信息系统安全

信息系统安全
作 者: Aditya Bagchi
出版社: 广东教育出版社
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《信息系统安全》作者简介

内容简介

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006.The 20 revised full papers and 5 short papers presented together with 4 invited papers and 3 ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security and are organized in topical sections on data and application security, access control, key management and security in wireless networks, threat analysis, detection and recovery, cryptography and encryption, as well as short papers and research reports.

图书目录

Invited Papers

 Privacy in the Electronic Society

 A Data Sharing Agreement Framework

 Password Exhaustion: Predicting the End of Password Usefulness

 Network Monitoring for Security and Forensics

Data and Application Security

 Fairness Strategy for Multilevel Secure Concurrency Control Protocol

 Optimistic Anonymous Participation in Inter-organizational Workflow Instances

 O2O: Virtual Private Organizations to Manage Security Policy Interoperability

 Privacy Preserving Web-Based Email

Access Control

 Context-Aware Provisional Access Control

 LRBAC: A Location-Aware Role-Based Access Control Model

 Extending Context Descriptions in Semantics-Aware Access Control

 Specification and Realization of Access Control in SPKI/SDSI

Key Management and Security in Wireless Networks

 Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack

 An Efficient Key Assignment Scheme for Access Control in a Hierarchy

 Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers

 Secure Data Management in Reactive Sensor Networks

Threat Analysis, Detection and Recovery

 Security Ontology: Simulating Threats to Corporate Assets

 Two-Stage Credit Card Fraud Detection Using Sequence Alignment

 New Malicious Code Detection Using Variable Length n-grams

 A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes

Cryptography and Encryption

 An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack

 A Partial Image Encryption Method with Pseudo Random Sequences

……

Short Papers and Research Reports

Author Index