Description |
1 online resource (xiv, 260 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 6503 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 6503.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Machine generated contents note: Invited Talks -- Analyzing Explicit Information Flow / Sriram K. Rajamani -- WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper) / Karthik Thotta Ganesh -- Toward Securely Programming the Internet / Andrew C. Myers -- Attribution of Malicious Behavior / Abhinav Srivastava -- Integrity and Verifiability -- Unifying Facets of Information Integrity / Andrei Sabelfeld -- Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation / Amiya Bhattacharya -- Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems / Poorvi L. Vora -- Web and Data Security -- Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation / V.N. Venkatakrishnan -- Coverage Criteria for Automatic Security Testing of Web Applications / Etsuya Shibayama -- Practical Generic Privacy Language / Laurent Bussard -- Efficient Detection of the Return-Oriented Programming Malicious Code / Li Xie -- ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows / Frank Piessens -- Access Control and Auditing -- Mining RBAC Roles under Cardinality Constraint / Arobinda Gupta -- Specification of History Based Constraints for Access Control in Conceptual Level / Rasool Jalili -- Abstracting Audit Data for Lightweight Intrusion Detection / Georgios Pitsilis -- System Security -- Persistent Public Watermarking of Relational Databases / Agostino Cortesi -- Security Rules versus Security Properties / Mathieu Jaume -- Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains / Tieyan Li |
Summary |
This book constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS 2010, held in Gandhinagar, India, in December 2010. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 51 initial submissions. The papers are organized in topical sections on integrity and verifiability, web and data security, access control and auditing, as well as system security |
Analysis |
informatieontsluiting |
|
information retrieval |
|
informatieopslag |
|
information storage |
|
informatiesystemen |
|
information systems |
|
biometrie |
|
biometry |
|
computerwetenschappen |
|
computer sciences |
|
computernetwerken |
|
computer networks |
|
gegevensbeheer |
|
data management |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references |
Notes |
Print version record |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Computer networks -- Access control -- Congresses.
|
|
Informatique.
|
|
Computer networks -- Access control
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Zugriffskontrolle
|
|
Authentifikation
|
|
Kryptoanalyse
|
|
Rechnernetz
|
|
Datensicherung
|
|
Computersicherheit
|
|
Datenbanksystem
|
|
Elektronisches Wasserzeichen
|
|
Kryptologie
|
|
Gandhinagar <2010>
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
|
Kongress.
|
Form |
Electronic book
|
Author |
Jha, Somesh.
|
|
Mathuria, Anish, 1967-
|
ISBN |
9783642177149 |
|
364217714X |
|