Information Systems Security信息系统安全 ICISS 2005/会议录

出版时间:2006-1  出版社:1 (2006年1月13日)  作者:Sushil Jajodia  页数:342  

内容概要

This book constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS 2005, held in Calcutta, India in December 2005. The 19 revised papers presented together with 4 invited papers and 5 ongoing project summaries were carefully reviewed and selected from 72 submissions. The papers discuss in depth the current state of the research and practice in information systems security and cover the following topics: authentication and access control, mobile code security, key management and cryptographic protocols, privacy and anonymity, intrusion detection and avoidance, security verification, database and application security and integrity, security in P2P, sensor and ad hoc networks, secure Web services, fault tolerance and recovery methods for security infrastructure, threats, vulnerabilities and risk management, and commercial and industrial security.

书籍目录

Authorization and Trust Enhanced Security for Distributed ApplicationsToward Exploiting Location-Based and Video Information in Negotiated Access Control PoliciesUnderstanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic BehaviorBuilding India as the Destination for Secure Software Development- Next Wave of Opportunities for the ICT IndustryAuditable Anonymous DelegationA Robust Double Auction Protocol Based on a Hybrid Trust ModelVTrust: A Trust Management System Based on a Vector Model of TrustAnalysis and Modelling of Trust in Distributed Information SystemsEPAL Based Privacy Enforcement Using ECA RulesAn Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control PoliciesProtection of Relationships in XML Documents with the XML-BB ModelEISA - An Enterprise Application Security Solution for DatabasesEvent Detection in Multilevel Secure Active DatabasesKey Management for Multicast FingerprintingA Key Reshuffling Scheme for Wireless Sensor NetworksCCMEA: Customized Cellular Message Encryption Algorithm for Wireless NetworksA Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor NetworksDetecting ARP Spoofing: An Active TechniqueEpisode Based Masquerade DetectionA Game-Theoretic Approach to Credit Card Fraud Detection Modifications of SHA-0 to Prevent AttacksHow to Solve Key Escrow and Identity Revocation in Identity-Based Encryption SchemesOn Broadcast Encryption with Random Key Pre-distribution SchemesA Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security FieldSPEAR: Design of a Secured Peer-to-Peer Architecture……Author Index

图书封面

评论、评分、阅读与下载


    Information Systems Security信息系统安全 ICISS 2005/会议录 PDF格式下载


用户评论 (总计0条)

 
 

 

250万本中文图书简介、评论、评分,PDF格式免费下载。 第一图书网 手机版

京ICP备13047387号-7