|
" Information Systems Security : "
ICISS 2012, Guwahati, India, December 15-19, 2012 ; Venkat Venkatakrishnan [und weitere] (eds.).
Document Type
|
:
|
BL
|
Record Number
|
:
|
747729
|
Doc. No
|
:
|
b567680
|
Main Entry
|
:
|
ICISS 2012, Guwahati, India, December 15-19, 2012 ; Venkat Venkatakrishnan [und weitere] (eds.).
|
Title & Author
|
:
|
Information Systems Security : : 8th International Conference : proceedings\ ICISS 2012, Guwahati, India, December 15-19, 2012 ; Venkat Venkatakrishnan [und weitere] (eds.).
|
Publication Statement
|
:
|
Heidelberg : Springer, 2012
|
Series Statement
|
:
|
Lecture notes in computer science, 7671
|
ISBN
|
:
|
3642351298
|
|
:
|
: 3642351301
|
|
:
|
: 9783642351297
|
|
:
|
: 9783642351303
|
Contents
|
:
|
Fighting Malicious Software.- VulnerableMe: Measuring SystemicWeaknesses in Mobile Browser Security.- Security Assessment of Node.js Platform.- Foundations of Dynamic Access Control.- Risk-Aware RBAC Sessions.- A Cognitive Trust Model for Access Control Framework i MANET.- Trust-OrBAC: A Trust Access Control Model in Multi-Organization Environments.- On Policies and Intents.- ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel.- Keyless Steganography in Spatial Domain Using Energetic Pixels.- Fuzzy Inference Rule Based Reversible Watermarking for Digital Images.- Secure Trust Metadata Management for Mobile Ad-Hoc Networks.- Defence against Wormhole Attacks in Wireless Mesh Networks.- A Novel Key Update Protocol in Mobile Sensor Networks.- Autonomous Certification with List-Based Revocation for Secure V2V Communication.- Mitigating Insider Threat on Database Integrity.- Coercion Resistant MIX for Electronic Auction.- Verification of Money Atomicity in Digital Cash Based Payment System.- Cryptographic Analysis of a Type of Sequence Generators.- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs.- Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks.- Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF.- Attacking Image Based CAPTCHAs Using Image Recognition Techniques.- Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.
|
Subject
|
:
|
DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
|
Subject
|
:
|
INFORMATIONSSYSTEME (INFORMATIK)
|
Subject
|
:
|
NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
|
LC Classification
|
:
|
QA76.9.A25I257 2012
|
Added Entry
|
:
|
Venkat Venkatakrishnan
|
| |