


default search action
1st ICISS 2005: Kolkata, India
- Sushil Jajodia, Chandan Mazumdar:

Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings. Lecture Notes in Computer Science 3803, Springer 2005, ISBN 3-540-30706-0 - Vijay Varadharajan:

Authorization and Trust Enhanced Security for Distributed Applications. 1-20 - Ernesto Damiani

, Marco Anisetti
, Valerio Bellandi
:
Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies. 21-35 - Kevin R. B. Butler

, Patrick D. McDaniel:
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. 36-48 - Prem Chand:

Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the ICT Industry. 49-65 - Bruce Christianson

, Partha Das Chowdhury, James A. Malcolm:
Auditable Anonymous Delegation. 66-76 - JungHoon Ha, Jianying Zhou, Sang-Jae Moon:

A Robust Double Auction Protocol Based on a Hybrid Trust Model. 77-90 - Indrajit Ray, Sudip Chakraborty, Indrakshi Ray:

VTrust: A Trust Management System Based on a Vector Model of Trust. 91-105 - Weiliang Zhao

, Vijay Varadharajan, George Bryan:
Analysis and Modelling of Trust in Distributed Information Systems. 106-119 - Jaijit Bhattacharya, S. K. Gupta:

EPAL Based Privacy Enforcement Using ECA Rules. 120-133 - Janice Warner, Vijayalakshmi Atluri

, Ravi Mukkamala:
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. 134-147 - Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans:

Protection of Relationships in XML Documents with the XML-BB Model. 148-163 - V. Radha, N. Hemanth Kumar:

EISA - An Enterprise Application Security Solution for Databases. 164-176 - Indrakshi Ray, Wei Huang:

Event Detection in Multilevel Secure Active Databases. 177-190 - Jian Wang, Lein Harn, Hideki Imai:

Key Management for Multicast Fingerprinting. 191-204 - Ashok Kumar Das:

A Key Reshuffling Scheme for Wireless Sensor Networks. 205-216 - Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita Roy Chowdhury:

CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks. 217-227 - Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy:

A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks. 228-238 - Vivek Ramachandran, Sukumar Nandi

:
Detecting ARP Spoofing: An Active Technique. 239-250 - Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari:

Episode Based Masquerade Detection. 251-262 - Vishal Vatsa, Shamik Sural

, Arun K. Majumdar:
A Game-Theoretic Approach to Credit Card Fraud Detection. 263-276 - Roshni Chatterjee, Moiz A. Saifee, Dipanwita Roy Chowdhury:

Modifications of SHA-0 to Prevent Attacks. 277-289 - JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon:

How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. 290-303 - Mahalingam Ramkumar:

On Broadcast Encryption with Random Key Pre-distribution Schemes. 304-316 - Sharmistha Bagchi-Sen, JinKyu Lee, H. Raghav Rao, Shambhu J. Upadhyaya:

A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field . 317-321 - Jaydev Mishra

, Pinakpani Pal, Aditya Bagchi:
SPEAR: Design of a Secured Peer-to-Peer Architecture . 322-327 - Anirban Sengupta

, Aniruddha Mukhopadhyay, Koel Ray, Aveek Guha Roy, Dipankar Aich, Mridul Sankar Barik, Chandan Mazumdar:
A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security . 328-331 - N. Subramanian, Pramod S. Pawar, Mayank Bhatnagar, Nihar S. Khedekar, Srinivas Guntupalli, N. Satyanarayana, V. K. Vijaykumar, Praveen D. Ampatt, Rajiv Ranjan, Prasad J. Pandit:

Development of a Comprehensive Intrusion Detection System - Challenges and Approaches. 332-335 - Shince Thomas, Devesh Misra, P. R. Lakshmi Eswari, N. Sarat Chandra Babu:

A Transparent End-to-End Security Solution. 336-339

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














