Information Systems Security: First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS 2005, held in Calcutta, India in December 2005.

The 19 revised papers presented together with 4 invited papers and 5 ongoing project summaries were carefully reviewed and selected from 72 submissions. The papers discuss in depth the current state of the research and practice in information systems security and cover the following topics: authentication and access control, mobile code security, key management and cryptographic protocols, privacy and anonymity, intrusion detection and avoidance, security verification, database and application security and integrity, security in P2P, sensor and ad hoc networks, secure Web services, fault tolerance and recovery methods for security infrastructure, threats, vulnerabilities and risk management, and commercial and industrial security.

Author(s): Vijay Varadharajan (auth.), Sushil Jajodia, Chandan Mazumdar (eds.)
Series: Lecture Notes in Computer Science 3803 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 342
Tags: Computer Communication Networks; Data Encryption; Operating Systems; Computers and Society; Management of Computing and Information Systems; Information Storage and Retrieval

Front Matter....Pages -
Authorization and Trust Enhanced Security for Distributed Applications....Pages 1-20
Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies....Pages 21-35
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior....Pages 36-48
Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry....Pages 49-65
Auditable Anonymous Delegation....Pages 66-76
A Robust Double Auction Protocol Based on a Hybrid Trust Model....Pages 77-90
VTrust: A Trust Management System Based on a Vector Model of Trust....Pages 91-105
Analysis and Modelling of Trust in Distributed Information Systems....Pages 106-119
EPAL Based Privacy Enforcement Using ECA Rules....Pages 120-133
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies....Pages 134-147
Protection of Relationships in XML Documents with the XML-BB Model....Pages 148-163
EISA – An Enterprise Application Security Solution for Databases....Pages 164-176
Event Detection in Multilevel Secure Active Databases....Pages 177-190
Key Management for Multicast Fingerprinting....Pages 191-204
A Key Reshuffling Scheme for Wireless Sensor Networks....Pages 205-216
CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks....Pages 217-227
A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks....Pages 228-238
Detecting ARP Spoofing: An Active Technique....Pages 239-250
Episode Based Masquerade Detection....Pages 251-262
A Game-Theoretic Approach to Credit Card Fraud Detection....Pages 263-276
Modifications of SHA-0 to Prevent Attacks....Pages 277-289
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes....Pages 290-303
On Broadcast Encryption with Random Key Pre-distribution Schemes....Pages 304-316
A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field....Pages 317-321
SPEAR: Design of a Secured Peer-to-Peer Architecture....Pages 322-327
A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security....Pages 328-331
Development of a Comprehensive Intrusion Detection System – Challenges and Approaches....Pages 332-335
A Transparent End-to-End Security Solution....Pages 336-339
Back Matter....Pages -