


default search action
11th ICISS 2015: Kolkata, India
- Sushil Jajodia

, Chandan Mazumdar:
Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings. Lecture Notes in Computer Science 9478, Springer 2015, ISBN 978-3-319-26960-3
Invited Talks
- Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati

:
Data Security Issues in Cloud Scenarios. 3-10 - Ruggero Donida Labati, Angelo Genovese

, Enrique Muñoz Ballester
, Vincenzo Piuri, Fabio Scotti
, Gianluca Sforza
:
Automated Border Control Systems: Biometric Challenges and Research Trends. 11-20 - Stefano Paraboschi

, Enrico Bacis
, Simone Mutti:
Extending Mandatory Access Control Policies in Android. 21-35 - Vinod Ganapathy:

Reflections on the Self-service Cloud Computing Project. 36-57
Access Control
- Sadhana Jha, Shamik Sural

, Vijayalakshmi Atluri
, Jaideep Vaidya:
Enforcing Separation of Duty in Attribute Based Access Control Systems. 61-78 - Phillipa Bennett, Indrakshi Ray, Robert B. France:

Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework. 79-97 - Prasuna Sarana, Arindam Roy, Shamik Sural

, Jaideep Vaidya, Vijayalakshmi Atluri
:
Role Mining in the Presence of Separation of Duty Constraints. 98-117 - Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr

, Kurt Rothermel, Christian Maihöfer, Ulrich Krämer:
Context-Aware Access Control in Novel Automotive HMI Systems. 118-138 - Michael Kunz, Ludwig Fuchs, Matthias Hummer, Günther Pernul:

Introducing Dynamic Identity and Access Management in Organizations. 139-158
Attacks and Mitigation
- Goutam Paul:

Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. 161-170 - Tom Deering, Ganesh Ram Santhanam, Suresh C. Kothari:

FlowMiner: Automatic Summarization of Library Data-Flow for Malware Analysis. 171-191 - Punit Mehta, Jigar Sharda, Manik Lal Das:

SQLshield: Preventing SQL Injection Attacks by Modifying User Input Data. 192-206 - Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk:

Assessment of an Automatic Correlation Rules Generator. 207-224
Cloud Security
- Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey, Xiaoshu Ji:

Similarity Measure for Security Policies in Service Provider Selection. 227-242 - Anant Pushkar, Nirnay Ghosh, Soumya K. Ghosh:

A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric Collaborations. 243-262 - Gaurav Somani, Abhinav Johri, Mohit Taneja

, Utkarsh Pyne, Manoj Singh Gaur, Dheeraj Sanghi:
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud. 263-282
Crypto Systems and Protocols
- Donghoon Chang, Somitra Kumar Sanadhya

, Nishant Sharma:
New HMAC Message Patches: Secret Patch and CrOw Patch. 285-302 - Haruhisa Kosuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:

Search Algorithm of Precise Integral Distinguisher of Byte-Based Block Cipher. 303-323 - Angsuman Das, Avishek Adhikari:

Plaintext Checkable Signcryption. 324-333 - Santanu Sarkar

:
A New Distinguisher on Grain v1 for 106 Rounds. 334-344 - Dhruti Sharma, Devesh Jinwala

:
Functional Encryption in IoT E-Health Care System. 345-363 - Ashish Choudhury

:
Asynchronous Error-Decodable Secret-Sharing and Its Application. 364-377 - Payal Chaudhari

, Manik Lal Das, Anish Mathuria:
On Anonymous Attribute Based Encryption. 378-392
Information Flow Control
- Dominik Bollmann, Steffen Lortz, Heiko Mantel, Artem Starostin:

An Automatic Inference of Minimal Security Types. 395-415
Sensor Networks and Cognitive Radio
- Sarita Agrawal, Manik Lal Das, Anish Mathuria, Sanjay Srivastava:

Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network. 419-440 - Suchismita Bhattacharjee

, Ningrinla Marchang
:
Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio Networks. 441-460
Watermarking and Steganography
- Toshanlal Meenpal, A. K. Bhattacharjee:

Watermark Removal Attack Extended to Forgery Against Correlation-Based Watermarking Schemes. 463-479 - Aniket Roy, Rajat Subhra Chakraborty, Ruchira Naskar

:
Reversible Color Image Watermarking in the YCoCg-R Color Space. 480-498
Short Papers
- Stefan Prandl, Mihai M. Lazarescu

, Duc-Son Pham
:
A Study of Web Application Firewall Solutions. 501-510 - Moumita Das, Bhaskar Sardar, Ansuman Banerjee:

Attacks on Branch Predictors: An Empirical Exploration. 511-520 - Y. Sreenivasa Rao

:
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption. 521-531 - Shyamalendu Kandar, Bibhas Chandra Dhara:

A (k, n) Multi Secret Sharing Scheme Using Two Variable One Way Function with Less Public Values. 532-541 - Radhey Shyam

, Yogendra Narain Singh:
Robustness of Score Normalization in Multibiometric Systems. 542-550 - S. Susheel, N. V. Narendra Kumar, R. K. Shyamasundar:

Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control. 551-561 - Satyajit Banerjee, Debapriyay Mukhopadhyay, Suman Roy

:
A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks. 562-572 - Imon Mukherjee

, Biswajita Datta, Reeturaj Banerjee, Srijan Das
:
DWT Difference Modulation Based Novel Steganographic Algorithm. 573-582

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














