Cargando…

Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings /

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Venkatakrishnan, Venkat (Editor ), Goswami, Diganta (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Edición:1st ed. 2012.
Colección:Security and Cryptology ; 7671
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Fighting Malicious Software
  • VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security
  • Security Assessment of Node.js Platform
  • Foundations of Dynamic Access Control
  • Risk-Aware RBAC Sessions
  • A Cognitive Trust Model for Access Control Framework i MANET
  • Trust-OrBAC: A Trust Access Control Model in Multi-Organization Environments
  • On Policies and Intents
  • ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel
  • Keyless Steganography in Spatial Domain Using Energetic Pixels
  • Fuzzy Inference Rule Based Reversible Watermarking for Digital Images
  • Secure Trust Metadata Management for Mobile Ad-Hoc Networks
  • Defence against Wormhole Attacks in Wireless Mesh Networks
  • A Novel Key Update Protocol in Mobile Sensor Networks
  • Autonomous Certification with List-Based Revocation for Secure V2V Communication
  • Mitigating Insider Threat on Database Integrity
  • Coercion Resistant MIX for Electronic Auction
  • Verification of Money Atomicity in Digital Cash Based Payment System
  • Cryptographic Analysis of a Type of Sequence Generators
  • Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs
  • Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks
  • Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF
  • Attacking Image Based CAPTCHAs Using Image Recognition Techniques
  • Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.