05785nam 22008535 450 99646631090331620200704081800.03-642-10772-910.1007/978-3-642-10772-6(CKB)1000000000804432(SSID)ssj0000355527(PQKBManifestationID)11294246(PQKBTitleCode)TC0000355527(PQKBWorkID)10340363(PQKB)10209775(DE-He213)978-3-642-10772-6(MiAaPQ)EBC3064783(PPN)139962999(EXLCZ)99100000000080443220100301d2009 u| 0engurnn|008mamaatxtccrInformation Systems Security[electronic resource] 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings /edited by Atul Prakash1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (XV, 327 p.) Security and Cryptology ;5905Bibliographic Level Mode of Issuance: Monograph3-642-10771-0 Includes bibliographical references and index.Keynote Talks -- A Survey of Voice over IP Security Research -- Security for a Smarter Planet -- The WOMBAT Attack Attribution Method: Some Results -- Biometrics and Security -- Authentication -- Remote Electronic Voting with Revocable Anonymity -- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals -- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup -- Verification -- Biometric Identification over Encrypted Data Made Feasible -- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity -- Formal Verification of Security Policy Implementations in Enterprise Networks -- Systems Security -- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles -- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products -- DROP: Detecting Return-Oriented Programming Malicious Code -- Behavior Analysis -- A Framework for Behavior-Based Malware Analysis in the Cloud -- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs -- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders -- Database Security -- Database Relation Watermarking Resilient against Secondary Watermarking Attacks -- A Robust Damage Assessment Model for Corrupted Database Systems -- A Generic Distortion Free Watermarking Technique for Relational Databases -- Cryptography -- On Some Weaknesses in the Disk Encryption Schemes EME and EME2 -- TWIS – A Lightweight Block Cipher -- Short Papers -- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking -- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations -- Let Only the Right One IN: Privacy Management Scheme for Social Network -- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009. The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 85 initial submissions. The papers are organized in topical sections on authentication, verification, systems security, behavior analysis, database security, and cryptography.Security and Cryptology ;5905Computer communication systemsData encryption (Computer science)Computer securityInformation storage and retrievalManagement information systemsComputer scienceBiometrics (Biology)Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Information Storage and Retrievalhttps://scigraph.springernature.com/ontologies/product-market-codes/I18032Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Biometricshttps://scigraph.springernature.com/ontologies/product-market-codes/I22040Kalkutta (2009)swdKongress.swdComputer communication systems.Data encryption (Computer science).Computer security.Information storage and retrieval.Management information systems.Computer science.Biometrics (Biology).Computer Communication Networks.Cryptology.Systems and Data Security.Information Storage and Retrieval.Management of Computing and Information Systems.Biometrics.004n/aDAT 460fstubDAT 461fstubSS 4800rvkPrakash Atuledthttp://id.loc.gov/vocabulary/relators/edtICISS (Conference)BOOK996466310903316Information Systems Security771916UNISA02722nam 2200613 a 450 991067108620332120220524202301.01-55221-304-897812997833009781552213049(CKB)2550000001041520(EBL)3284801(CaBNVSL)slc00231833(OCoLC)830009266(CEL)445095(MiAaPQ)EBC3317254(MiAaPQ)EBC3284801(EXLCZ)99255000000104152020121126h20132013 uy 0engur|n|---|||||Constitutional law[electronic resource] /Patrick J. Monahan, Byron Shaw4th ed.Toronto [Ont.] Irwin Law20131 online resource (694 p.)Essentials of Canadian lawIncludes the text of The Constitution Act, 1867 and The Constitution Act, 1982.1-55221-303-X Includes bibliographical references and index.Part One : Introduction. An Introduction to the Study of the Canadian Constitution --Part Two : The Framework and Institutions of Government. Canada's Constitutional Development Before 1867 -- The Constitution Act, 1867 : Executive and Legislative Power -- The Constitution Act, 1867 : Federalism and Judicial Power --Part Three : Constitutional Change. Constitutional Amendment, 1867-1982 -- Constitutional Change Since 1982 --Part Four : The Courts and Canadian Federalism. The Courts and Canadian Federalism: From Watertight Compartments to Shared Responsibility -- Peace, Order, and Good Government -- Trade and Commerce -- Property and Civil Rights in the Province -- Criminal Law -- The Consitution and Transportation --Part Five: The Charter and Aboriginal Rights. The Canadian Charter of Rights and Freedoms -- Aboriginal Peoples and the Canadian Constitution --Part Six : Conclusion. The Canadian Constitution in the Twenty-First Century -- Glossary of Terms -- Constitution Acts 1867 to 1982 -- Table of Cases.Essentials of Canadian law.Constitutional lawCanadaConstitutional historyCanadaElectronic books.Constitutional lawConstitutional history342.71Monahan Patrick245913Shaw Byron1336904Canada.Canada.MiAaPQMiAaPQMiAaPQCaOWALBOOK9910671086203321Constitutional law3055085UNINA01193nam0 22003011i 450 UON0029635920231205103944.15895-397-6328-220070531d2006 |0itac50 baengHR|||| |||||Amphitheatre at Burnumexcavations2003.-2005. / Nenad Cambiet al.]SibenikKrka National Park200632 p.ill.23 cmUniversity of ZadarIT-UONSI N 3BURN001001UON002963712001 BurnumCatalogues and Momographs1SCAVI ARCHEOLOGICIBurnumUONC064892FISibenikUONL004285939.8STORIA DELL'EUROPA SUDORIENTALE fino al 640 ca.21CAMBINenadUONV097623Krka National ParkUONV273430650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00296359SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI N 3 BURN 001 SI MC 31176 5 University of ZadarAmphitheatre at Burnum1250877UNIOR