Search dblp for Publications

export results for "toc:db/conf/iciss/iciss2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iciss/AckerNPYP10,
  author       = {Steven {Van Acker} and
                  Nick Nikiforakis and
                  Pieter Philippaerts and
                  Yves Younan and
                  Frank Piessens},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {ValueGuard: Protection of Native Applications against Data-Only Buffer
                  Overflows},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_12},
  doi          = {10.1007/978-3-642-17714-9\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/AckerNPYP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BeckerMB10,
  author       = {Moritz Y. Becker and
                  Alexander Malkis and
                  Laurent Bussard},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {A Practical Generic Privacy Language},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {125--139},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_10},
  doi          = {10.1007/978-3-642-17714-9\_10},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/BeckerMB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BirgissonRS10,
  author       = {Arnar Birgisson and
                  Alejandro Russo and
                  Andrei Sabelfeld},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Unifying Facets of Information Integrity},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {48--65},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_5},
  doi          = {10.1007/978-3-642-17714-9\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/BirgissonRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CaiSLDL10,
  author       = {Shaoying Cai and
                  Chunhua Su and
                  Yingjiu Li and
                  Robert H. Deng and
                  Tieyan Li},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply
                  Chains},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {246--260},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_18},
  doi          = {10.1007/978-3-642-17714-9\_18},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/CaiSLDL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChenXHMX10,
  author       = {Ping Chen and
                  Xiao Xing and
                  Hao Han and
                  Bing Mao and
                  Li Xie},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Efficient Detection of the Return-Oriented Programming Malicious Code},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {140--155},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_11},
  doi          = {10.1007/978-3-642-17714-9\_11},
  timestamp    = {Mon, 06 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/ChenXHMX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DaoS10,
  author       = {Thanh{-}Binh Dao and
                  Etsuya Shibayama},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Coverage Criteria for Automatic Security Testing of Web Applications},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {111--124},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_9},
  doi          = {10.1007/978-3-642-17714-9\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/DaoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FaghihAJ10,
  author       = {Fathieh Faghih and
                  Morteza Amini and
                  Rasool Jalili},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Specification of History Based Constraints for Access Control in Conceptual
                  Level},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_14},
  doi          = {10.1007/978-3-642-17714-9\_14},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/FaghihAJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GiffinS10,
  author       = {Jonathon T. Giffin and
                  Abhinav Srivastava},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Attribution of Malicious Behavior},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {28--47},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_4},
  doi          = {10.1007/978-3-642-17714-9\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/GiffinS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HalderC10,
  author       = {Raju Halder and
                  Agostino Cortesi},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {A Persistent Public Watermarking of Relational Databases},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {216--230},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_16},
  doi          = {10.1007/978-3-642-17714-9\_16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/HalderC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Jaume10,
  author       = {Mathieu Jaume},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Security Rules \emph{versus} Security Properties},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {231--245},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_17},
  doi          = {10.1007/978-3-642-17714-9\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/Jaume10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KumarSG10,
  author       = {Ravi Kumar and
                  Shamik Sural and
                  Arobinda Gupta},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Mining {RBAC} Roles under Cardinality Constraint},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {171--185},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_13},
  doi          = {10.1007/978-3-642-17714-9\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/KumarSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Myers10,
  author       = {Andrew C. Myers},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Toward Securely Programming the Internet},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {27},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_3},
  doi          = {10.1007/978-3-642-17714-9\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/Myers10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NandiPV10,
  author       = {Mridul Nandi and
                  Stefan Popoveniuc and
                  Poorvi L. Vora},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Stamp-It: {A} Method for Enhancing the Universal Verifiability of
                  {E2E} Voting Systems},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_7},
  doi          = {10.1007/978-3-642-17714-9\_7},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/NandiPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Rajamani10,
  author       = {Sriram K. Rajamani},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Analyzing Explicit Information Flow},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_1},
  doi          = {10.1007/978-3-642-17714-9\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/Rajamani10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SrinivasanDGB10,
  author       = {Raghunathan Srinivasan and
                  Partha Dasgupta and
                  Tushar Gohad and
                  Amiya Bhattacharya},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Determining the Integrity of Application Binaries on Unsecure Legacy
                  Machines Using Software Based Remote Attestation},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {66--80},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_6},
  doi          = {10.1007/978-3-642-17714-9\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/SrinivasanDGB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VenkatakrishnanBLZGG10,
  author       = {V. N. Venkatakrishnan and
                  Prithvi Bisht and
                  Mike Ter Louw and
                  Michelle Zhou and
                  Kalpana Gondi and
                  Karthik Thotta Ganesh},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {WebAppArmor: {A} Framework for Robust Prevention of Attacks on Web
                  Applications (Invited Paper)},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {3--26},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_2},
  doi          = {10.1007/978-3-642-17714-9\_2},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/VenkatakrishnanBLZGG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/WangZP10,
  author       = {Wei Wang and
                  Xiangliang Zhang and
                  Georgios Pitsilis},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Abstracting Audit Data for Lightweight Intrusion Detection},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {201--215},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_15},
  doi          = {10.1007/978-3-642-17714-9\_15},
  timestamp    = {Mon, 07 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/WangZP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ZhouBV10,
  author       = {Michelle Zhou and
                  Prithvi Bisht and
                  V. N. Venkatakrishnan},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Strengthening {XSRF} Defenses for Legacy Web Applications Using Whitebox
                  Analysis and Transformation},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {96--110},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_8},
  doi          = {10.1007/978-3-642-17714-9\_8},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/ZhouBV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2010,
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9},
  doi          = {10.1007/978-3-642-17714-9},
  isbn         = {978-3-642-17713-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics