Information Systems Security

8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings

Editors:

ISBN: 978-3-642-35129-7 (Print) 978-3-642-35130-3 (Online)

Table of contents (24 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Talk I

    1. No Access

      Book Chapter

      Pages 1-15

      Fighting Malicious Software

  3. Technical Session I: Software Security

    1. No Access

      Book Chapter

      Pages 16-34

      VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security

    2. No Access

      Book Chapter

      Pages 35-43

      Security Assessment of Node.js Platform

  4. Invited Talk II

    1. No Access

      Book Chapter

      Pages 44-58

      Foundations of Dynamic Access Control

  5. Technical Session II: Access Control

    1. No Access

      Book Chapter

      Pages 59-74

      Risk-Aware RBAC Sessions

    2. No Access

      Book Chapter

      Pages 75-88

      A Cognitive Trust Model for Access Control Framework in MANET

    3. No Access

      Book Chapter

      Pages 89-103

      Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments

  6. Invited Talk III

    1. No Access

      Book Chapter

      Pages 104-118

      On Policies and Intents

  7. Technical Session III: Covert Communications

    1. No Access

      Book Chapter

      Pages 119-133

      ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel

    2. No Access

      Book Chapter

      Pages 134-148

      Keyless Steganography in Spatial Domain Using Energetic Pixels

    3. No Access

      Book Chapter

      Pages 149-163

      Fuzzy Inference Rule Based Reversible Watermarking for Digital Images

  8. Technical Session IV: Network Security I

    1. No Access

      Book Chapter

      Pages 164-180

      Secure Trust Metadata Management for Mobile Ad-Hoc Networks

    2. No Access

      Book Chapter

      Pages 181-193

      Defence against Wormhole Attacks in Wireless Mesh Networks

    3. No Access

      Book Chapter

      Pages 194-207

      A Novel Key Update Protocol in Mobile Sensor Networks

    4. No Access

      Book Chapter

      Pages 208-222

      Autonomous Certification with List-Based Revocation for Secure V2V Communication

  9. Technical Session V: Database and Distributed Systems Security

    1. No Access

      Book Chapter

      Pages 223-237

      Mitigating Insider Threat on Database Integrity

    2. No Access

      Book Chapter

      Pages 238-248

      Coercion Resistant MIX for Electronic Auction

    3. No Access

      Book Chapter

      Pages 249-264

      Verification of Money Atomicity in Digital Cash Based Payment System

  10. Technical Session VI: Network Security II

    1. No Access

      Book Chapter

      Pages 265-276

      Cryptographic Analysis of a Type of Sequence Generators

    2. No Access

      Book Chapter

      Pages 277-293

      Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs

previous Page of 2