Limit search to available items
Book Cover
E-book
Author ICISS (Conference) (6th : 2010 : Gāndhīnagar, India)

Title Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 : proceedings / Somesh Jha, Anish Mathuria (eds.)
Published Berlin : Springer, 2010

Copies

Description 1 online resource (xiv, 260 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 6503
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6503.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Machine generated contents note: Invited Talks -- Analyzing Explicit Information Flow / Sriram K. Rajamani -- WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper) / Karthik Thotta Ganesh -- Toward Securely Programming the Internet / Andrew C. Myers -- Attribution of Malicious Behavior / Abhinav Srivastava -- Integrity and Verifiability -- Unifying Facets of Information Integrity / Andrei Sabelfeld -- Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation / Amiya Bhattacharya -- Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems / Poorvi L. Vora -- Web and Data Security -- Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation / V.N. Venkatakrishnan -- Coverage Criteria for Automatic Security Testing of Web Applications / Etsuya Shibayama -- Practical Generic Privacy Language / Laurent Bussard -- Efficient Detection of the Return-Oriented Programming Malicious Code / Li Xie -- ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows / Frank Piessens -- Access Control and Auditing -- Mining RBAC Roles under Cardinality Constraint / Arobinda Gupta -- Specification of History Based Constraints for Access Control in Conceptual Level / Rasool Jalili -- Abstracting Audit Data for Lightweight Intrusion Detection / Georgios Pitsilis -- System Security -- Persistent Public Watermarking of Relational Databases / Agostino Cortesi -- Security Rules versus Security Properties / Mathieu Jaume -- Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains / Tieyan Li
Summary This book constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS 2010, held in Gandhinagar, India, in December 2010. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 51 initial submissions. The papers are organized in topical sections on integrity and verifiability, web and data security, access control and auditing, as well as system security
Analysis informatieontsluiting
information retrieval
informatieopslag
information storage
informatiesystemen
information systems
biometrie
biometry
computerwetenschappen
computer sciences
computernetwerken
computer networks
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography Includes bibliographical references
Notes Print version record
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer networks -- Access control -- Congresses.
Informatique.
Computer networks -- Access control
Computer security
Data encryption (Computer science)
Zugriffskontrolle
Authentifikation
Kryptoanalyse
Rechnernetz
Datensicherung
Computersicherheit
Datenbanksystem
Elektronisches Wasserzeichen
Kryptologie
Gandhinagar <2010>
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Kongress.
Form Electronic book
Author Jha, Somesh.
Mathuria, Anish, 1967-
ISBN 9783642177149
364217714X