Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings /
This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009. The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 8...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Colección: | Security and Cryptology ;
5905 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Keynote Talks
- A Survey of Voice over IP Security Research
- Security for a Smarter Planet
- The WOMBAT Attack Attribution Method: Some Results
- Biometrics and Security
- Authentication
- Remote Electronic Voting with Revocable Anonymity
- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals
- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
- Verification
- Biometric Identification over Encrypted Data Made Feasible
- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity
- Formal Verification of Security Policy Implementations in Enterprise Networks
- Systems Security
- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products
- DROP: Detecting Return-Oriented Programming Malicious Code
- Behavior Analysis
- A Framework for Behavior-Based Malware Analysis in the Cloud
- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders
- Database Security
- Database Relation Watermarking Resilient against Secondary Watermarking Attacks
- A Robust Damage Assessment Model for Corrupted Database Systems
- A Generic Distortion Free Watermarking Technique for Relational Databases
- Cryptography
- On Some Weaknesses in the Disk Encryption Schemes EME and EME2
- TWIS - A Lightweight Block Cipher
- Short Papers
- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking
- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
- Let Only the Right One IN: Privacy Management Scheme for Social Network
- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).