service-Oriented Computing (Short Paper)
- Revisiting Bluetooth Security (Short Paper)
- A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper)
- Keynote Address
- Computing on Encrypted Data
- Ongoing Research
- Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators
- Proxy Re-signature Schemes
- Keynote Address
- Fast Signature Matching Using Extended Finite Automaton (XFA)
- Intrusion Detection
- Real-Time Alert Correlation with Type Graphs
- Incorporation of Application Layer Protocol Syntax into Anomaly Detection
- A Parallel Architecture for Stateful, High-Speed Intrusion Detection
- Biometrics, Forensics and Steganography
- Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion
- Audio Watermarking Based on Quantization in Wavelet Domain
- Overwriting Hard Drive Data: The Great Wiping Controversy
- Practical Applications
- Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks
- Privacy Management for Facebook
- HyDRo - Hybrid Development of Roles
- Keynote Address
- The Enlightened Era of Enterprise Security (Invited Talk).