Description |
1 online resource (xv, 325 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 5905 |
|
LNCS sublibrary: SL 4 - Security and cryptology |
|
Lecture notes in computer science ; 5905.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Keynote Talks -- A Survey of Voice over IP Security Research -- Security for a Smarter Planet -- The WOMBAT Attack Attribution Method: Some Results -- Biometrics and Security -- Authentication -- Remote Electronic Voting with Revocable Anonymity -- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals -- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup -- Verification -- Biometric Identification over Encrypted Data Made Feasible -- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity -- Formal Verification of Security Policy Implementations in Enterprise Networks -- Systems Security -- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles -- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products -- DROP: Detecting Return-Oriented Programming Malicious Code -- Behavior Analysis -- A Framework for Behavior-Based Malware Analysis in the Cloud -- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs -- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders -- Database Security -- Database Relation Watermarking Resilient against Secondary Watermarking Attacks -- A Robust Damage Assessment Model for Corrupted Database Systems -- A Generic Distortion Free Watermarking Technique for Relational Databases -- Cryptography -- On Some Weaknesses in the Disk Encryption Schemes EME and EME2 -- TWIS -- A Lightweight Block Cipher -- Short Papers -- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking -- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations -- Let Only the Right One IN: Privacy Management Scheme for Social Network -- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper) |
Summary |
This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009. The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 85 initial submissions. The papers are organized in topical sections on authentication, verification, systems security, behavior analysis, database security, and cryptography |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Access control -- Congresses.
|
|
Computer networks -- Security measures -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Informatique.
|
|
Computer networks -- Access control
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Authentifikation
|
|
Computersicherheit
|
|
Datenbanksystem
|
|
Datensicherung
|
|
Elektronisches Wasserzeichen
|
|
Kryptoanalyse
|
|
Kryptologie
|
|
Rechnernetz
|
|
Zugriffskontrolle
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Prakash, Atul.
|
|
Gupta, Indranil Sen.
|
ISBN |
9783642107726 |
|
3642107729 |
|
9788364210778 |
|
8364210777 |
|