default search action
1st ICISS 2005: Kolkata, India
- Sushil Jajodia, Chandan Mazumdar:
Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings. Lecture Notes in Computer Science 3803, Springer 2005, ISBN 3-540-30706-0 - Vijay Varadharajan:
Authorization and Trust Enhanced Security for Distributed Applications. 1-20 - Ernesto Damiani, Marco Anisetti, Valerio Bellandi:
Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies. 21-35 - Kevin R. B. Butler, Patrick D. McDaniel:
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. 36-48 - Prem Chand:
Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the ICT Industry. 49-65 - Bruce Christianson, Partha Das Chowdhury, James A. Malcolm:
Auditable Anonymous Delegation. 66-76 - JungHoon Ha, Jianying Zhou, Sang-Jae Moon:
A Robust Double Auction Protocol Based on a Hybrid Trust Model. 77-90 - Indrajit Ray, Sudip Chakraborty, Indrakshi Ray:
VTrust: A Trust Management System Based on a Vector Model of Trust. 91-105 - Weiliang Zhao, Vijay Varadharajan, George Bryan:
Analysis and Modelling of Trust in Distributed Information Systems. 106-119 - Jaijit Bhattacharya, S. K. Gupta:
EPAL Based Privacy Enforcement Using ECA Rules. 120-133 - Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala:
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. 134-147 - Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans:
Protection of Relationships in XML Documents with the XML-BB Model. 148-163 - V. Radha, N. Hemanth Kumar:
EISA - An Enterprise Application Security Solution for Databases. 164-176 - Indrakshi Ray, Wei Huang:
Event Detection in Multilevel Secure Active Databases. 177-190 - Jian Wang, Lein Harn, Hideki Imai:
Key Management for Multicast Fingerprinting. 191-204 - Ashok Kumar Das:
A Key Reshuffling Scheme for Wireless Sensor Networks. 205-216 - Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita Roy Chowdhury:
CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks. 217-227 - Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy:
A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks. 228-238 - Vivek Ramachandran, Sukumar Nandi:
Detecting ARP Spoofing: An Active Technique. 239-250 - Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari:
Episode Based Masquerade Detection. 251-262 - Vishal Vatsa, Shamik Sural, Arun K. Majumdar:
A Game-Theoretic Approach to Credit Card Fraud Detection. 263-276 - Roshni Chatterjee, Moiz A. Saifee, Dipanwita Roy Chowdhury:
Modifications of SHA-0 to Prevent Attacks. 277-289 - JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon:
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. 290-303 - Mahalingam Ramkumar:
On Broadcast Encryption with Random Key Pre-distribution Schemes. 304-316 - Sharmistha Bagchi-Sen, JinKyu Lee, H. Raghav Rao, Shambhu J. Upadhyaya:
A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field . 317-321 - Jaydev Mishra, Pinakpani Pal, Aditya Bagchi:
SPEAR: Design of a Secured Peer-to-Peer Architecture . 322-327 - Anirban Sengupta, Aniruddha Mukhopadhyay, Koel Ray, Aveek Guha Roy, Dipankar Aich, Mridul Sankar Barik, Chandan Mazumdar:
A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security . 328-331 - N. Subramanian, Pramod S. Pawar, Mayank Bhatnagar, Nihar S. Khedekar, Srinivas Guntupalli, N. Satyanarayana, V. K. Vijaykumar, Praveen D. Ampatt, Rajiv Ranjan, Prasad J. Pandit:
Development of a Comprehensive Intrusion Detection System - Challenges and Approaches. 332-335 - Shince Thomas, Devesh Misra, P. R. Lakshmi Eswari, N. Sarat Chandra Babu:
A Transparent End-to-End Security Solution. 336-339
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.