LEADER 05369nam 22008055 450 001 996466286103316 005 20200701155919.0 010 $a3-642-35130-1 024 7 $a10.1007/978-3-642-35130-3 035 $a(CKB)3400000000102872 035 $a(SSID)ssj0000880018 035 $a(PQKBManifestationID)11467974 035 $a(PQKBTitleCode)TC0000880018 035 $a(PQKBWorkID)10853298 035 $a(PQKB)10249434 035 $a(DE-He213)978-3-642-35130-3 035 $a(MiAaPQ)EBC3068779 035 $a(PPN)168328038 035 $a(EXLCZ)993400000000102872 100 $a20121211d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Systems Security$b[electronic resource] $e8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings /$fedited by Venkat Venkatakrishnan, Diganta Goswami 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XVI, 353 p. 96 illus.) 225 1 $aSecurity and Cryptology ;$v7671 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-35129-8 320 $aIncludes bibliographical references and index. 327 $aFighting Malicious Software -- VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security -- Security Assessment of Node.js Platform -- Foundations of Dynamic Access Control -- Risk-Aware RBAC Sessions -- A Cognitive Trust Model for Access Control Framework i MANET -- Trust-OrBAC: A Trust Access Control Model in Multi-Organization Environments -- On Policies and Intents -- ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel -- Keyless Steganography in Spatial Domain Using Energetic Pixels -- Fuzzy Inference Rule Based Reversible Watermarking for Digital Images -- Secure Trust Metadata Management for Mobile Ad-Hoc Networks -- Defence against Wormhole Attacks in Wireless Mesh Networks -- A Novel Key Update Protocol in Mobile Sensor Networks -- Autonomous Certification with List-Based Revocation for Secure V2V Communication -- Mitigating Insider Threat on Database Integrity -- Coercion Resistant MIX for Electronic Auction -- Verification of Money Atomicity in Digital Cash Based Payment System -- Cryptographic Analysis of a Type of Sequence Generators -- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs -- Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks -- Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF -- Attacking Image Based CAPTCHAs Using Image Recognition Techniques -- Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach. 330 $aThis book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security. 410 0$aSecurity and Cryptology ;$v7671 606 $aComputer communication systems 606 $aComputer security 606 $aApplication software 606 $aInformation storage and retrieval 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 608 $aConference papers and proceedings.$2fast 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aApplication software. 615 0$aInformation storage and retrieval. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 14$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aInformation Storage and Retrieval. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 676 $a004.6 702 $aVenkatakrishnan$b Venkat$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGoswami$b Diganta$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466286103316 996 $aInformation Systems Security$9771916 997 $aUNISA