Information Systems Security

First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings

  • Sushil Jajodia
  • Chandan Mazumdar

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3803)

Table of contents

  1. Front Matter
  2. Ernesto Damiani, Marco Anisetti, Valerio Bellandi
    Pages 21-35
  3. Bruce Christianson, Partha Das Chowdhury, James Malcolm
    Pages 66-76
  4. JungHoon Ha, Jianying Zhou, SangJae Moon
    Pages 77-90
  5. Indrajit Ray, Sudip Chakraborty, Indrakshi Ray
    Pages 91-105
  6. Weiliang Zhao, Vijay Varadharajan, George Bryan
    Pages 106-119
  7. Jaijit Bhattacharya, S. K. Gupta
    Pages 120-133
  8. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
    Pages 148-163
  9. Indrakshi Ray, Wei Huang
    Pages 177-190
  10. Jian Wang, Lein Harn, Hideki Imai
    Pages 191-204
  11. Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita RoyChowdhury
    Pages 217-227
  12. Dibyendu Chakrabarti, Subhamoy Maitra, Bimal Roy
    Pages 228-238
  13. Vivek Ramachandran, Sukumar Nandi
    Pages 239-250
  14. Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari
    Pages 251-262

About these proceedings

Keywords

Code DOM Extensible Markup Language (XML) Information P2P computing authorization boradcast encryption distributed computing fingerprinting identity intrusion detection privacy security trust trust models

Editors and affiliations

  • Sushil Jajodia
    • 1
  • Chandan Mazumdar
    • 2
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  2. 2.Jadavpur UniversityKolkataIndia

Bibliographic information

  • DOI https://doi.org/10.1007/11593980
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-30706-8
  • Online ISBN 978-3-540-32422-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book