Information Systems Security

8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings

  • Venkat Venkatakrishnan
  • Diganta Goswami
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7671)

Table of contents

  1. Front Matter
  2. Invited Talk I

    1. Christopher Kruegel
      Pages 1-15
  3. Technical Session I: Software Security

    1. Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor
      Pages 16-34
    2. Andres Ojamaa, Karl Düüna
      Pages 35-43
  4. Invited Talk II

    1. Prasad Naldurg
      Pages 44-58
  5. Technical Session II: Access Control

    1. Khalid Zaman Bijon, Ram Krishnan, Ravi Sandhu
      Pages 59-74
    2. Soumya Maity, Soumya K. Ghosh
      Pages 75-88
    3. Khalifa Toumi, César Andrés, Ana Cavalli
      Pages 89-103
  6. Invited Talk III

    1. Matthew L. Bolton, Celeste M. Wallace, Lenore D. Zuck
      Pages 104-118
  7. Technical Session III: Covert Communications

    1. Arne Swinnen, Raoul Strackx, Pieter Philippaerts, Frank Piessens
      Pages 119-133
    2. Goutam Paul, Ian Davidson, Imon Mukherjee, S. S. Ravi
      Pages 134-148
    3. Ruchira Naskar, Rajat Subhra Chakraborty
      Pages 149-163
  8. Technical Session IV: Network Security I

    1. Vivek Natarajan, Yi Yang, Sencun Zhu
      Pages 164-180
    2. Rakesh Matam, Somanath Tripathy
      Pages 181-193
    3. Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier Lopez
      Pages 194-207
    4. Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roychoudhury, Aravind Iyer, Debojyoti Bhattacharya
      Pages 208-222
  9. Technical Session V: Database and Distributed Systems Security

    1. Weihan Li, Brajendra Panda, Qussai Yaseen
      Pages 223-237
    2. Jaydeep Howlader, Jayanta Kar, Ashis Kumar Mal
      Pages 238-248
    3. Girish Chandra, Divakar Yadav
      Pages 249-264
  10. Technical Session VI: Network Security II

    1. Alberto Peinado, Amparo Fúster-Sabater
      Pages 265-276

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.

Keywords

application security denial of service information hiding malicious transactions reversible watermarking

Editors and affiliations

  • Venkat Venkatakrishnan
    • 1
  • Diganta Goswami
    • 2
  1. 1.Department of Computer ScienceUniversity of Illinois at ChicagoChicagoUSA
  2. 2.Department of Computer Science and EngineeringIndian Institute of TechnologyGuwahatiIndia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-35130-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-35129-7
  • Online ISBN 978-3-642-35130-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book