Cargando…

Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings /

This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009. The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 8...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Prakash, Atul (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5905
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Keynote Talks
  • A Survey of Voice over IP Security Research
  • Security for a Smarter Planet
  • The WOMBAT Attack Attribution Method: Some Results
  • Biometrics and Security
  • Authentication
  • Remote Electronic Voting with Revocable Anonymity
  • On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals
  • On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
  • Verification
  • Biometric Identification over Encrypted Data Made Feasible
  • Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity
  • Formal Verification of Security Policy Implementations in Enterprise Networks
  • Systems Security
  • Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
  • An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products
  • DROP: Detecting Return-Oriented Programming Malicious Code
  • Behavior Analysis
  • A Framework for Behavior-Based Malware Analysis in the Cloud
  • BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
  • Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders
  • Database Security
  • Database Relation Watermarking Resilient against Secondary Watermarking Attacks
  • A Robust Damage Assessment Model for Corrupted Database Systems
  • A Generic Distortion Free Watermarking Technique for Relational Databases
  • Cryptography
  • On Some Weaknesses in the Disk Encryption Schemes EME and EME2
  • TWIS - A Lightweight Block Cipher
  • Short Papers
  • Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking
  • Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
  • Let Only the Right One IN: Privacy Management Scheme for Social Network
  • Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).