© 2011

Information Systems Security

7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings

  • Sushil Jajodia
  • Chandan Mazumdar
Conference proceedings ICISS 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7093)

Table of contents

  1. Front Matter
  2. Invited Papers

    1. Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia et al.
      Pages 1-27
    2. Yan Huang, Chih-hao Shen, David Evans, Jonathan Katz, Abhi Shelat
      Pages 28-48
  3. Regular Papers

    1. Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé
      Pages 72-86
    2. Julien A. Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia
      Pages 87-101
    3. Puneet Gupta, Scott D. Stoller, Zhongyuan Xu
      Pages 116-130
    4. Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero
      Pages 144-159
    5. Lorenzo Cavallaro, R. Sekar
      Pages 160-174
    6. Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing
      Pages 175-189
    7. Ruchira Naskar, Rajat Subhra Chakraborty
      Pages 190-203
    8. Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
      Pages 204-214
    9. Indivar Gupta, P. K. Saxena
      Pages 215-234
    10. Meilof Veeningen, Benne de Weger, Nicola Zannone
      Pages 235-249
    11. Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci
      Pages 250-264
    12. Anuj S. Saxena, Mayank Pundir, Vikram Goyal, Debajyoti Bera
      Pages 265-279
    13. Faraz Ahmed, M. Zubair Rafique, Muhammad Abulaish
      Pages 280-293

About these proceedings


This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011.
The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.


data outsourcing drive-by downloads intrusion detection trojans watermarking

Editors and affiliations

  • Sushil Jajodia
    • 1
  • Chandan Mazumdar
    • 2
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  2. 2.Center for Distributed ComputingJadavpur UniversityKolkataIndia

Bibliographic information