Custom cover image
Custom cover image

Information Systems Security (vol. # 3803) : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / edited by Sushil Jajodia, Chandan Mazumdar

Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Series: SpringerLink Bücher | Lecture notes in computer science ; 3803Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005Description: Online-Ressource (XI, 342 p. Also available online, digital)ISBN:
  • 9783540324225
Subject(s): Genre/Form: Additional physical formats: 9783540307068 | Buchausg. u.d.T.: Information systems security. Berlin : Springer, 2005. XI, 342 S.RVK: RVK: SS 4800LOC classification:
  • TK5105.5-5105.9
DOI: DOI: 10.1007/11593980Online resources: Summary: Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry -- Auditable Anonymous Delegation -- A Robust Double Auction Protocol Based on a Hybrid Trust Model -- VTrust: A Trust Management System Based on a Vector Model of Trust -- Analysis and Modelling of Trust in Distributed Information Systems -- EPAL Based Privacy Enforcement Using ECA Rules -- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies -- Protection of Relationships in XML Documents with the XML-BB Model -- EISA – An Enterprise Application Security Solution for Databases -- Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast Fingerprinting -- A Key Reshuffling Scheme for Wireless Sensor Networks -- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks -- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks -- Detecting ARP Spoofing: An Active Technique -- Episode Based Masquerade Detection -- A Game-Theoretic Approach to Credit Card Fraud Detection -- Modifications of SHA-0 to Prevent Attacks -- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes -- On Broadcast Encryption with Random Key Pre-distribution Schemes -- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field -- SPEAR: Design of a Secured Peer-to-Peer Architecture -- A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security -- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches -- A Transparent End-to-End Security Solution.PPN: PPN: 164764741XPackage identifier: Produktsigel: ZDB-2-SCS | ZDB-2-LNC | ZDB-2-SEB | ZDB-2-SCS | ZDB-2-SXCS | ZDB-2-SEB
No physical items for this record