LEADER 04507nam 2200601 450 001 996466364203316 005 20220816210123.0 010 $a3-540-89862-X 024 7 $a10.1007/978-3-540-89862-7 035 $a(CKB)1000000000545829 035 $a(SSID)ssj0000318297 035 $a(PQKBManifestationID)11247225 035 $a(PQKBTitleCode)TC0000318297 035 $a(PQKBWorkID)10308180 035 $a(PQKB)11583253 035 $a(DE-He213)978-3-540-89862-7 035 $a(MiAaPQ)EBC3063764 035 $a(MiAaPQ)EBC6806082 035 $a(Au-PeEL)EBL6806082 035 $a(OCoLC)313374027 035 $a(PPN)132861666 035 $a(EXLCZ)991000000000545829 100 $a20220816d2008 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aInformation systems security $e4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 : proceedings /$fedited by R. Sekar, Arun K. Pujari 205 $a1st ed. 2008. 210 1$aBerlin, Germany :$cSpringer,$d[2008] 210 4$dİ2008 215 $a1 online resource (XIII, 307 p.) 225 1 $aSecurity and Cryptology ;$v5352 300 $aInternational conference proceedings. 311 $a3-540-89861-1 320 $aIncludes bibliographical references and index. 327 $aKeynote Address -- BitBlaze: A New Approach to Computer Security via Binary Analysis -- Languages and Formal Methods -- On the Decidability of Model-Checking Information Flow Properties -- Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties -- Implicit Flows: Can?t Live with ?Em, Can?t Live without ?Em -- Protocols -- A Robust Reputation Scheme for Decentralized Group Management Systems -- Complexity of Checking Freshness of Cryptographic Protocols -- Secure Internet Voting Based on Paper Ballots -- Short Papers -- A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper) -- A Framework for Trustworthy Service-Oriented Computing (Short Paper) -- Revisiting Bluetooth Security (Short Paper) -- A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper) -- Keynote Address -- Computing on Encrypted Data -- Ongoing Research -- Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators -- Proxy Re-signature Schemes -- Keynote Address -- Fast Signature Matching Using Extended Finite Automaton (XFA) -- Intrusion Detection -- Real-Time Alert Correlation with Type Graphs -- Incorporation of Application Layer Protocol Syntax into Anomaly Detection -- A Parallel Architecture for Stateful, High-Speed Intrusion Detection -- Biometrics, Forensics and Steganography -- Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion -- Audio Watermarking Based on Quantization in Wavelet Domain -- Overwriting Hard Drive Data: The Great Wiping Controversy -- Practical Applications -- Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks -- Privacy Management for Facebook -- HyDRo ? Hybrid Development of Roles -- Keynote Address -- The Enlightened Era of Enterprise Security (Invited Talk). 330 $aThis book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications. 410 0$aSecurity and Cryptology ;$v5352 606 $aComputer security$vCongresses 615 0$aComputer security 676 $a005.8 702 $aSekar$b R. 702 $aPujari$b Arun K. 712 12$aInternational Conference on Information Systems Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466364203316 996 $aInformation Systems Security$9771916 997 $aUNISA