Information Systems Security

4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings

  • R. Sekar
  • Arun K. Pujari
Conference proceedings ICISS 2008

DOI: 10.1007/978-3-540-89862-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5352)

Table of contents (25 papers)

  1. Front Matter
  2. Keynote Address

    1. BitBlaze: A New Approach to Computer Security via Binary Analysis
      Dawn Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang et al.
      Pages 1-25
  3. Languages and Formal Methods

    1. On the Decidability of Model-Checking Information Flow Properties
      Deepak D’Souza, Raveendra Holla, Janardhan Kulkarni, Raghavendra K. Ramesh, Barbara Sprick
      Pages 26-40
    2. Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties
      Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier
      Pages 41-55
    3. Implicit Flows: Can’t Live with ‘Em, Can’t Live without ‘Em
      Dave King, Boniface Hicks, Michael Hicks, Trent Jaeger
      Pages 56-70
  4. Protocols

    1. A Robust Reputation Scheme for Decentralized Group Management Systems
      Frédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas
      Pages 71-85
    2. Complexity of Checking Freshness of Cryptographic Protocols
      Zhiyao Liang, Rakesh M. Verma
      Pages 86-101
    3. Secure Internet Voting Based on Paper Ballots
      Łukasz Nitschke
      Pages 102-115
  5. Short Papers

    1. A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)
      Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon
      Pages 116-123
    2. Revisiting Bluetooth Security (Short Paper)
      Manik Lal Das, Ravi Mukkamala
      Pages 132-139
  6. Keynote Address

    1. Computing on Encrypted Data
      Amit Sahai
      Pages 148-153
  7. Ongoing Research

    1. Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators
      Neelam Verma, Prasanna R. Mishra, Gireesh Pandey
      Pages 154-155
    2. Proxy Re-signature Schemes
      N. R. Sunitha, B. B. Amberker
      Pages 156-157
  8. Keynote Address

    1. Fast Signature Matching Using Extended Finite Automaton (XFA)
      R. Smith, C. Estan, S. Jha, I. Siahaan
      Pages 158-172
  9. Intrusion Detection

    1. Real-Time Alert Correlation with Type Graphs
      Gianni Tedesco, Uwe Aickelin
      Pages 173-187
    2. Incorporation of Application Layer Protocol Syntax into Anomaly Detection
      Patrick Düssel, Christian Gehl, Pavel Laskov, Konrad Rieck
      Pages 188-202
    3. A Parallel Architecture for Stateful, High-Speed Intrusion Detection
      Luca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna
      Pages 203-220
  10. Biometrics, Forensics and Steganography

    1. Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion
      Umarani Jayaraman, Surya Prakash, Phalguni Gupta
      Pages 221-234

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008.

The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications.

Keywords

biometric bluetooth security complexity computer security decidability model checking privacy secure voting security service-oriented computing

Editors and affiliations

  • R. Sekar
    • 1
  • Arun K. Pujari
    • 2
  1. 1.Department of Computer ScienceStony Brook UniversityStony BrookUSA
  2. 2.Department of Computer and Information SciencesUniversity of HyderabadHyderabadIndia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-89861-0
  • Online ISBN 978-3-540-89862-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349