Information Systems Security

6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings

  • Somesh Jha
  • Anish Mathuria
Conference proceedings ICISS 2010

DOI: 10.1007/978-3-642-17714-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6503)

Table of contents (18 papers)

  1. Front Matter
  2. Invited Talks

    1. Analyzing Explicit Information Flow
      Sriram K. Rajamani
      Pages 1-2
    2. WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper)
      V. N. Venkatakrishnan, Prithvi Bisht, Mike Ter Louw, Michelle Zhou, Kalpana Gondi, Karthik Thotta Ganesh
      Pages 3-26
    3. Toward Securely Programming the Internet
      Andrew C. Myers
      Pages 27-27
    4. Attribution of Malicious Behavior
      Jonathon Giffin, Abhinav Srivastava
      Pages 28-47
  3. Integrity and Verifiability

    1. Unifying Facets of Information Integrity
      Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld
      Pages 48-65
    2. Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation
      Raghunathan Srinivasan, Partha Dasgupta, Tushar Gohad, Amiya Bhattacharya
      Pages 66-80
    3. Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems
      Mridul Nandi, Stefan Popoveniuc, Poorvi L. Vora
      Pages 81-95
  4. Web and Data Security

    1. Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation
      Michelle Zhou, Prithvi Bisht, V. N. Venkatakrishnan
      Pages 96-110
    2. Coverage Criteria for Automatic Security Testing of Web Applications
      Thanh Binh Dao, Etsuya Shibayama
      Pages 111-124
    3. A Practical Generic Privacy Language
      Moritz Y. Becker, Alexander Malkis, Laurent Bussard
      Pages 125-139
    4. Efficient Detection of the Return-Oriented Programming Malicious Code
      Ping Chen, Xiao Xing, Hao Han, Bing Mao, Li Xie
      Pages 140-155
    5. ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
      Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, Frank Piessens
      Pages 156-170
  5. Access Control and Auditing

    1. Mining RBAC Roles under Cardinality Constraint
      Ravi Kumar, Shamik Sural, Arobinda Gupta
      Pages 171-185
    2. Specification of History Based Constraints for Access Control in Conceptual Level
      Fathiyeh Faghih, Morteza Amini, Rasool Jalili
      Pages 186-200
    3. Abstracting Audit Data for Lightweight Intrusion Detection
      Wei Wang, Xiangliang Zhang, Georgios Pitsilis
      Pages 201-215
  6. System Security

    1. A Persistent Public Watermarking of Relational Databases
      Raju Halder, Agostino Cortesi
      Pages 216-230
    2. Security Rules versus Security Properties
      Mathieu Jaume
      Pages 231-245
    3. Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains
      Shaoying Cai, Chunhua Su, Yingjiu Li, Robert Deng, Tieyan Li
      Pages 246-260
  7. Back Matter

About these proceedings


abstraction access control anomaly detection attack prevention authentication data security security

Editors and affiliations

  • Somesh Jha
    • 1
  • Anish Mathuria
    • 2
  1. 1.Computer Sciences DepartmentUniversity of WisconsinMadisonUSA
  2. 2.Dhirubhai Ambani Institute of Information and Communication TechnologyGujaratIndia

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-17713-2
  • Online ISBN 978-3-642-17714-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349