Skip to main content
  • Conference proceedings
  • © 2006

Information Systems Security

Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4332)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2006.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (32 papers)

  1. Front Matter

  2. Invited Papers

    1. Privacy in the Electronic Society

      • Sabrina De Capitani di Vimercati, Pierangela Samarati
      Pages 1-21
    2. A Data Sharing Agreement Framework

      • Vipin Swarup, Len Seligman, Arnon Rosenthal
      Pages 22-36
    3. Password Exhaustion: Predicting the End of Password Usefulness

      • Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel et al.
      Pages 37-55
    4. Network Monitoring for Security and Forensics

      • Kulesh Shanmugasundaram, Nasir Memon
      Pages 56-70
  3. Data and Application Security

    1. Fairness Strategy for Multilevel Secure Concurrency Control Protocol

      • Navdeep Kaur, Rajwinder Singh, Manoj Misra, A. K. Sarje
      Pages 71-85
    2. O2O: Virtual Private Organizations to Manage Security Policy Interoperability

      • Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma
      Pages 101-115
    3. Privacy Preserving Web-Based Email

      • Kevin Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick McDaniel
      Pages 116-131
  4. Access Control

    1. Context-Aware Provisional Access Control

      • Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalili
      Pages 132-146
    2. LRBAC: A Location-Aware Role-Based Access Control Model

      • Indrakshi Ray, Mahendra Kumar, Lijun Yu
      Pages 147-161
    3. Extending Context Descriptions in Semantics-Aware Access Control

      • E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati
      Pages 162-176
    4. Specification and Realization of Access Control in SPKI/SDSI

      • N. V. Narendra Kumar, R. K. Shyamasundar
      Pages 177-193
  5. Key Management and Security in Wireless Networks

    1. An Efficient Key Assignment Scheme for Access Control in a Hierarchy

      • Praveen Kumar Vadnala, Anish Mathuria
      Pages 205-219
    2. Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers

      • Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa
      Pages 220-234
    3. Secure Data Management in Reactive Sensor Networks

      • L. Chaithanya, M. P. Singh, M. M. Gore
      Pages 235-248
  6. Threat Analysis, Detection and Recovery

    1. Security Ontology: Simulating Threats to Corporate Assets

      • Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl
      Pages 249-259
    2. Two-Stage Credit Card Fraud Detection Using Sequence Alignment

      • Amlan Kundu, Shamik Sural, A. K. Majumdar
      Pages 260-275
    3. New Malicious Code Detection Using Variable Length n-grams

      • D. Krishna Sandeep Reddy, Subrat Kumar Dash, Arun K. Pujari
      Pages 276-288

Other Volumes

  1. Information Systems Security

Keywords

  • Alignment
  • Code
  • Ethernet
  • Information
  • RSA cryptosystem
  • access control
  • authorization
  • broadcast encryption
  • interoperability
  • networks
  • organization
  • privacy
  • security
  • storage security
  • trust

Editors and Affiliations

  • Indian Statistical Institute, Computer and Statistical Service Center, Kolkata, India

    Aditya Bagchi

  • MSIS Department and CIMIC, Rutgers University, USA

    Vijayalakshmi Atluri

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions