Cantitate/Preț
Produs

Information Systems Security: First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings: Lecture Notes in Computer Science, cartea 3803

Editat de Sushil Jajodia, Chandan Mazumdar
en Limba Engleză Paperback – 9 dec 2005
This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011.
The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 33219 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 29 noi 2011 33219 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 9 dec 2005 37794 lei  38-44 zile

Din seria Lecture Notes in Computer Science

Preț: 37794 lei

Nou

Puncte Express: 567

Preț estimativ în valută:
7233 7513$ 6008£

Carte tipărită la comandă

Livrare economică 28 ianuarie-03 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540307068
ISBN-10: 3540307060
Pagini: 356
Ilustrații: XII, 342 p.
Dimensiuni: 155 x 233 x 19 mm
Greutate: 0.53 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Authorization and Trust Enhanced Security for Distributed Applications.- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies.- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry.- Auditable Anonymous Delegation.- A Robust Double Auction Protocol Based on a Hybrid Trust Model.- VTrust: A Trust Management System Based on a Vector Model of Trust.- Analysis and Modelling of Trust in Distributed Information Systems.- EPAL Based Privacy Enforcement Using ECA Rules.- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.- Protection of Relationships in XML Documents with the XML-BB Model.- EISA – An Enterprise Application Security Solution for Databases.- Event Detection in Multilevel Secure Active Databases.- Key Management for Multicast Fingerprinting.- A Key Reshuffling Scheme for Wireless Sensor Networks.- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks.- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks.- Detecting ARP Spoofing: An Active Technique.- Episode Based Masquerade Detection.- A Game-Theoretic Approach to Credit Card Fraud Detection.- Modifications of SHA-0 to Prevent Attacks.- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes.- On Broadcast Encryption with Random Key Pre-distribution Schemes.- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field.- SPEAR: Design of a Secured Peer-to-Peer Architecture.- A Web-Enabled EnterpriseSecurity Management Framework Based on a Unified Model of Enterprise Information System Security.- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches.- A Transparent End-to-End Security Solution.

Caracteristici

Fast track conference proceedings Unique visibility State of the art research