HOME > 상세정보

상세정보

Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings

Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings

자료유형
단행본
개인저자
Jajodia, Sushil. Mazumdar, Chandan.
서명 / 저자사항
Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings / Sushil Jajodia, Chandan Mazumdar (eds.).
발행사항
Berlin ;   New York :   Springer,   c2005.  
형태사항
xi, 342 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 3803
ISBN
3540307060 (pbk. : alk. paper) 9783540307068 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Computers -- Access control -- Congresses.
000 01719camuu2200409 a 4500
001 000045562176
005 20091127161630
008 051026s2005 gw a ba 101 0 eng d
010 ▼a 2005936358
020 ▼a 3540307060 (pbk. : alk. paper)
020 ▼a 9783540307068 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm62979241
035 ▼a (OCoLC)62979241
035 ▼a (CStRLIN)PAUGV3965751-B
035 ▼a (PU)3965751
035 ▼a (KERIS)REF000012634201
040 ▼a LWU ▼c LWU ▼d LWU ▼d TXH ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a QA76.9.A25 ▼b I5543 2005
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I6193i ▼c 1
111 2 ▼a International Conference on Information Systems Security ▼n (1st : ▼d 2005 : ▼c Calcutta, India)
245 1 0 ▼a Information systems security : ▼b first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings / ▼c Sushil Jajodia, Chandan Mazumdar (eds.).
246 3 0 ▼a ICISS 2005
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005.
300 ▼a xi, 342 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3803
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Computers ▼x Access control ▼v Congresses.
700 1 ▼a Jajodia, Sushil.
700 1 ▼a Mazumdar, Chandan.
830 0 ▼a Lecture notes in computer science ; ▼v 3803.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I6193i 1 등록번호 121186951 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Authorization and Trust Enhanced Security for Distributed Applications.- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies.- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.- Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the ICT Industry.- Auditable Anonymous Delegation.- A Robust Double Auction Protocol Based on a Hybrid Trust Model.- VTrust: A Trust Management System Based on a Vector Model of Trust.- Analysis and Modelling of Trust in Distributed Information Systems.- EPAL Based Privacy Enforcement Using ECA Rules.- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.- Protection of Relationships in XML Documents with the XML-BB Model.- EISA - An Enterprise Application Security Solution for Databases.- Event Detection in Multilevel Secure Active Databases.- Key Management for Multicast Fingerprinting.- A Key Reshuffling Scheme for Wireless Sensor Networks.- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks.- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks.- Detecting ARP Spoofing: An Active Technique.- Episode Based Masquerade Detection.- A Game-Theoretic Approach to Credit Card Fraud Detection.- Modifications of SHA-0 to Prevent Attacks.- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes.- On Broadcast Encryption with Random Key Pre-distribution Schemes.- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field.- SPEAR: Design of a Secured Peer-to-Peer Architecture.- A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security.- Development of a Comprehensive Intrusion Detection System - Challenges and Approaches.- A Transparent End-to-End Security Solution.


정보제공 : Aladin

관련분야 신착자료

이창현 (2021)