Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iciss/iciss2010.bht:"
@inproceedings{DBLP:conf/iciss/AckerNPYP10, author = {Steven {Van Acker} and Nick Nikiforakis and Pieter Philippaerts and Yves Younan and Frank Piessens}, editor = {Somesh Jha and Anish Mathuria}, title = {ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {156--170}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_12}, doi = {10.1007/978-3-642-17714-9\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/AckerNPYP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BeckerMB10, author = {Moritz Y. Becker and Alexander Malkis and Laurent Bussard}, editor = {Somesh Jha and Anish Mathuria}, title = {A Practical Generic Privacy Language}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {125--139}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_10}, doi = {10.1007/978-3-642-17714-9\_10}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/BeckerMB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BirgissonRS10, author = {Arnar Birgisson and Alejandro Russo and Andrei Sabelfeld}, editor = {Somesh Jha and Anish Mathuria}, title = {Unifying Facets of Information Integrity}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {48--65}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_5}, doi = {10.1007/978-3-642-17714-9\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/BirgissonRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/CaiSLDL10, author = {Shaoying Cai and Chunhua Su and Yingjiu Li and Robert H. Deng and Tieyan Li}, editor = {Somesh Jha and Anish Mathuria}, title = {Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {246--260}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_18}, doi = {10.1007/978-3-642-17714-9\_18}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/CaiSLDL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ChenXHMX10, author = {Ping Chen and Xiao Xing and Hao Han and Bing Mao and Li Xie}, editor = {Somesh Jha and Anish Mathuria}, title = {Efficient Detection of the Return-Oriented Programming Malicious Code}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {140--155}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_11}, doi = {10.1007/978-3-642-17714-9\_11}, timestamp = {Mon, 06 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/ChenXHMX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DaoS10, author = {Thanh{-}Binh Dao and Etsuya Shibayama}, editor = {Somesh Jha and Anish Mathuria}, title = {Coverage Criteria for Automatic Security Testing of Web Applications}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {111--124}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_9}, doi = {10.1007/978-3-642-17714-9\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/DaoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/FaghihAJ10, author = {Fathieh Faghih and Morteza Amini and Rasool Jalili}, editor = {Somesh Jha and Anish Mathuria}, title = {Specification of History Based Constraints for Access Control in Conceptual Level}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {186--200}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_14}, doi = {10.1007/978-3-642-17714-9\_14}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/FaghihAJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/GiffinS10, author = {Jonathon T. Giffin and Abhinav Srivastava}, editor = {Somesh Jha and Anish Mathuria}, title = {Attribution of Malicious Behavior}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {28--47}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_4}, doi = {10.1007/978-3-642-17714-9\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/GiffinS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/HalderC10, author = {Raju Halder and Agostino Cortesi}, editor = {Somesh Jha and Anish Mathuria}, title = {A Persistent Public Watermarking of Relational Databases}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {216--230}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_16}, doi = {10.1007/978-3-642-17714-9\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/HalderC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Jaume10, author = {Mathieu Jaume}, editor = {Somesh Jha and Anish Mathuria}, title = {Security Rules \emph{versus} Security Properties}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {231--245}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_17}, doi = {10.1007/978-3-642-17714-9\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/Jaume10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/KumarSG10, author = {Ravi Kumar and Shamik Sural and Arobinda Gupta}, editor = {Somesh Jha and Anish Mathuria}, title = {Mining {RBAC} Roles under Cardinality Constraint}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {171--185}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_13}, doi = {10.1007/978-3-642-17714-9\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/KumarSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Myers10, author = {Andrew C. Myers}, editor = {Somesh Jha and Anish Mathuria}, title = {Toward Securely Programming the Internet}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {27}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_3}, doi = {10.1007/978-3-642-17714-9\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/Myers10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/NandiPV10, author = {Mridul Nandi and Stefan Popoveniuc and Poorvi L. Vora}, editor = {Somesh Jha and Anish Mathuria}, title = {Stamp-It: {A} Method for Enhancing the Universal Verifiability of {E2E} Voting Systems}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {81--95}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_7}, doi = {10.1007/978-3-642-17714-9\_7}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/NandiPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Rajamani10, author = {Sriram K. Rajamani}, editor = {Somesh Jha and Anish Mathuria}, title = {Analyzing Explicit Information Flow}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {1--2}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_1}, doi = {10.1007/978-3-642-17714-9\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/Rajamani10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SrinivasanDGB10, author = {Raghunathan Srinivasan and Partha Dasgupta and Tushar Gohad and Amiya Bhattacharya}, editor = {Somesh Jha and Anish Mathuria}, title = {Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {66--80}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_6}, doi = {10.1007/978-3-642-17714-9\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/SrinivasanDGB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/VenkatakrishnanBLZGG10, author = {V. N. Venkatakrishnan and Prithvi Bisht and Mike Ter Louw and Michelle Zhou and Kalpana Gondi and Karthik Thotta Ganesh}, editor = {Somesh Jha and Anish Mathuria}, title = {WebAppArmor: {A} Framework for Robust Prevention of Attacks on Web Applications (Invited Paper)}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {3--26}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_2}, doi = {10.1007/978-3-642-17714-9\_2}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/VenkatakrishnanBLZGG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/WangZP10, author = {Wei Wang and Xiangliang Zhang and Georgios Pitsilis}, editor = {Somesh Jha and Anish Mathuria}, title = {Abstracting Audit Data for Lightweight Intrusion Detection}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {201--215}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_15}, doi = {10.1007/978-3-642-17714-9\_15}, timestamp = {Mon, 07 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/WangZP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ZhouBV10, author = {Michelle Zhou and Prithvi Bisht and V. N. Venkatakrishnan}, editor = {Somesh Jha and Anish Mathuria}, title = {Strengthening {XSRF} Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {96--110}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_8}, doi = {10.1007/978-3-642-17714-9\_8}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/ZhouBV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2010, editor = {Somesh Jha and Anish Mathuria}, title = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9}, doi = {10.1007/978-3-642-17714-9}, isbn = {978-3-642-17713-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.