Buch, Englisch, 342 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1110 g
Reihe: Security and Cryptology
First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
Buch, Englisch, 342 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1110 g
Reihe: Security and Cryptology
ISBN: 978-3-540-30706-8
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Authorization and Trust Enhanced Security for Distributed Applications.- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies.- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry.- Auditable Anonymous Delegation.- A Robust Double Auction Protocol Based on a Hybrid Trust Model.- VTrust: A Trust Management System Based on a Vector Model of Trust.- Analysis and Modelling of Trust in Distributed Information Systems.- EPAL Based Privacy Enforcement Using ECA Rules.- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.- Protection of Relationships in XML Documents with the XML-BB Model.- EISA – An Enterprise Application Security Solution for Databases.- Event Detection in Multilevel Secure Active Databases.- Key Management for Multicast Fingerprinting.- A Key Reshuffling Scheme for Wireless Sensor Networks.- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks.- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks.- Detecting ARP Spoofing: An Active Technique.- Episode Based Masquerade Detection.- A Game-Theoretic Approach to Credit Card Fraud Detection.- Modifications of SHA-0 to Prevent Attacks.- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes.- On Broadcast Encryption with Random Key Pre-distribution Schemes.- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field.- SPEAR: Design of a Secured Peer-to-Peer Architecture.- A Web-Enabled EnterpriseSecurity Management Framework Based on a Unified Model of Enterprise Information System Security.- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches.- A Transparent End-to-End Security Solution.