Information Systems Security [[electronic resource] ] : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings / / edited by Atul Prakash, Rudrapatna Shyamasundar |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XXIV, 478 p. 163 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Systems and Data Security Cryptology Computer Communication Networks |
ISBN | 3-319-13841-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security inferences -- Security policies -- Security user interfaces -- Security attacks -- Malware detection -- Forensics.- Location based security services. |
Record Nr. | UNISA-996211264803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Systems Security : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings / / edited by Atul Prakash, Rudrapatna Shyamasundar |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XXIV, 478 p. 163 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Systems and Data Security Cryptology Computer Communication Networks |
ISBN | 3-319-13841-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security inferences -- Security policies -- Security user interfaces -- Security attacks -- Malware detection -- Forensics.- Location based security services. |
Record Nr. | UNINA-9910484083303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Systems Security [[electronic resource] ] : 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings / / edited by Atul Prakash |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XV, 327 p.) |
Disciplina | 004n/a |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Computer security Information storage and retrieval Management information systems Computer science Biometrics (Biology) Computer Communication Networks Cryptology Systems and Data Security Information Storage and Retrieval Management of Computing and Information Systems Biometrics |
Soggetto genere / forma |
Kalkutta (2009)
Kongress. |
ISBN | 3-642-10772-9 |
Classificazione |
DAT 460f
DAT 461f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Talks -- A Survey of Voice over IP Security Research -- Security for a Smarter Planet -- The WOMBAT Attack Attribution Method: Some Results -- Biometrics and Security -- Authentication -- Remote Electronic Voting with Revocable Anonymity -- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals -- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup -- Verification -- Biometric Identification over Encrypted Data Made Feasible -- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity -- Formal Verification of Security Policy Implementations in Enterprise Networks -- Systems Security -- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles -- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products -- DROP: Detecting Return-Oriented Programming Malicious Code -- Behavior Analysis -- A Framework for Behavior-Based Malware Analysis in the Cloud -- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs -- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders -- Database Security -- Database Relation Watermarking Resilient against Secondary Watermarking Attacks -- A Robust Damage Assessment Model for Corrupted Database Systems -- A Generic Distortion Free Watermarking Technique for Relational Databases -- Cryptography -- On Some Weaknesses in the Disk Encryption Schemes EME and EME2 -- TWIS – A Lightweight Block Cipher -- Short Papers -- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking -- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations -- Let Only the Right One IN: Privacy Management Scheme for Social Network -- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). |
Record Nr. | UNISA-996466310903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information systems security : 5th international conference, ICISS 2009, Kolkata, India, December 14-18, 2009 ; proceedings / / Atul Prakash, Indranil Sen Gupta (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2009 |
Descrizione fisica | 1 online resource (XV, 327 p.) |
Disciplina | 004n/a |
Altri autori (Persone) |
GuptaIndranil Sen
PrakashAtul |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Computers - Access control Information networks - Access control |
ISBN | 3-642-10772-9 |
Classificazione |
DAT 460f
DAT 461f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Talks -- A Survey of Voice over IP Security Research -- Security for a Smarter Planet -- The WOMBAT Attack Attribution Method: Some Results -- Biometrics and Security -- Authentication -- Remote Electronic Voting with Revocable Anonymity -- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals -- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup -- Verification -- Biometric Identification over Encrypted Data Made Feasible -- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity -- Formal Verification of Security Policy Implementations in Enterprise Networks -- Systems Security -- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles -- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products -- DROP: Detecting Return-Oriented Programming Malicious Code -- Behavior Analysis -- A Framework for Behavior-Based Malware Analysis in the Cloud -- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs -- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders -- Database Security -- Database Relation Watermarking Resilient against Secondary Watermarking Attacks -- A Robust Damage Assessment Model for Corrupted Database Systems -- A Generic Distortion Free Watermarking Technique for Relational Databases -- Cryptography -- On Some Weaknesses in the Disk Encryption Schemes EME and EME2 -- TWIS – A Lightweight Block Cipher -- Short Papers -- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking -- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations -- Let Only the Right One IN: Privacy Management Scheme for Social Network -- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). |
Altri titoli varianti | ICISS 2009 |
Record Nr. | UNINA-9910483314703321 |
Berlin ; ; New York, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|