Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006.

The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions.

The papers discuss in depth the current state of the research and practice in information systems security. The papers are organized in topical sections on data and application security, access control, key management and security in wireless networks, threat analysis, detection and recovery, cryptography and encryption, as well as short papers and research reports.

Author(s): Sabrina De Capitani di Vimercati, Pierangela Samarati (auth.), Aditya Bagchi, Vijayalakshmi Atluri (eds.)
Series: Lecture Notes in Computer Science 4332 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 384
Tags: Computer Communication Networks; Data Encryption; Systems and Data Security; Computers and Society; Management of Computing and Information Systems; Information Storage and Retrieval

Front Matter....Pages -
Privacy in the Electronic Society....Pages 1-21
A Data Sharing Agreement Framework....Pages 22-36
Password Exhaustion: Predicting the End of Password Usefulness....Pages 37-55
Network Monitoring for Security and Forensics....Pages 56-70
Fairness Strategy for Multilevel Secure Concurrency Control Protocol....Pages 71-85
Optimistic Anonymous Participation in Inter-organizational Workflow Instances....Pages 86-100
O2O: Virtual Private Organizations to Manage Security Policy Interoperability....Pages 101-115
Privacy Preserving Web-Based Email....Pages 116-131
Context-Aware Provisional Access Control....Pages 132-146
LRBAC: A Location-Aware Role-Based Access Control Model....Pages 147-161
Extending Context Descriptions in Semantics-Aware Access Control....Pages 162-176
Specification and Realization of Access Control in SPKI/SDSI....Pages 177-193
Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack....Pages 194-204
An Efficient Key Assignment Scheme for Access Control in a Hierarchy....Pages 205-219
Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers....Pages 220-234
Secure Data Management in Reactive Sensor Networks....Pages 235-248
Security Ontology: Simulating Threats to Corporate Assets....Pages 249-259
Two-Stage Credit Card Fraud Detection Using Sequence Alignment....Pages 260-275
New Malicious Code Detection Using Variable Length n -grams....Pages 276-288
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes....Pages 289-302
An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack....Pages 303-314
A Partial Image Encryption Method with Pseudo Random Sequences....Pages 315-325
High Capacity Lossless Data Hiding....Pages 326-336
An Implementation and Evaluation of Online Disk Encryption for Windows Systems....Pages 337-348
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract)....Pages 349-352
A Survey of Control-Flow Obfuscations....Pages 353-356
Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments....Pages 357-360
Secure Itineraries Framework for Mobile Agent Systems....Pages 361-364
Malafide Intension Based Detection of Privacy Violation in Information System....Pages 365-368
Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report)....Pages 369-372
Towards a Formal Specification Method for Enterprise Information System Security....Pages 373-376
Recent Research on Privacy Preserving Data Mining....Pages 377-380
Back Matter....Pages -