Vai al contenuto principale della pagina
Titolo: | Information Systems Security [[electronic resource] ] : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar |
Pubblicazione: | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Edizione: | 1st ed. 2005. |
Descrizione fisica: | 1 online resource (XII, 342 p.) |
Disciplina: | 005.8 |
Soggetto topico: | Data encryption (Computer science) |
Computer communication systems | |
Operating systems (Computers) | |
Computers and civilization | |
Management information systems | |
Computer science | |
Information storage and retrieval | |
Cryptology | |
Computer Communication Networks | |
Operating Systems | |
Computers and Society | |
Management of Computing and Information Systems | |
Information Storage and Retrieval | |
Persona (resp. second.): | JajodiaSushil |
MazumdarChandan | |
Note generali: | Bibliographic Level Mode of Issuance: Monograph |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry -- Auditable Anonymous Delegation -- A Robust Double Auction Protocol Based on a Hybrid Trust Model -- VTrust: A Trust Management System Based on a Vector Model of Trust -- Analysis and Modelling of Trust in Distributed Information Systems -- EPAL Based Privacy Enforcement Using ECA Rules -- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies -- Protection of Relationships in XML Documents with the XML-BB Model -- EISA – An Enterprise Application Security Solution for Databases -- Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast Fingerprinting -- A Key Reshuffling Scheme for Wireless Sensor Networks -- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks -- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks -- Detecting ARP Spoofing: An Active Technique -- Episode Based Masquerade Detection -- A Game-Theoretic Approach to Credit Card Fraud Detection -- Modifications of SHA-0 to Prevent Attacks -- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes -- On Broadcast Encryption with Random Key Pre-distribution Schemes -- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field -- SPEAR: Design of a Secured Peer-to-Peer Architecture -- A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security -- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches -- A Transparent End-to-End Security Solution. |
Titolo autorizzato: | Information Systems Security |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 996465721503316 |
Lo trovi qui: | Univ. di Salerno |
Opac: | Controlla la disponibilità qui |