Information Systems Security

8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings

  • Venkat Venkatakrishnan
  • Diganta Goswami
Conference proceedings ICISS 2012

DOI: 10.1007/978-3-642-35130-3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7671)

Table of contents (24 papers)

  1. Front Matter
  2. Invited Talk I

    1. Fighting Malicious Software
      Christopher Kruegel
      Pages 1-15
  3. Technical Session I: Software Security

    1. VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security
      Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor
      Pages 16-34
    2. Security Assessment of Node.js Platform
      Andres Ojamaa, Karl Düüna
      Pages 35-43
  4. Invited Talk II

    1. Foundations of Dynamic Access Control
      Prasad Naldurg
      Pages 44-58
  5. Technical Session II: Access Control

    1. Risk-Aware RBAC Sessions
      Khalid Zaman Bijon, Ram Krishnan, Ravi Sandhu
      Pages 59-74
    2. A Cognitive Trust Model for Access Control Framework in MANET
      Soumya Maity, Soumya K. Ghosh
      Pages 75-88
    3. Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments
      Khalifa Toumi, César Andrés, Ana Cavalli
      Pages 89-103
  6. Invited Talk III

    1. On Policies and Intents
      Matthew L. Bolton, Celeste M. Wallace, Lenore D. Zuck
      Pages 104-118
  7. Technical Session III: Covert Communications

    1. ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel
      Arne Swinnen, Raoul Strackx, Pieter Philippaerts, Frank Piessens
      Pages 119-133
    2. Keyless Steganography in Spatial Domain Using Energetic Pixels
      Goutam Paul, Ian Davidson, Imon Mukherjee, S. S. Ravi
      Pages 134-148
    3. Fuzzy Inference Rule Based Reversible Watermarking for Digital Images
      Ruchira Naskar, Rajat Subhra Chakraborty
      Pages 149-163
  8. Technical Session IV: Network Security I

    1. Secure Trust Metadata Management for Mobile Ad-Hoc Networks
      Vivek Natarajan, Yi Yang, Sencun Zhu
      Pages 164-180
    2. Defence against Wormhole Attacks in Wireless Mesh Networks
      Rakesh Matam, Somanath Tripathy
      Pages 181-193
    3. A Novel Key Update Protocol in Mobile Sensor Networks
      Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier Lopez
      Pages 194-207
    4. Autonomous Certification with List-Based Revocation for Secure V2V Communication
      Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roychoudhury, Aravind Iyer, Debojyoti Bhattacharya
      Pages 208-222
  9. Technical Session V: Database and Distributed Systems Security

    1. Mitigating Insider Threat on Database Integrity
      Weihan Li, Brajendra Panda, Qussai Yaseen
      Pages 223-237
    2. Coercion Resistant MIX for Electronic Auction
      Jaydeep Howlader, Jayanta Kar, Ashis Kumar Mal
      Pages 238-248
    3. Verification of Money Atomicity in Digital Cash Based Payment System
      Girish Chandra, Divakar Yadav
      Pages 249-264
  10. Technical Session VI: Network Security II

    1. Cryptographic Analysis of a Type of Sequence Generators
      Alberto Peinado, Amparo Fúster-Sabater
      Pages 265-276

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.

Keywords

application security denial of service information hiding malicious transactions reversible watermarking

Editors and affiliations

  • Venkat Venkatakrishnan
    • 1
  • Diganta Goswami
    • 2
  1. 1.Department of Computer ScienceUniversity of Illinois at ChicagoChicagoUSA
  2. 2.Department of Computer Science and EngineeringIndian Institute of TechnologyGuwahatiIndia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-35129-7
  • Online ISBN 978-3-642-35130-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349