My Account Log in

1 option

Information Systems Security : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / edited by Sushil Jajodia, Chandan Mazumdar.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Jajodia, Sushil, editor.
Mazumdar, Chandan, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 3803.
Security and Cryptology ; 3803
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Operating systems (Computers).
Computers and civilization.
Management information systems.
Computer science.
Information storage and retrieval.
Cryptology.
Computer Communication Networks.
Operating Systems.
Computers and Society.
Management of Computing and Information Systems.
Information Storage and Retrieval.
Local Subjects:
Cryptology.
Computer Communication Networks.
Operating Systems.
Computers and Society.
Management of Computing and Information Systems.
Information Storage and Retrieval.
Physical Description:
1 online resource (XII, 342 pages).
Edition:
First edition 2005.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
System Details:
text file PDF
Contents:
Authorization and Trust Enhanced Security for Distributed Applications
Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior
Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the ICT Industry
Auditable Anonymous Delegation
A Robust Double Auction Protocol Based on a Hybrid Trust Model
VTrust: A Trust Management System Based on a Vector Model of Trust
Analysis and Modelling of Trust in Distributed Information Systems
EPAL Based Privacy Enforcement Using ECA Rules
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies
Protection of Relationships in XML Documents with the XML-BB Model
EISA - An Enterprise Application Security Solution for Databases
Event Detection in Multilevel Secure Active Databases
Key Management for Multicast Fingerprinting
A Key Reshuffling Scheme for Wireless Sensor Networks
CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks
A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks
Detecting ARP Spoofing: An Active Technique
Episode Based Masquerade Detection
A Game-Theoretic Approach to Credit Card Fraud Detection
Modifications of SHA-0 to Prevent Attacks
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes
On Broadcast Encryption with Random Key Pre-distribution Schemes
A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field
SPEAR: Design of a Secured Peer-to-Peer Architecture
A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security
Development of a Comprehensive Intrusion Detection System - Challenges and Approaches
A Transparent End-to-End Security Solution.
Other Format:
Printed edition:
ISBN:
978-3-540-32422-5
9783540324225
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account