Information Systems Security信息系统安全 ICISS 2005/会议录

出版社:1 (2006年1月13日)
出版日期:2006-1
ISBN:9783540307068
作者:Sushil Jajodia
页数:342页

书籍目录

Authorization and Trust Enhanced Security for Distributed ApplicationsToward Exploiting Location-Based and Video Information in Negotiated Access Control PoliciesUnderstanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic BehaviorBuilding India as the Destination for Secure Software Development- Next Wave of Opportunities for the ICT IndustryAuditable Anonymous DelegationA Robust Double Auction Protocol Based on a Hybrid Trust ModelVTrust: A Trust Management System Based on a Vector Model of TrustAnalysis and Modelling of Trust in Distributed Information SystemsEPAL Based Privacy Enforcement Using ECA RulesAn Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control PoliciesProtection of Relationships in XML Documents with the XML-BB ModelEISA - An Enterprise Application Security Solution for DatabasesEvent Detection in Multilevel Secure Active DatabasesKey Management for Multicast FingerprintingA Key Reshuffling Scheme for Wireless Sensor NetworksCCMEA: Customized Cellular Message Encryption Algorithm for Wireless NetworksA Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor NetworksDetecting ARP Spoofing: An Active TechniqueEpisode Based Masquerade DetectionA Game-Theoretic Approach to Credit Card Fraud Detection Modifications of SHA-0 to Prevent AttacksHow to Solve Key Escrow and Identity Revocation in Identity-Based Encryption SchemesOn Broadcast Encryption with Random Key Pre-distribution SchemesA Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security FieldSPEAR: Design of a Secured Peer-to-Peer Architecture……Author Index

作者简介

This book constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS 2005, held in Calcutta, India in December 2005. The 19 revised papers presented together with 4 invited papers and 5 ongoing project summaries were carefully reviewed and selected from 72 submissions. The papers discuss in depth the current state of the research and practice in information systems security and cover the following topics: authentication and access control, mobile code security, key management and cryptographic protocols, privacy and anonymity, intrusion detection and avoidance, security verification, database and application security and integrity, security in P2P, sensor and ad hoc networks, secure Web services, fault tolerance and recovery methods for security infrastructure, threats, vulnerabilities and risk management, and commercial and industrial security.


 Information Systems Security信息系统安全 ICISS 2005/会议录下载



发布书评

 
 


 

外国儿童文学,篆刻,百科,生物科学,科普,初中通用,育儿亲子,美容护肤PDF图书下载,。 零度图书网 

零度图书网 @ 2024