Advertisement

© 2005

Information Systems Security

First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings

  • Sushil Jajodia
  • Chandan Mazumdar
Conference proceedings ICISS 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3803)

Table of contents

  1. Front Matter
  2. Ernesto Damiani, Marco Anisetti, Valerio Bellandi
    Pages 21-35
  3. Bruce Christianson, Partha Das Chowdhury, James Malcolm
    Pages 66-76
  4. JungHoon Ha, Jianying Zhou, SangJae Moon
    Pages 77-90
  5. Indrajit Ray, Sudip Chakraborty, Indrakshi Ray
    Pages 91-105
  6. Weiliang Zhao, Vijay Varadharajan, George Bryan
    Pages 106-119
  7. Jaijit Bhattacharya, S. K. Gupta
    Pages 120-133
  8. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
    Pages 148-163
  9. Indrakshi Ray, Wei Huang
    Pages 177-190
  10. Jian Wang, Lein Harn, Hideki Imai
    Pages 191-204
  11. Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita RoyChowdhury
    Pages 217-227
  12. Dibyendu Chakrabarti, Subhamoy Maitra, Bimal Roy
    Pages 228-238
  13. Vivek Ramachandran, Sukumar Nandi
    Pages 239-250
  14. Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari
    Pages 251-262

About these proceedings

Keywords

Code DOM Extensible Markup Language (XML) Information P2P computing authorization boradcast encryption distributed computing fingerprinting identity intrusion detection privacy security trust trust models

Editors and affiliations

  • Sushil Jajodia
    • 1
  • Chandan Mazumdar
    • 2
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  2. 2.Jadavpur UniversityKolkataIndia

Bibliographic information

Industry Sectors
Pharma
Automotive
Biotechnology
IT & Software
Telecommunications
Law
Aerospace
Engineering
Finance, Business & Banking
Electronics