default search action
2nd ICISS 2006: Kolkata, India
- Aditya Bagchi, Vijayalakshmi Atluri:
Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings. Lecture Notes in Computer Science 4332, Springer 2006, ISBN 3-540-68962-1
Invited Papers
- Sabrina De Capitani di Vimercati, Pierangela Samarati:
Privacy in the Electronic Society. 1-21 - Vipin Swarup, Len Seligman, Arnon Rosenthal:
A Data Sharing Agreement Framework. 22-36 - Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Trent Jaeger:
Password Exhaustion: Predicting the End of Password Usefulness. 37-55 - Kulesh Shanmugasundaram, Nasir D. Memon:
Network Monitoring for Security and Forensics. 56-70
Data and Application Security
- Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje:
Fairness Strategy for Multilevel Secure Concurrency Control Protocol. 71-85 - Joachim Biskup, Joerg Parthe:
Optimistic Anonymous Participation in Inter-organizational Workflow Instances. 86-100 - Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma:
O2O: Virtual Private Organizations to Manage Security Policy Interoperability. 101-115 - Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick D. McDaniel:
Privacy Preserving Web-Based Email. 116-131
Access Control
- Amirreza Masoumzadeh, Morteza Amini, Rasool Jalili:
Context-Aware Provisional Access Control. 132-146 - Indrakshi Ray, Mahendra Kumar, Lijun Yu:
LRBAC: A Location-Aware Role-Based Access Control Model. 147-161 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati:
Extending Context Descriptions in Semantics-Aware Access Control. 162-176 - N. V. Narendra Kumar, R. K. Shyamasundar:
Specification and Realization of Access Control in SPKI/SDSI. 177-193
Key Management and Security in Wireless Networks
- Mounita Saha, Dipanwita Roy Chowdhury:
Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack. 194-204 - Praveen Kumar Vadnala, Anish Mathuria:
An Efficient Key Assignment Scheme for Access Control in a Hierarchy. 205-219 - Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa:
Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers. 220-234 - L. Chaithanya, M. P. Singh, M. M. Gore:
Secure Data Management in Reactive Sensor Networks. 235-248
Threat Analysis, Detection and Recovery
- Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl:
Security Ontology: Simulating Threats to Corporate Assets. 249-259 - Amlan Kundu, Shamik Sural, Arun K. Majumdar:
Two-Stage Credit Card Fraud Detection Using Sequence Alignment. 260-275 - Krishna Sandeep Reddy Dubba, Subrat Kumar Dash, Arun K. Pujari:
New Malicious Code Detection Using Variable Length n-grams. 276-288 - Wanyu Zang, Meng Yu:
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes. 289-302
Cryptography and Encryption
- Hossein Ghodosi:
An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack. 303-314 - Y. V. Subba Rao, Abhijit Mitra, S. R. Mahadeva Prasanna:
A Partial Image Encryption Method with Pseudo Random Sequences. 315-325 - Hyeran Lee, Kyung Hyune Rhee:
High Capacity Lossless Data Hiding. 326-336 - Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan:
An Implementation and Evaluation of Online Disk Encryption for Windows Systems. 337-348
Short Papers and Research Reports
- Haibing Lu, Yingjiu Li, Xintao Wu:
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). 349-352 - Anirban Majumdar, Clark D. Thomborson, Stephen Drape:
A Survey of Control-Flow Obfuscations. 353-356 - Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments. 357-360 - Rajwinder Singh, Navdeep Kaur, Anil Kumar Sarje:
Secure Itineraries Framework for Mobile Agent Systems. 361-364 - Shyam K. Gupta, Vikram Goyal, Anand Gupta:
Malafide Intension Based Detection of Privacy Violation in Information System. 365-368 - Shyam K. Gupta, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta:
Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report). 369-372 - Anirban Sengupta, Mridul Sankar Barik:
Towards a Formal Specification Method for Enterprise Information System Security. 373-376 - Alex Gurevich, Ehud Gudes:
Recent Research on Privacy Preserving Data Mining. 377-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.