default search action
7th ICISS 2011: Kolkata, India
- Sushil Jajodia, Chandan Mazumdar:
Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings. Lecture Notes in Computer Science 7093, Springer 2011, ISBN 978-3-642-25559-5
Invited Papers
- Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Arunesh Sinha:
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. 1-27 - Yan Huang, Chih-Hao Shen, David Evans, Jonathan Katz, Abhi Shelat:
Efficient Secure Computation with Garbled Circuits. 28-48 - William Enck:
Defending Users against Smartphone Apps: Techniques and Future Directions. 49-70 - Vipul Goyal:
Secure Composition of Cryptographic Protocols. 71
Regular Papers
- Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé:
Flow Based Interpretation of Access Control: Detection of Illegal Information Flows. 72-86 - Julien A. Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia:
Consistency Policies for Dynamic Information Systems with Declassification Flows. 87-101 - Ram Krishnan, Ravi S. Sandhu:
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing. 102-115 - Puneet Gupta, Scott D. Stoller, Zhongyuan Xu:
Abductive Analysis of Administrative Policies in Rule-Based Access Control. 116-130 - Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips:
Towards Detection of Botnet Communication through Social Media by Monitoring User Activity. 131-143 - Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero:
Finding Non-trivial Malware Naming Inconsistencies. 144-159 - Lorenzo Cavallaro, R. Sekar:
Taint-Enhanced Anomaly Detection. 160-174 - Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing:
Secured Cloud Storage Scheme Using ECC Based Key Management in User Hierarchy. 175-189 - Ruchira Naskar, Rajat Subhra Chakraborty:
Reversible Image Watermarking through Coordinate Logic Operation Based Prediction. 190-203 - Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
Some Combinatorial Results towards State Recovery Attack on RC4. 204-214 - Indivar Gupta, P. K. Saxena:
Distributed Signcryption from Pairings. 215-234 - Meilof Veeningen, Benne de Weger, Nicola Zannone:
Formal Privacy Analysis of Communication Protocols for Identity Management. 235-249 - Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci:
Load Time Security Verification. 250-264 - Anuj Shanker Saxena, Mayank Pundir, Vikram Goyal, Debajyoti Bera:
Preserving Location Privacy for Continuous Queries on Known Route. 265-279 - Faraz Ahmed, M. Zubair Rafique, Muhammad Abulaish:
A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing Attacks. 280-293 - Prithu Banerjee, Mahasweta Mitra, Ferdous A. Barbhuiya, Sandip Chakraborty, Sukumar Nandi:
An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks. 294-308 - Ravi Shankar Yadav, Praveen Likhar, M. Keshava Rao:
SecWEM: A Security Solution for Web Based E-mail. 309-321 - Dimitris Geneiatakis, Georgios Portokalidis, Angelos D. Keromytis:
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS. 322-336 - Harini Ragavan, Brajendra Panda:
Mitigation of Malicious Modifications by Insiders in Databases. 337-351 - Filippo Del Tedesco, Sebastian Hunt, David Sands:
A Semantic Hierarchy for Erasure Policies. 352-369
Short Papers
- Christian A. Schneider, Jonas Pfoh, Claudia Eckert:
A Universal Semantic Bridge for Virtual Machine Introspection. 370-373 - Morteza Noferesti, Mohammad Ali Hadavi, Rasool Jalili:
A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios. 374-378 - Winfried E. Kühnhauser, Anja Pölck:
Towards Access Control Model Engineering. 379-382 - Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais:
IFrandbox - Client Side Protection from Malicious Injected Iframes. 383-386
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.