05357nam 22007815 450 99646572150331620200702112108.010.1007/11593980(CKB)1000000000213546(SSID)ssj0000318299(PQKBManifestationID)11247226(PQKBTitleCode)TC0000318299(PQKBWorkID)10328350(PQKB)11124973(DE-He213)978-3-540-32422-5(MiAaPQ)EBC3067693(PPN)123098807(EXLCZ)99100000000021354620100411d2005 u| 0engurnn|008mamaatxtccrInformation Systems Security[electronic resource] First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings /edited by Sushil Jajodia, Chandan Mazumdar1st ed. 2005.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2005.1 online resource (XII, 342 p.) Security and Cryptology ;3803Bibliographic Level Mode of Issuance: MonographPrinted edition: 9783540307068 Includes bibliographical references and index.Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry -- Auditable Anonymous Delegation -- A Robust Double Auction Protocol Based on a Hybrid Trust Model -- VTrust: A Trust Management System Based on a Vector Model of Trust -- Analysis and Modelling of Trust in Distributed Information Systems -- EPAL Based Privacy Enforcement Using ECA Rules -- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies -- Protection of Relationships in XML Documents with the XML-BB Model -- EISA – An Enterprise Application Security Solution for Databases -- Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast Fingerprinting -- A Key Reshuffling Scheme for Wireless Sensor Networks -- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks -- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks -- Detecting ARP Spoofing: An Active Technique -- Episode Based Masquerade Detection -- A Game-Theoretic Approach to Credit Card Fraud Detection -- Modifications of SHA-0 to Prevent Attacks -- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes -- On Broadcast Encryption with Random Key Pre-distribution Schemes -- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field -- SPEAR: Design of a Secured Peer-to-Peer Architecture -- A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security -- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches -- A Transparent End-to-End Security Solution.Security and Cryptology ;3803Data encryption (Computer science)Computer communication systemsOperating systems (Computers)Computers and civilizationManagement information systemsComputer scienceInformation storage and retrievalCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Information Storage and Retrievalhttps://scigraph.springernature.com/ontologies/product-market-codes/I18032Data encryption (Computer science).Computer communication systems.Operating systems (Computers).Computers and civilization.Management information systems.Computer science.Information storage and retrieval.Cryptology.Computer Communication Networks.Operating Systems.Computers and Society.Management of Computing and Information Systems.Information Storage and Retrieval.005.8Jajodia Sushiledthttp://id.loc.gov/vocabulary/relators/edtMazumdar Chandanedthttp://id.loc.gov/vocabulary/relators/edtICISS (Conference)BOOK996465721503316Information Systems Security771916UNISA