信息系統(tǒng)安全/Information systems security

出版時(shí)間:2006-12  出版社:Springer Verlag  作者:Aditya, Bagchi (EDT)/ Atluri, Vijayalakshmi (EDT)  頁數(shù):382  

內(nèi)容概要

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006.    The 20 revised full papers and 5 short papers presented together with 4 invited papers and 3 ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security and are organized in topical sections on data and application security, access control, key management and security in wireless networks, threat analysis, detection and recovery, cryptography and encryption, as well as short papers and research reports.

書籍目錄

Invited Papers Privacy in the Electronic Society A Data Sharing Agreement Framework Password Exhaustion: Predicting the End of Password Usefulness Network Monitoring for Security and ForensicsData and Application Security Fairness Strategy for Multilevel Secure Concurrency Control Protocol Optimistic Anonymous Participation in Inter-organizational Workflow Instances O2O: Virtual Private Organizations to Manage Security Policy Interoperability Privacy Preserving Web-Based EmailAccess Control Context-Aware Provisional Access Control LRBAC: A Location-Aware Role-Based Access Control Model Extending Context Descriptions in Semantics-Aware Access Control Specification and Realization of Access Control in SPKI/SDSIKey Management and Security in Wireless Networks Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack An Efficient Key Assignment Scheme for Access Control in a Hierarchy Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers Secure Data Management in Reactive Sensor NetworksThreat Analysis, Detection and Recovery Security Ontology: Simulating Threats to Corporate Assets Two-Stage Credit Card Fraud Detection Using Sequence Alignment New Malicious Code Detection Using Variable Length n-grams A Dead-Lock Free Self-healing Algorithm for Distributed Transactional ProcessesCryptography and Encryption An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack A Partial Image Encryption Method with Pseudo Random Sequences  ……Short Papers and Research ReportsAuthor Index

圖書封面

評論、評分、閱讀與下載


    信息系統(tǒng)安全/Information systems security PDF格式下載


用戶評論 (總計(jì)0條)

 
 

 

250萬本中文圖書簡介、評論、評分,PDF格式免費(fèi)下載。 第一圖書網(wǎng) 手機(jī)版

京ICP備13047387號-7