Skip to main content
  • Conference proceedings
  • © 2007

Information Systems Security

Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4812)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (27 papers)

  1. Front Matter

  2. Keynote Address

  3. Network Security

    1. Investigating the Impact of Real-World Factors on Internet Worm Propagation

      • Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li
      Pages 10-24
    2. An OS Security Protection Model for Defeating Attacks from Network

      • Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng
      Pages 25-36
    3. A Secure Intra-domain Routing Protocol for Wireless Mesh Networks

      • Ramanarayana Kandikattu, Lillykutty Jacob
      Pages 37-50
  4. Cryptography

    1. Genetic Algorithm Based Steganography Using Wavelets

      • K. B. Raja, Kiran Kumar K., Satish Kumar N., M. S. Lakshmi, H. Preeti, K. R. Venugopal et al.
      Pages 51-63
    2. A Near Optimal S-Box Design

      • Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita RoyChowdhury
      Pages 77-90
  5. Architectures and Systems

    1. A Software Framework for Autonomic Security in Pervasive Environments

      • Anshuman Saxena, Marc Lacoste, Tahar Jarboui, Ulf Lücking, Bernd Steinke
      Pages 91-109
    2. DLPKH – Distributed Logical Public-Key Hierarchy

      • Rakesh Bobba, Himanshu Khurana
      Pages 110-127
    3. Inference Control in Logic Databases as a Constraint Satisfaction Problem

      • Joachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese
      Pages 128-142
  6. Keynote Talk

    1. Data Privacy – Problems and Solutions

      • Sabrina De Capitani di Vimercati, Pierangela Samarati
      Pages 180-192
  7. Protocols

    1. Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals

      • G. K. Patra, V. Anil Kumar, R. P. Thangavelu
      Pages 193-207
    2. A Secure and Efficient Multi-authority Proactive Election Scheme

      • Ashish Kumar Singh, Priya Chandran
      Pages 208-218
    3. Secure Transaction Management Protocols for MLS/DDBMS

      • Navdeep Kaur, Rajwinder Singh, Manoj Misra, A. K. Sarje
      Pages 219-233
  8. Keynote Talk

    1. The Curse of Ease of Access to the Internet

      • Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng, Christopher Leckie
      Pages 234-249
  9. Short Papers

    1. A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document

      • G. Gupta, R. Sultania, S. Mondal, S. K. Saha, B. Chanda
      Pages 250-253

Other Volumes

  1. Information Systems Security

Keywords

  • Denial of Service
  • Internet
  • Routing
  • Scanner
  • access control
  • algorithms
  • authorization
  • broadcast encryption
  • chaotic cryptosystems
  • concurrency control
  • data security
  • inference control
  • printer
  • privacy
  • security

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access