Skip to main content
  • Conference proceedings
  • © 2011

Information Systems Security

7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings

  • Fast track conference proceedings

  • Unique visibility

  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7093)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (28 papers)

  1. Front Matter

  2. Invited Papers

    1. Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms

      • Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia et al.
      Pages 1-27
    2. Efficient Secure Computation with Garbled Circuits

      • Yan Huang, Chih-hao Shen, David Evans, Jonathan Katz, Abhi Shelat
      Pages 28-48
  3. Regular Papers

    1. Flow Based Interpretation of Access Control: Detection of Illegal Information Flows

      • Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé
      Pages 72-86
    2. Consistency Policies for Dynamic Information Systems with Declassification Flows

      • Julien A. Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia
      Pages 87-101
    3. Abductive Analysis of Administrative Policies in Rule-Based Access Control

      • Puneet Gupta, Scott D. Stoller, Zhongyuan Xu
      Pages 116-130
    4. Finding Non-trivial Malware Naming Inconsistencies

      • Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero
      Pages 144-159
    5. Taint-Enhanced Anomaly Detection

      • Lorenzo Cavallaro, R. Sekar
      Pages 160-174
    6. Secured Cloud Storage Scheme Using ECC Based Key Management in User Hierarchy

      • Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing
      Pages 175-189
    7. Reversible Image Watermarking through Coordinate Logic Operation Based Prediction

      • Ruchira Naskar, Rajat Subhra Chakraborty
      Pages 190-203
    8. Some Combinatorial Results towards State Recovery Attack on RC4

      • Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
      Pages 204-214
    9. Distributed Signcryption from Pairings

      • Indivar Gupta, P. K. Saxena
      Pages 215-234
    10. Formal Privacy Analysis of Communication Protocols for Identity Management

      • Meilof Veeningen, Benne de Weger, Nicola Zannone
      Pages 235-249
    11. Load Time Security Verification

      • Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci
      Pages 250-264
    12. Preserving Location Privacy for Continuous Queries on Known Route

      • Anuj S. Saxena, Mayank Pundir, Vikram Goyal, Debajyoti Bera
      Pages 265-279
    13. A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing Attacks

      • Faraz Ahmed, M. Zubair Rafique, Muhammad Abulaish
      Pages 280-293

Other Volumes

  1. Information Systems Security

About this book

This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011.
The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.

Keywords

  • data outsourcing
  • drive-by downloads
  • intrusion detection
  • trojans
  • watermarking

Editors and Affiliations

  • Center for Secure Information Systems, George Mason University, Fairfax, USA

    Sushil Jajodia

  • Center for Distributed Computing, Jadavpur University, Kolkata, India

    Chandan Mazumdar

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access