Skip to main content
  • Conference proceedings
  • © 2012

Information Systems Security

8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7671)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

  2. Invited Talk I

    1. Fighting Malicious Software

      • Christopher Kruegel
      Pages 1-15
  3. Technical Session I: Software Security

    1. VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security

      • Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor
      Pages 16-34
    2. Security Assessment of Node.js Platform

      • Andres Ojamaa, Karl Düüna
      Pages 35-43
  4. Invited Talk II

    1. Foundations of Dynamic Access Control

      • Prasad Naldurg
      Pages 44-58
  5. Technical Session II: Access Control

    1. Risk-Aware RBAC Sessions

      • Khalid Zaman Bijon, Ram Krishnan, Ravi Sandhu
      Pages 59-74
    2. A Cognitive Trust Model for Access Control Framework in MANET

      • Soumya Maity, Soumya K. Ghosh
      Pages 75-88
    3. Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments

      • Khalifa Toumi, César Andrés, Ana Cavalli
      Pages 89-103
  6. Invited Talk III

    1. On Policies and Intents

      • Matthew L. Bolton, Celeste M. Wallace, Lenore D. Zuck
      Pages 104-118
  7. Technical Session III: Covert Communications

    1. ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel

      • Arne Swinnen, Raoul Strackx, Pieter Philippaerts, Frank Piessens
      Pages 119-133
    2. Keyless Steganography in Spatial Domain Using Energetic Pixels

      • Goutam Paul, Ian Davidson, Imon Mukherjee, S. S. Ravi
      Pages 134-148
    3. Fuzzy Inference Rule Based Reversible Watermarking for Digital Images

      • Ruchira Naskar, Rajat Subhra Chakraborty
      Pages 149-163
  8. Technical Session IV: Network Security I

    1. Secure Trust Metadata Management for Mobile Ad-Hoc Networks

      • Vivek Natarajan, Yi Yang, Sencun Zhu
      Pages 164-180
    2. Defence against Wormhole Attacks in Wireless Mesh Networks

      • Rakesh Matam, Somanath Tripathy
      Pages 181-193
    3. A Novel Key Update Protocol in Mobile Sensor Networks

      • Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier Lopez
      Pages 194-207
    4. Autonomous Certification with List-Based Revocation for Secure V2V Communication

      • Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roychoudhury, Aravind Iyer, Debojyoti Bhattacharya
      Pages 208-222
  9. Technical Session V: Database and Distributed Systems Security

    1. Mitigating Insider Threat on Database Integrity

      • Weihan Li, Brajendra Panda, Qussai Yaseen
      Pages 223-237
    2. Coercion Resistant MIX for Electronic Auction

      • Jaydeep Howlader, Jayanta Kar, Ashis Kumar Mal
      Pages 238-248
    3. Verification of Money Atomicity in Digital Cash Based Payment System

      • Girish Chandra, Divakar Yadav
      Pages 249-264
  10. Technical Session VI: Network Security II

    1. Cryptographic Analysis of a Type of Sequence Generators

      • Alberto Peinado, Amparo Fúster-Sabater
      Pages 265-276

Other Volumes

  1. Information Systems Security

About this book

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.

Editors and Affiliations

  • Department of Computer Science, University of Illinois at Chicago, Chicago, USA

    Venkat Venkatakrishnan

  • Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati, India

    Diganta Goswami

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access