Skip to main content
  • Conference proceedings
  • © 2005

Information Systems Security

First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3803)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (28 papers)

  1. Front Matter

  2. Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies

    • Ernesto Damiani, Marco Anisetti, Valerio Bellandi
    Pages 21-35
  3. Auditable Anonymous Delegation

    • Bruce Christianson, Partha Das Chowdhury, James Malcolm
    Pages 66-76
  4. A Robust Double Auction Protocol Based on a Hybrid Trust Model

    • JungHoon Ha, Jianying Zhou, SangJae Moon
    Pages 77-90
  5. VTrust: A Trust Management System Based on a Vector Model of Trust

    • Indrajit Ray, Sudip Chakraborty, Indrakshi Ray
    Pages 91-105
  6. Analysis and Modelling of Trust in Distributed Information Systems

    • Weiliang Zhao, Vijay Varadharajan, George Bryan
    Pages 106-119
  7. EPAL Based Privacy Enforcement Using ECA Rules

    • Jaijit Bhattacharya, S. K. Gupta
    Pages 120-133
  8. Protection of Relationships in XML Documents with the XML-BB Model

    • Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
    Pages 148-163
  9. Event Detection in Multilevel Secure Active Databases

    • Indrakshi Ray, Wei Huang
    Pages 177-190
  10. Key Management for Multicast Fingerprinting

    • Jian Wang, Lein Harn, Hideki Imai
    Pages 191-204
  11. CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks

    • Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita RoyChowdhury
    Pages 217-227
  12. A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks

    • Dibyendu Chakrabarti, Subhamoy Maitra, Bimal Roy
    Pages 228-238
  13. Detecting ARP Spoofing: An Active Technique

    • Vivek Ramachandran, Sukumar Nandi
    Pages 239-250
  14. Episode Based Masquerade Detection

    • Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari
    Pages 251-262

Other Volumes

  1. Information Systems Security

Keywords

  • Code
  • DOM
  • Extensible Markup Language (XML)
  • Information
  • P2P computing
  • authorization
  • boradcast encryption
  • distributed computing
  • fingerprinting
  • identity
  • intrusion detection
  • privacy
  • security
  • trust
  • trust models

Editors and Affiliations

  • Center for Secure Information Systems, George Mason University, Fairfax, USA

    Sushil Jajodia

  • Jadavpur University, Kolkata, India

    Chandan Mazumdar

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access